/freebsd-12-stable/contrib/bearssl/src/ssl/ |
H A D | ssl_keyexport.c | 58 chunks[0].data = cc->client_random; 59 chunks[0].len = sizeof cc->client_random;
|
H A D | ssl_engine.c | 1329 { cc->client_random, sizeof cc->client_random }, 1348 { cc->client_random, sizeof cc->client_random }
|
/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/freebsd-12-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server.h | 42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_client.h | 48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_common.c | 339 const u8 *client_random, 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 519 * @server_random_first: seed is 0 = client_random|server_random, 520 * 1 = server_random|client_random 548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 751 keys->client_random = conn->client_random;
|
H A D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
H A D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 467 * @server_random_first: seed is 0 = client_random|server_random, 468 * 1 = server_random|client_random 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 651 keys->client_random = conn->client_random;
|
H A D | tlsv1_client_write.c | 78 WPA_PUT_BE32(conn->client_random, now.sec); 79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 81 "client_random"); 84 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 85 conn->client_random, TLS_RANDOM_LEN); 110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
|
H A D | tlsv1_server_write.c | 133 conn->client_random, conn->server_random, 573 conn->client_random, 621 conn->rl.tls_version, conn->client_random,
|
H A D | tlsv1_client_read.c | 245 conn->client_random, conn->server_random, 755 conn->client_random, 764 conn->rl.tls_version, conn->client_random,
|
H A D | tlsv1_server_read.c | 209 tlsv1_server_log(conn, "Truncated ClientHello/client_random"); 213 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN); 215 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 216 conn->client_random, TLS_RANDOM_LEN);
|
/freebsd-12-stable/contrib/wpa/src/crypto/ |
H A D | tls.h | 15 const u8 *client_random; member in struct:tls_random 619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tls_wolfssl.c | 80 unsigned char client_random[RAN_LEN]; member in struct:tls_connection 1978 keys->client_random = conn->client_random; 1980 ssl, conn->client_random, sizeof(conn->client_random)); 2016 byte *client_random; local 2032 &server_len, &client_random, &client_len); 2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); 2079 unsigned char client_random[RAN_LEN]; local 2086 if (wolfSSL_get_client_random(s, client_random, [all...] |
H A D | tls_openssl.c | 83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); 269 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 3969 keys->client_random = conn->client_random; 3971 ssl, conn->client_random, sizeof(conn->client_random)); 4064 unsigned char client_random[SSL3_RANDOM_SIZE]; local 4100 SSL_get_client_random(ssl, client_random, sizeof(client_random)); 4106 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZ 5357 unsigned char client_random[SSL3_RANDOM_SIZE]; local [all...] |
/freebsd-12-stable/crypto/openssl/ssl/ |
H A D | t1_enc.c | 74 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE, 381 printf("%02X%c", s->s3->client_random[z], 498 s->s3->client_random, SSL3_RANDOM_SIZE, 511 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); 548 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE);
|
H A D | s3_enc.c | 55 || !EVP_DigestUpdate(s1, s->s3->client_random, SSL3_RANDOM_SIZE) 497 || EVP_DigestUpdate(ctx, &(s->s3->client_random[0]),
|
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls_common.c | 176 if (keys.client_random == NULL || keys.server_random == NULL) 186 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
|
/freebsd-12-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.c | 439 keys.client_random == NULL || keys.server_random == NULL) 449 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
|
H A D | eap_fast.c | 75 const u8 *client_random, 83 if (client_random == NULL || server_random == NULL || 107 server_random, client_random, 74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/freebsd-12-stable/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1128 p = s->s3->client_random; 1131 * for DTLS if client_random is initialized, reuse it, we are 1137 for (idx = 0; idx < sizeof(s->s3->client_random); idx++) { 1147 if (i && ssl_fill_hello_random(s, 0, p, sizeof(s->s3->client_random), 1188 || !WPACKET_memcpy(pkt, s->s3->client_random, SSL3_RANDOM_SIZE)) { 3234 || EVP_DigestUpdate(ukm_hash, s->s3->client_random,
|