/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.h | 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
|
H A D | eap_fast_common.c | 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 78 server_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server.h | 43 const u8 *server_random, u8 *master_secret);
|
H A D | tlsv1_client_i.h | 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_client.h | 49 const u8 *server_random, u8 *master_secret);
|
H A D | tlsv1_common.c | 340 const u8 *server_random, 368 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 379 const u8 *server_random, 393 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 404 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument 378 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_client.c | 63 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 77 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 519 * @server_random_first: seed is 0 = client_random|server_random, 520 * 1 = server_random|client_random 547 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 552 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 755 keys->server_random = conn->server_random;
|
H A D | tlsv1_common.h | 264 const u8 *server_random, 268 const u8 *server_random,
|
H A D | tlsv1_server_write.c | 59 WPA_PUT_BE32(conn->server_random, now.sec); 60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { 62 "server_random"); 65 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 66 conn->server_random, TLS_RANDOM_LEN); 91 os_memcpy(pos, conn->server_random, TLS_RANDOM_LEN); 133 conn->client_random, conn->server_random, 574 conn->server_random, server_params, 622 conn->server_random, server_params,
|
H A D | tlsv1_server.c | 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 467 * @server_random_first: seed is 0 = client_random|server_random, 468 * 1 = server_random|client_random 495 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 500 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 655 keys->server_random = conn->server_random;
|
H A D | tlsv1_client_read.c | 145 os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN); 147 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 148 conn->server_random, TLS_RANDOM_LEN); 245 conn->client_random, conn->server_random, 756 conn->server_random, server_params, 765 conn->server_random, server_params,
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls.h | 17 const u8 *server_random; member in struct:tls_random 620 const u8 *server_random, u8 *master_secret);
|
H A D | tls_wolfssl.c | 81 unsigned char server_random[RAN_LEN]; member in struct:tls_connection 1981 keys->server_random = conn->server_random; 1983 ssl, conn->server_random, sizeof(conn->server_random)); 2014 byte *server_random; local 2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, 2033 os_memcpy(seed, server_random, RAN_LEN); 2080 unsigned char server_random[RAN_LEN]; local 2088 wolfSSL_get_server_random(s, server_random, [all...] |
H A D | tls_openssl.c | 93 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); 270 unsigned char server_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 3972 keys->server_random = conn->server_random; 3974 ssl, conn->server_random, sizeof(conn->server_random)); 4065 unsigned char server_random[SSL3_RANDOM_SIZE]; local 4101 SSL_get_server_random(ssl, server_random, sizeof(server_random)); 4105 os_memcpy(rnd, server_random, SSL3_RANDOM_SIZ 5358 unsigned char server_random[SSL3_RANDOM_SIZE]; local [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | bad_dtls_test.c | 257 static unsigned char server_random[SSL3_RANDOM_SIZE]; variable 560 memcpy(server_hello + SH_RANDOM_OFS, server_random, sizeof(server_random)); 666 server_random, SSL3_RANDOM_SIZE, 776 RAND_bytes(server_random + 4, sizeof(server_random) - 4); 779 memcpy(server_random, &now, sizeof(now));
|
H A D | t1_enc.c | 301 TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3->server_random, 531 s->s3->server_random, SSL3_RANDOM_SIZE, 541 s->s3->server_random, SSL3_RANDOM_SIZE, 690 printf("%02X%c", s->s3->server_random[z], 1167 s->s3->server_random, SSL3_RANDOM_SIZE, 1176 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE); 1190 s->s3->server_random, SSL3_RANDOM_SIZE, 1241 memcpy(val + currentvalpos, s->s3->server_random, SSL3_RANDOM_SIZE);
|
H A D | s3_enc.c | 191 !EVP_DigestUpdate(&s1, s->s3->server_random, SSL3_RANDOM_SIZE) || 346 er2 = &(s->s3->server_random[0]); 355 er1 = &(s->s3->server_random[0]); 896 || EVP_DigestUpdate(&ctx, &(s->s3->server_random[0]), 921 s->s3->server_random, SSL3_RANDOM_SIZE,
|
H A D | ssl3.h | 490 unsigned char server_random[SSL3_RANDOM_SIZE]; member in struct:ssl3_state_st
|
H A D | s3_srvr.c | 1256 * for not reused session only. We need to generate server_random before 1262 pos = s->s3->server_random; 1507 p = s->s3->server_random; 1520 memcpy(p, s->s3->server_random, SSL3_RANDOM_SIZE); 1990 || EVP_DigestUpdate(&md_ctx, &(s->s3->server_random[0]), 2030 || EVP_SignUpdate(&md_ctx, &(s->s3->server_random[0]),
|
H A D | s3_clnt.c | 979 memcpy(s->s3->server_random, p, SSL3_RANDOM_SIZE); 1998 || EVP_DigestUpdate(&md_ctx, &(s->s3->server_random[0]), 2028 || EVP_VerifyUpdate(&md_ctx, &(s->s3->server_random[0]), 3053 || EVP_DigestUpdate(ukm_hash, s->s3->server_random,
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls_common.c | 176 if (keys.client_random == NULL || keys.server_random == NULL) 187 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,
|
H A D | eap_server_fast.c | 122 const u8 *server_random, 263 eap_fast_derive_master_secret(pac_key, server_random, client_random, 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.c | 439 keys.client_random == NULL || keys.server_random == NULL) 450 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,
|
H A D | eap_fast.c | 76 const u8 *server_random, 83 if (client_random == NULL || server_random == NULL || 107 server_random, client_random, 74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|