/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 624 keys->client_random = conn->client_random; in tlsv1_server_get_random()
|
D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
D | tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 727 keys->client_random = conn->client_random; in tlsv1_client_get_random()
|
D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member
|
D | tlsv1_client_write.c | 75 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() 76 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 82 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello() 107 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
|
D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member
|
D | tlsv1_server_write.c | 130 conn->client_random, conn->server_random, in tls_write_server_hello() 570 conn->client_random, in tls_write_server_key_exchange() 618 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
|
D | tlsv1_client_read.c | 245 conn->client_random, conn->server_random, in tls_process_server_hello() 758 conn->client_random, in tlsv1_process_diffie_hellman() 767 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
|
D | tlsv1_server_read.c | 202 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN); in tls_process_client_hello() 205 conn->client_random, TLS_RANDOM_LEN); in tls_process_client_hello()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls.h | 15 const u8 *client_random; member 562 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tls_openssl.c | 65 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 222 unsigned char client_random[SSL3_RANDOM_SIZE]; member 3075 keys->client_random = conn->client_random; in tls_connection_get_random() 3077 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 3160 unsigned char client_random[SSL3_RANDOM_SIZE]; in openssl_tls_prf() 3198 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in openssl_tls_prf() 3205 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, in openssl_tls_prf() 3208 os_memcpy(rnd, client_random, SSL3_RANDOM_SIZE); in openssl_tls_prf() 4169 s->s3->client_random, in tls_sess_sec_cb() 4172 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local [all …]
|
/external/boringssl/src/ssl/ |
D | t1_enc.c | 268 ssl->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_key_block() 564 ssl->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 596 memcpy(seed, ssl->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
D | s3_srvr.c | 776 CBS client_random, session_id, cipher_suites, compression_methods; in ssl3_get_client_hello() local 842 !CBS_get_bytes(&client_hello, &client_random, SSL3_RANDOM_SIZE) || in ssl3_get_client_hello() 855 memcpy(ssl->s3->client_random, CBS_data(&client_random), SSL3_RANDOM_SIZE); in ssl3_get_client_hello() 1328 EVP_DigestUpdate(&md_ctx, ssl->s3->client_random, SSL3_RANDOM_SIZE) && in ssl3_send_server_key_exchange()
|
D | s3_clnt.c | 692 !ssl_fill_hello_random(ssl->s3->client_random, in ssl3_send_client_hello() 693 sizeof(ssl->s3->client_random), 0 /* client */)) { in ssl3_send_client_hello() 705 !CBB_add_bytes(&cbb, ssl->s3->client_random, SSL3_RANDOM_SIZE) || in ssl3_send_client_hello() 1265 !EVP_DigestVerifyUpdate(&md_ctx, ssl->s3->client_random, in ssl3_get_server_key_exchange()
|
D | s3_both.c | 175 if (!ssl_log_master_secret(ssl, ssl->s3->client_random, SSL3_RANDOM_SIZE, in ssl3_send_finished()
|
D | internal.h | 1259 int ssl_log_master_secret(const SSL *ssl, const uint8_t *client_random,
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tls_common.c | 151 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id() 161 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
|
D | eap_server_fast.c | 121 const u8 *client_random, in eap_fast_session_ticket_cb() argument 263 eap_fast_derive_master_secret(pac_key, server_random, client_random, in eap_fast_session_ticket_cb()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_tls_common.c | 362 keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id() 372 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
|
D | eap_fast.c | 75 const u8 *client_random, in eap_fast_session_ticket_cb() argument 83 if (client_random == NULL || server_random == NULL || in eap_fast_session_ticket_cb() 107 server_random, client_random, in eap_fast_session_ticket_cb()
|