/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_server.c | 43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 59 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 422 * @server_random_first: seed is 0 = client_random|server_random, 423 * 1 = server_random|client_random 438 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 441 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 542 keys->client_random = conn->client_random;
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_server.c | 43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 59 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 422 * @server_random_first: seed is 0 = client_random|server_random, 423 * 1 = server_random|client_random 438 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 441 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 542 keys->client_random = conn->client_random;
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_server.c | 43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 59 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 422 * @server_random_first: seed is 0 = client_random|server_random, 423 * 1 = server_random|client_random 438 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 441 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 542 keys->client_random = conn->client_random;
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 17 const u8 *client_random; member in struct:tls_keys 305 * @server_random_first: seed is 0 = client_random|server_random, 306 * 1 = server_random|client_random 317 * when it is called with seed set to client_random|server_random (or 318 * server_random|client_random). 527 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 17 const u8 *client_random; member in struct:tls_keys 305 * @server_random_first: seed is 0 = client_random|server_random, 306 * 1 = server_random|client_random 317 * when it is called with seed set to client_random|server_random (or 318 * server_random|client_random). 527 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 17 const u8 *client_random; member in struct:tls_keys 305 * @server_random_first: seed is 0 = client_random|server_random, 306 * 1 = server_random|client_random 317 * when it is called with seed set to client_random|server_random (or 318 * server_random|client_random). 527 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | s23_clnt.c | 357 p=s->s3->client_random; 448 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); 449 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) 452 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 476 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 641 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
|