Searched refs:client_random (Results 1 - 25 of 36) sorted by relevance

12

/freebsd-12-stable/contrib/bearssl/src/ssl/
H A Dssl_keyexport.c58 chunks[0].data = cc->client_random;
59 chunks[0].len = sizeof cc->client_random;
H A Dssl_engine.c1329 { cc->client_random, sizeof cc->client_random },
1348 { cc->client_random, sizeof cc->client_random }
/freebsd-12-stable/contrib/wpa/src/eap_common/
H A Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
H A Deap_fast_common.c69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
/freebsd-12-stable/contrib/wpa/src/tls/
H A Dtlsv1_server.h42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client.h48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
H A Dtlsv1_common.c339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
519 * @server_random_first: seed is 0 = client_random|server_random,
520 * 1 = server_random|client_random
548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
751 keys->client_random = conn->client_random;
H A Dtlsv1_common.h263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
H A Dtlsv1_server.c68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
467 * @server_random_first: seed is 0 = client_random|server_random,
468 * 1 = server_random|client_random
496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
651 keys->client_random = conn->client_random;
H A Dtlsv1_client_write.c78 WPA_PUT_BE32(conn->client_random, now.sec);
79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
81 "client_random");
84 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
85 conn->client_random, TLS_RANDOM_LEN);
110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
H A Dtlsv1_server_write.c133 conn->client_random, conn->server_random,
573 conn->client_random,
621 conn->rl.tls_version, conn->client_random,
H A Dtlsv1_client_read.c245 conn->client_random, conn->server_random,
755 conn->client_random,
764 conn->rl.tls_version, conn->client_random,
H A Dtlsv1_server_read.c209 tlsv1_server_log(conn, "Truncated ClientHello/client_random");
213 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN);
215 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
216 conn->client_random, TLS_RANDOM_LEN);
/freebsd-12-stable/contrib/wpa/src/crypto/
H A Dtls.h15 const u8 *client_random; member in struct:tls_random
619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtls_wolfssl.c80 unsigned char client_random[RAN_LEN]; member in struct:tls_connection
1978 keys->client_random = conn->client_random;
1980 ssl, conn->client_random, sizeof(conn->client_random));
2016 byte *client_random; local
2032 &server_len, &client_random, &client_len);
2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN);
2079 unsigned char client_random[RAN_LEN]; local
2086 if (wolfSSL_get_client_random(s, client_random,
[all...]
H A Dtls_openssl.c83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE);
269 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection
3969 keys->client_random = conn->client_random;
3971 ssl, conn->client_random, sizeof(conn->client_random));
4064 unsigned char client_random[SSL3_RANDOM_SIZE]; local
4100 SSL_get_client_random(ssl, client_random, sizeof(client_random));
4106 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZ
5357 unsigned char client_random[SSL3_RANDOM_SIZE]; local
[all...]
/freebsd-12-stable/crypto/openssl/ssl/
H A Dt1_enc.c74 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE,
381 printf("%02X%c", s->s3->client_random[z],
498 s->s3->client_random, SSL3_RANDOM_SIZE,
511 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE);
548 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE);
H A Ds3_enc.c55 || !EVP_DigestUpdate(s1, s->s3->client_random, SSL3_RANDOM_SIZE)
497 || EVP_DigestUpdate(ctx, &(s->s3->client_random[0]),
/freebsd-12-stable/contrib/wpa/src/eap_server/
H A Deap_server_tls_common.c176 if (keys.client_random == NULL || keys.server_random == NULL)
186 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
/freebsd-12-stable/contrib/wpa/src/eap_peer/
H A Deap_tls_common.c439 keys.client_random == NULL || keys.server_random == NULL)
449 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
H A Deap_fast.c75 const u8 *client_random,
83 if (client_random == NULL || server_random == NULL ||
107 server_random, client_random,
74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/freebsd-12-stable/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c1128 p = s->s3->client_random;
1131 * for DTLS if client_random is initialized, reuse it, we are
1137 for (idx = 0; idx < sizeof(s->s3->client_random); idx++) {
1147 if (i && ssl_fill_hello_random(s, 0, p, sizeof(s->s3->client_random),
1188 || !WPACKET_memcpy(pkt, s->s3->client_random, SSL3_RANDOM_SIZE)) {
3234 || EVP_DigestUpdate(ukm_hash, s->s3->client_random,

Completed in 283 milliseconds

12