Searched refs:client_random (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
H A Deap_fast_common.c69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_server.h42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
H A Dtlsv1_client.h48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_common.c339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
519 * @server_random_first: seed is 0 = client_random|server_random,
520 * 1 = server_random|client_random
548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
751 keys->client_random = conn->client_random;
H A Dtlsv1_common.h263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
H A Dtlsv1_server.c68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
467 * @server_random_first: seed is 0 = client_random|server_random,
468 * 1 = server_random|client_random
496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
651 keys->client_random = conn->client_random;
H A Dtlsv1_client_write.c78 WPA_PUT_BE32(conn->client_random, now.sec);
79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
81 "client_random");
84 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
85 conn->client_random, TLS_RANDOM_LEN);
110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
H A Dtlsv1_server_write.c133 conn->client_random, conn->server_random,
573 conn->client_random,
621 conn->rl.tls_version, conn->client_random,
H A Dtlsv1_client_read.c245 conn->client_random, conn->server_random,
755 conn->client_random,
764 conn->rl.tls_version, conn->client_random,
H A Dtlsv1_server_read.c209 tlsv1_server_log(conn, "Truncated ClientHello/client_random");
213 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN);
215 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
216 conn->client_random, TLS_RANDOM_LEN);
/freebsd-11-stable/crypto/openssl/ssl/
H A Ds23_clnt.c389 p = s->s3->client_random;
471 memset(&(s->s3->client_random[0]), 0, SSL3_RANDOM_SIZE);
472 if (RAND_bytes (&(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i)
476 memcpy(p, &(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i);
501 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE);
672 &(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i);
H A Dt1_enc.c302 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE,
530 s->s3->client_random, SSL3_RANDOM_SIZE,
540 s->s3->client_random, SSL3_RANDOM_SIZE,
683 printf("%02X%c", s->s3->client_random[z],
1165 s->s3->client_random, SSL3_RANDOM_SIZE,
1174 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE);
1187 s->s3->client_random, SSL3_RANDOM_SIZE,
1239 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE);
H A Ds3_enc.c192 !EVP_DigestUpdate(&s1, s->s3->client_random, SSL3_RANDOM_SIZE) ||
345 er1 = &(s->s3->client_random[0]);
356 er2 = &(s->s3->client_random[0]);
894 || EVP_DigestUpdate(&ctx, &(s->s3->client_random[0]),
918 s->s3->client_random, SSL3_RANDOM_SIZE,
H A Dd1_clnt.c273 /* mark client_random uninitialized */
274 memset(s->s3->client_random, 0, sizeof(s->s3->client_random));
H A Dbad_dtls_test.c256 static unsigned char client_random[SSL3_RANDOM_SIZE]; variable
450 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE))
667 client_random, SSL3_RANDOM_SIZE,
H A Dssl3.h491 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:ssl3_state_st
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls.h15 const u8 *client_random; member in struct:tls_random
619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtls_wolfssl.c80 unsigned char client_random[RAN_LEN]; member in struct:tls_connection
1978 keys->client_random = conn->client_random;
1980 ssl, conn->client_random, sizeof(conn->client_random));
2016 byte *client_random; local
2032 &server_len, &client_random, &client_len);
2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN);
2079 unsigned char client_random[RAN_LEN]; local
2086 if (wolfSSL_get_client_random(s, client_random,
[all...]
H A Dtls_openssl.c83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE);
269 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection
3969 keys->client_random = conn->client_random;
3971 ssl, conn->client_random, sizeof(conn->client_random));
4064 unsigned char client_random[SSL3_RANDOM_SIZE]; local
4100 SSL_get_client_random(ssl, client_random, sizeof(client_random));
4106 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZ
5357 unsigned char client_random[SSL3_RANDOM_SIZE]; local
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_tls_common.c176 if (keys.client_random == NULL || keys.server_random == NULL)
186 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_tls_common.c439 keys.client_random == NULL || keys.server_random == NULL)
449 os_memcpy(out + 1, keys.client_random, keys.client_random_len);

Completed in 309 milliseconds

12