Home
last modified time | relevance | path

Searched refs:client_random (Results 1 – 25 of 34) sorted by relevance

12

/external/scapy/scapy/layers/tls/crypto/
Dprf.py200 client_random, server_random): argument
205 seed = client_random + server_random
214 client_random, req_len): argument
219 seed = server_random + client_random
285 def postprocess_key_for_export(self, key, client_random, server_random, argument
299 tbh = key + client_random + server_random
301 tbh = key + server_random + client_random
310 client_random + server_random,
314 def generate_iv_for_export(self, client_random, server_random, argument
328 tbh = client_random + server_random
[all …]
/external/boringssl/src/fipstools/
Dcavp_tlskdf_test.cc50 std::vector<uint8_t> premaster, server_random, client_random, in TestTLSKDF() local
54 !t->GetBytes(&client_random, "clientHello_random") || in TestTLSKDF()
70 sizeof(kMasterSecretLabel) - 1, client_random.data(), in TestTLSKDF()
71 client_random.size(), server_random.data(), in TestTLSKDF()
/external/boringssl/src/ssl/
Dhandoff.cc138 !CBB_add_asn1_octet_string(&seq, s3->client_random, in SSL_serialize_handback()
139 sizeof(s3->client_random)) || in SSL_serialize_handback()
202 CBS_len(&client_rand) != sizeof(s3->client_random) || in SSL_apply_handback()
203 !CBS_copy_bytes(&client_rand, s3->client_random, in SSL_apply_handback()
204 sizeof(s3->client_random)) || in SSL_apply_handback()
Dt1_enc.cc322 if (!ssl3_prf(out_span, premaster, label, ssl->s3->client_random, in tls1_generate_master_secret()
328 ssl->s3->client_random, ssl->s3->server_random)) { in tls1_generate_master_secret()
362 ssl->s3->client_random); in SSL_generate_key_block()
367 ssl->s3->client_random); in SSL_generate_key_block()
413 OPENSSL_memcpy(seed.data(), ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_export_keying_material()
Dhandshake_client.cc300 !CBB_add_bytes(&body, ssl->s3->client_random, SSL3_RANDOM_SIZE) || in ssl_write_client_hello()
455 if (!RAND_bytes(ssl->s3->client_random, sizeof(ssl->s3->client_random))) { in do_start_connect()
1061 !CBB_add_bytes(transcript.get(), ssl->s3->client_random, in do_read_server_key_exchange()
/external/scapy/scapy/layers/tls/
Dsession.py124 client_random=b"", argument
134 client_random,
167 client_random,
203 iv = self.prf.generate_iv_for_export(client_random,
424 self.client_random = None
525 if self.client_random is None:
531 self.client_random,
539 self.prcs.derive_keys(client_random=self.client_random,
542 self.pwcs.derive_keys(client_random=self.client_random,
Dhandshake.py282 self.tls_session.client_random = (struct.pack('!I',
721 m = s.client_random + s.server_random + raw(p)
745 s.client_random and s.server_random and
747 m = s.client_random + s.server_random + raw(self.params)
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server.c68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf()
481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf()
624 keys->client_random = conn->client_random; in tlsv1_server_get_random()
Dtlsv1_common.c339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash()
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf()
536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf()
727 keys->client_random = conn->client_random; in tlsv1_client_get_random()
Dtlsv1_common.h263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
Dtlsv1_client_write.c75 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello()
76 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello()
82 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
107 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
Dtlsv1_server.h41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtlsv1_client.h47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member
Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member
Dtlsv1_server_write.c130 conn->client_random, conn->server_random, in tls_write_server_hello()
570 conn->client_random, in tls_write_server_key_exchange()
618 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
/external/wpa_supplicant_8/src/eap_common/
Deap_fast_common.c69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument
76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
/external/syslinux/gpxe/src/net/
Dtls.c303 DBGC_HD ( tls, &tls->client_random, sizeof ( tls->client_random ) ); in tls_generate_master_secret()
311 &tls->client_random, sizeof ( tls->client_random ), in tls_generate_master_secret()
340 &tls->client_random, sizeof ( tls->client_random ) ); in tls_generate_keys()
633 memcpy ( &hello.random, &tls->client_random, sizeof ( hello.random ) ); in tls_send_client_hello()
1742 tls->client_random.gmt_unix_time = 0; in add_tls()
1743 tls_generate_random ( &tls->client_random.random, in add_tls()
1744 ( sizeof ( tls->client_random.random ) ) ); in add_tls()
/external/wpa_supplicant_8/src/crypto/
Dtls.h15 const u8 *client_random; member
573 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtls_openssl.c75 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random()
257 unsigned char client_random[SSL3_RANDOM_SIZE]; member
3390 keys->client_random = conn->client_random; in tls_connection_get_random()
3392 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random()
3481 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_connection_get_eap_fast_key() local
3517 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in tls_connection_get_eap_fast_key()
3523 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZE); in tls_connection_get_eap_fast_key()
4516 s->s3->client_random, in tls_sess_sec_cb()
4519 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local
4525 SSL_get_client_random(s, client_random, sizeof(client_random)); in tls_sess_sec_cb()
[all …]
/external/curl/lib/vtls/
Dopenssl.c184 unsigned char client_random[SSL3_RANDOM_SIZE]; member
255 unsigned char client_random[SSL3_RANDOM_SIZE]; in tap_ssl_key() local
265 SSL_get_client_random(ssl, client_random, SSL3_RANDOM_SIZE); in tap_ssl_key()
272 memcpy(client_random, ssl->s3->client_random, SSL3_RANDOM_SIZE); in tap_ssl_key()
282 !memcmp(state->client_random, client_random, SSL3_RANDOM_SIZE)) { in tap_ssl_key()
288 memcpy(state->client_random, client_random, SSL3_RANDOM_SIZE); in tap_ssl_key()
295 line[pos++] = hex[client_random[i] >> 4]; in tap_ssl_key()
296 line[pos++] = hex[client_random[i] & 0xF]; in tap_ssl_key()
/external/syslinux/gpxe/src/include/gpxe/
Dtls.h156 struct tls_client_random client_random; member
/external/wpa_supplicant_8/src/eap_server/
Deap_server_tls_common.c151 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id()
161 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()

12