Searched refs:server_random (Results 1 - 25 of 28) sorted by relevance

12

/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_fast_common.h98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
H A Deap_fast_common.c68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
78 server_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_server.h43 const u8 *server_random, u8 *master_secret);
H A Dtlsv1_client_i.h26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
H A Dtlsv1_client.h49 const u8 *server_random, u8 *master_secret);
H A Dtlsv1_common.c340 const u8 *server_random,
368 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
379 const u8 *server_random,
393 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
404 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
378 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_client.c63 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
77 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
519 * @server_random_first: seed is 0 = client_random|server_random,
520 * 1 = server_random|client_random
547 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
552 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
755 keys->server_random = conn->server_random;
H A Dtlsv1_common.h264 const u8 *server_random,
268 const u8 *server_random,
H A Dtlsv1_server_write.c59 WPA_PUT_BE32(conn->server_random, now.sec);
60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) {
62 "server_random");
65 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
66 conn->server_random, TLS_RANDOM_LEN);
91 os_memcpy(pos, conn->server_random, TLS_RANDOM_LEN);
133 conn->client_random, conn->server_random,
574 conn->server_random, server_params,
622 conn->server_random, server_params,
H A Dtlsv1_server.c69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
467 * @server_random_first: seed is 0 = client_random|server_random,
468 * 1 = server_random|client_random
495 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
500 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
655 keys->server_random = conn->server_random;
H A Dtlsv1_client_read.c145 os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
147 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
148 conn->server_random, TLS_RANDOM_LEN);
245 conn->client_random, conn->server_random,
756 conn->server_random, server_params,
765 conn->server_random, server_params,
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls.h17 const u8 *server_random; member in struct:tls_random
620 const u8 *server_random, u8 *master_secret);
H A Dtls_wolfssl.c81 unsigned char server_random[RAN_LEN]; member in struct:tls_connection
1981 keys->server_random = conn->server_random;
1983 ssl, conn->server_random, sizeof(conn->server_random));
2014 byte *server_random; local
2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random,
2033 os_memcpy(seed, server_random, RAN_LEN);
2080 unsigned char server_random[RAN_LEN]; local
2088 wolfSSL_get_server_random(s, server_random,
[all...]
H A Dtls_openssl.c93 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE);
270 unsigned char server_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection
3972 keys->server_random = conn->server_random;
3974 ssl, conn->server_random, sizeof(conn->server_random));
4065 unsigned char server_random[SSL3_RANDOM_SIZE]; local
4101 SSL_get_server_random(ssl, server_random, sizeof(server_random));
4105 os_memcpy(rnd, server_random, SSL3_RANDOM_SIZ
5358 unsigned char server_random[SSL3_RANDOM_SIZE]; local
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Dbad_dtls_test.c257 static unsigned char server_random[SSL3_RANDOM_SIZE]; variable
560 memcpy(server_hello + SH_RANDOM_OFS, server_random, sizeof(server_random));
666 server_random, SSL3_RANDOM_SIZE,
776 RAND_bytes(server_random + 4, sizeof(server_random) - 4);
779 memcpy(server_random, &now, sizeof(now));
H A Dt1_enc.c301 TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3->server_random,
531 s->s3->server_random, SSL3_RANDOM_SIZE,
541 s->s3->server_random, SSL3_RANDOM_SIZE,
690 printf("%02X%c", s->s3->server_random[z],
1167 s->s3->server_random, SSL3_RANDOM_SIZE,
1176 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE);
1190 s->s3->server_random, SSL3_RANDOM_SIZE,
1241 memcpy(val + currentvalpos, s->s3->server_random, SSL3_RANDOM_SIZE);
H A Ds3_enc.c191 !EVP_DigestUpdate(&s1, s->s3->server_random, SSL3_RANDOM_SIZE) ||
346 er2 = &(s->s3->server_random[0]);
355 er1 = &(s->s3->server_random[0]);
896 || EVP_DigestUpdate(&ctx, &(s->s3->server_random[0]),
921 s->s3->server_random, SSL3_RANDOM_SIZE,
H A Dssl3.h490 unsigned char server_random[SSL3_RANDOM_SIZE]; member in struct:ssl3_state_st
H A Ds3_srvr.c1256 * for not reused session only. We need to generate server_random before
1262 pos = s->s3->server_random;
1507 p = s->s3->server_random;
1520 memcpy(p, s->s3->server_random, SSL3_RANDOM_SIZE);
1990 || EVP_DigestUpdate(&md_ctx, &(s->s3->server_random[0]),
2030 || EVP_SignUpdate(&md_ctx, &(s->s3->server_random[0]),
H A Ds3_clnt.c979 memcpy(s->s3->server_random, p, SSL3_RANDOM_SIZE);
1998 || EVP_DigestUpdate(&md_ctx, &(s->s3->server_random[0]),
2028 || EVP_VerifyUpdate(&md_ctx, &(s->s3->server_random[0]),
3053 || EVP_DigestUpdate(ukm_hash, s->s3->server_random,
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_tls_common.c176 if (keys.client_random == NULL || keys.server_random == NULL)
187 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,
H A Deap_server_fast.c122 const u8 *server_random,
263 eap_fast_derive_master_secret(pac_key, server_random, client_random,
120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_tls_common.c439 keys.client_random == NULL || keys.server_random == NULL)
450 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,
H A Deap_fast.c76 const u8 *server_random,
83 if (client_random == NULL || server_random == NULL ||
107 server_random, client_random,
74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument

Completed in 384 milliseconds

12