Home
last modified time | relevance | path

Searched refs:client_random (Results 1 – 25 of 46) sorted by relevance

12

/external/wpa_supplicant_8/src/eap_common/
Deap_fast_common.c69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument
76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
125 os_memcpy(rnd + keys.server_random_len, keys.client_random, in eap_fast_derive_key()
Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
/external/wpa_supplicant_8/src/tls/
Dtlsv1_common.c339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument
350 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash()
362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument
378 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
390 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
Dtlsv1_server.c68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf()
481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf()
582 keys->client_random = conn->client_random; in tlsv1_server_get_keys()
Dtlsv1_client.c61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
532 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf()
535 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf()
695 keys->client_random = conn->client_random; in tlsv1_client_get_keys()
Dtlsv1_common.h260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
Dtlsv1_server.h41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtlsv1_client.h47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member
Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member
Dtlsv1_client_write.c55 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello()
56 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello()
62 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
87 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
Dtlsv1_server_write.c104 conn->client_random, conn->server_random, in tls_write_server_hello()
446 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
494 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
Dtlsv1_client_read.c180 conn->client_random, conn->server_random, in tls_process_server_hello()
533 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
541 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
/external/openssl/ssl/
Ds23_clnt.c382 p=s->s3->client_random; in ssl23_client_hello()
471 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); in ssl23_client_hello()
472 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) in ssl23_client_hello()
475 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); in ssl23_client_hello()
499 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); in ssl23_client_hello()
664 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); in ssl23_get_server_hello()
Dd1_clnt.c249 memset(s->s3->client_random,0,sizeof(s->s3->client_random)); in IMPLEMENT_dtls1_meth_func()
813 p=s->s3->client_random; in dtls1_client_hello()
817 for (i=0;p[i]=='\0' && i<sizeof(s->s3->client_random);i++) in dtls1_client_hello()
819 if (i==sizeof(s->s3->client_random)) in dtls1_client_hello()
821 sizeof(s->s3->client_random)); in dtls1_client_hello()
831 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); in dtls1_client_hello()
Dt1_enc.c301 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_key_block()
516 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state()
527 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state()
632 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':… in tls1_setup_key_block()
1123 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
1133 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret()
1178 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
Ds3_enc.c193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); in ssl3_generate_key_block()
331 er1= &(s->s3->client_random[0]); in ssl3_change_cipher_state()
341 er2= &(s->s3->client_random[0]); in ssl3_change_cipher_state()
851 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]), in ssl3_generate_master_secret()
/external/wpa_supplicant_8/src/crypto/
Dtls.h17 const u8 *client_random; member
533 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtls_gnutls.c59 opaque client_random[WPA_TLS_RANDOM_SIZE]; member
767 keys->client_random = sec->client_random; in tls_connection_get_keys()
770 keys->client_random = in tls_connection_get_keys()
/external/chromium_org/net/third_party/nss/patches/
Dsecretexporterlocks.patch28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
/external/chromium_org/third_party/boringssl/src/ssl/
Dt1_enc.c300 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_key_block()
649 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':… in tls1_setup_key_block()
1181 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
1191 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret()
1204 s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
1254 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
Ds23_clnt.c309 p=s->s3->client_random; in ssl23_client_hello()
358 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); in ssl23_client_hello()
Ds3_enc.c193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); in ssl3_generate_key_block()
765 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]), in ssl3_generate_master_secret()
786 s->s3->client_random, SSL3_RANDOM_SIZE, in ssl3_generate_master_secret()
/external/wpa_supplicant_8/src/eap_peer/
Deap_tls_common.c333 if (keys.client_random == NULL || keys.server_random == NULL || in eap_peer_tls_derive_key()
340 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_key()
387 if (keys.client_random == NULL || keys.server_random == NULL || in eap_peer_tls_derive_session_id()
398 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_tls_common.c117 if (keys.client_random == NULL || keys.server_random == NULL || in eap_server_tls_derive_key()
124 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_server_tls_derive_key()

12