/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server.h | 42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_client.h | 48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_common.c | 339 const u8 *client_random, 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 519 * @server_random_first: seed is 0 = client_random|server_random, 520 * 1 = server_random|client_random 548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 751 keys->client_random = conn->client_random;
|
H A D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
H A D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 467 * @server_random_first: seed is 0 = client_random|server_random, 468 * 1 = server_random|client_random 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 651 keys->client_random = conn->client_random;
|
H A D | tlsv1_client_write.c | 78 WPA_PUT_BE32(conn->client_random, now.sec); 79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 81 "client_random"); 84 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 85 conn->client_random, TLS_RANDOM_LEN); 110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
|
H A D | tlsv1_server_write.c | 133 conn->client_random, conn->server_random, 573 conn->client_random, 621 conn->rl.tls_version, conn->client_random,
|
H A D | tlsv1_client_read.c | 245 conn->client_random, conn->server_random, 755 conn->client_random, 764 conn->rl.tls_version, conn->client_random,
|
H A D | tlsv1_server_read.c | 209 tlsv1_server_log(conn, "Truncated ClientHello/client_random"); 213 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN); 215 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 216 conn->client_random, TLS_RANDOM_LEN);
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s23_clnt.c | 389 p = s->s3->client_random; 471 memset(&(s->s3->client_random[0]), 0, SSL3_RANDOM_SIZE); 472 if (RAND_bytes (&(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i) 476 memcpy(p, &(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i); 501 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 672 &(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i);
|
H A D | t1_enc.c | 302 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE, 530 s->s3->client_random, SSL3_RANDOM_SIZE, 540 s->s3->client_random, SSL3_RANDOM_SIZE, 683 printf("%02X%c", s->s3->client_random[z], 1165 s->s3->client_random, SSL3_RANDOM_SIZE, 1174 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); 1187 s->s3->client_random, SSL3_RANDOM_SIZE, 1239 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE);
|
H A D | s3_enc.c | 192 !EVP_DigestUpdate(&s1, s->s3->client_random, SSL3_RANDOM_SIZE) || 345 er1 = &(s->s3->client_random[0]); 356 er2 = &(s->s3->client_random[0]); 894 || EVP_DigestUpdate(&ctx, &(s->s3->client_random[0]), 918 s->s3->client_random, SSL3_RANDOM_SIZE,
|
H A D | d1_clnt.c | 273 /* mark client_random uninitialized */ 274 memset(s->s3->client_random, 0, sizeof(s->s3->client_random));
|
H A D | bad_dtls_test.c | 256 static unsigned char client_random[SSL3_RANDOM_SIZE]; variable 450 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) 667 client_random, SSL3_RANDOM_SIZE,
|
H A D | ssl3.h | 491 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:ssl3_state_st
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls.h | 15 const u8 *client_random; member in struct:tls_random 619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tls_wolfssl.c | 80 unsigned char client_random[RAN_LEN]; member in struct:tls_connection 1978 keys->client_random = conn->client_random; 1980 ssl, conn->client_random, sizeof(conn->client_random)); 2016 byte *client_random; local 2032 &server_len, &client_random, &client_len); 2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); 2079 unsigned char client_random[RAN_LEN]; local 2086 if (wolfSSL_get_client_random(s, client_random, [all...] |
H A D | tls_openssl.c | 83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); 269 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 3969 keys->client_random = conn->client_random; 3971 ssl, conn->client_random, sizeof(conn->client_random)); 4064 unsigned char client_random[SSL3_RANDOM_SIZE]; local 4100 SSL_get_client_random(ssl, client_random, sizeof(client_random)); 4106 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZ 5357 unsigned char client_random[SSL3_RANDOM_SIZE]; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls_common.c | 176 if (keys.client_random == NULL || keys.server_random == NULL) 186 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.c | 439 keys.client_random == NULL || keys.server_random == NULL) 449 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
|