/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, in eap_fast_derive_key()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 350 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 378 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 390 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 582 keys->client_random = conn->client_random; in tlsv1_server_get_keys()
|
D | tlsv1_client.c | 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 532 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 535 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 695 keys->client_random = conn->client_random; in tlsv1_client_get_keys()
|
D | tlsv1_common.h | 260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member
|
D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member
|
D | tlsv1_client_write.c | 55 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() 56 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 62 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello() 87 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
|
D | tlsv1_server_write.c | 104 conn->client_random, conn->server_random, in tls_write_server_hello() 446 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange() 494 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
|
D | tlsv1_client_read.c | 180 conn->client_random, conn->server_random, in tls_process_server_hello() 533 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman() 541 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
|
/external/openssl/ssl/ |
D | s23_clnt.c | 382 p=s->s3->client_random; in ssl23_client_hello() 471 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); in ssl23_client_hello() 472 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) in ssl23_client_hello() 475 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); in ssl23_client_hello() 499 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); in ssl23_client_hello() 664 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); in ssl23_get_server_hello()
|
D | d1_clnt.c | 249 memset(s->s3->client_random,0,sizeof(s->s3->client_random)); in IMPLEMENT_dtls1_meth_func() 813 p=s->s3->client_random; in dtls1_client_hello() 817 for (i=0;p[i]=='\0' && i<sizeof(s->s3->client_random);i++) in dtls1_client_hello() 819 if (i==sizeof(s->s3->client_random)) in dtls1_client_hello() 821 sizeof(s->s3->client_random)); in dtls1_client_hello() 831 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); in dtls1_client_hello()
|
D | t1_enc.c | 301 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_key_block() 516 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state() 527 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state() 632 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':… in tls1_setup_key_block() 1123 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 1133 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret() 1178 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
D | s3_enc.c | 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); in ssl3_generate_key_block() 331 er1= &(s->s3->client_random[0]); in ssl3_change_cipher_state() 341 er2= &(s->s3->client_random[0]); in ssl3_change_cipher_state() 851 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]), in ssl3_generate_master_secret()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls.h | 17 const u8 *client_random; member 533 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tls_gnutls.c | 59 opaque client_random[WPA_TLS_RANDOM_SIZE]; member 767 keys->client_random = sec->client_random; in tls_connection_get_keys() 770 keys->client_random = in tls_connection_get_keys()
|
/external/chromium_org/net/third_party/nss/patches/ |
D | secretexporterlocks.patch | 28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
D | t1_enc.c | 300 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_key_block() 649 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':… in tls1_setup_key_block() 1181 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 1191 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret() 1204 s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 1254 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
D | s23_clnt.c | 309 p=s->s3->client_random; in ssl23_client_hello() 358 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); in ssl23_client_hello()
|
D | s3_enc.c | 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); in ssl3_generate_key_block() 765 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]), in ssl3_generate_master_secret() 786 s->s3->client_random, SSL3_RANDOM_SIZE, in ssl3_generate_master_secret()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_tls_common.c | 333 if (keys.client_random == NULL || keys.server_random == NULL || in eap_peer_tls_derive_key() 340 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_key() 387 if (keys.client_random == NULL || keys.server_random == NULL || in eap_peer_tls_derive_session_id() 398 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tls_common.c | 117 if (keys.client_random == NULL || keys.server_random == NULL || in eap_server_tls_derive_key() 124 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_server_tls_derive_key()
|