Searched defs:server_random (Results 1 - 25 of 29) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_fast_common.c68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
78 server_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_fast_common.c68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
78 server_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_fast_common.c68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
78 server_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_i.h26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_common.c340 const u8 *server_random,
351 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
363 const u8 *server_random,
379 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
391 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
362 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_server_i.h27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_i.h26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_common.c340 const u8 *server_random,
351 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
363 const u8 *server_random,
379 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
391 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
362 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_server_i.h27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_i.h26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_common.c340 const u8 *server_random,
351 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
363 const u8 *server_random,
379 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
391 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
362 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_server_i.h27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls.h19 const u8 *server_random; member in struct:tls_keys
311 * @server_random_first: seed is 0 = client_random|server_random,
312 * 1 = server_random|client_random
323 * when it is called with seed set to client_random|server_random (or
324 * server_random|client_random).
534 const u8 *server_random, u8 *master_secret);
H A Dtls_gnutls.c35 * It looks like gnutls does not provide access to client/server_random and
60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon33603
768 keys->server_random = sec->server_random;
772 keys->server_random =
/external/wpa_supplicant_8/src/crypto/
H A Dtls.h19 const u8 *server_random; member in struct:tls_keys
311 * @server_random_first: seed is 0 = client_random|server_random,
312 * 1 = server_random|client_random
323 * when it is called with seed set to client_random|server_random (or
324 * server_random|client_random).
534 const u8 *server_random, u8 *master_secret);
H A Dtls_gnutls.c35 * It looks like gnutls does not provide access to client/server_random and
60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon33856
768 keys->server_random = sec->server_random;
772 keys->server_random =
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls.h19 const u8 *server_random; member in struct:tls_keys
311 * @server_random_first: seed is 0 = client_random|server_random,
312 * 1 = server_random|client_random
323 * when it is called with seed set to client_random|server_random (or
324 * server_random|client_random).
534 const u8 *server_random, u8 *master_secret);
H A Dtls_gnutls.c35 * It looks like gnutls does not provide access to client/server_random and
60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon34107
768 keys->server_random = sec->server_random;
772 keys->server_random =
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c798 CBS server_hello, server_random, session_id; local
816 !CBS_get_bytes(&server_hello, &server_random, SSL3_RANDOM_SIZE) ||
856 memcpy(s->s3->server_random, CBS_data(&server_random), SSL3_RANDOM_SIZE);
1510 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
1529 EVP_VerifyUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c75 const u8 *server_random,
82 if (client_random == NULL || server_random == NULL ||
106 server_random, client_random,
73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_fast.c122 const u8 *server_random,
259 eap_fast_derive_master_secret(pac_key, server_random, client_random,
120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_fast.c75 const u8 *server_random,
82 if (client_random == NULL || server_random == NULL ||
106 server_random, client_random,
73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_fast.c122 const u8 *server_random,
259 eap_fast_derive_master_secret(pac_key, server_random, client_random,
120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_fast.c75 const u8 *server_random,
82 if (client_random == NULL || server_random == NULL ||
106 server_random, client_random,
73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_fast.c122 const u8 *server_random,
259 eap_fast_derive_master_secret(pac_key, server_random, client_random,
120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument

Completed in 1768 milliseconds

12