/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 78 server_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 78 server_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, argument 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 78 server_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_i.h | 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_common.c | 340 const u8 *server_random, 351 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 363 const u8 *server_random, 379 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 391 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument 362 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_server_i.h | 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_i.h | 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_common.c | 340 const u8 *server_random, 351 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 363 const u8 *server_random, 379 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 391 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument 362 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_server_i.h | 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_i.h | 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_common.c | 340 const u8 *server_random, 351 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 363 const u8 *server_random, 379 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 391 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument 362 tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_server_i.h | 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 19 const u8 *server_random; member in struct:tls_keys 311 * @server_random_first: seed is 0 = client_random|server_random, 312 * 1 = server_random|client_random 323 * when it is called with seed set to client_random|server_random (or 324 * server_random|client_random). 534 const u8 *server_random, u8 *master_secret);
|
H A D | tls_gnutls.c | 35 * It looks like gnutls does not provide access to client/server_random and 60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon33603 768 keys->server_random = sec->server_random; 772 keys->server_random =
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 19 const u8 *server_random; member in struct:tls_keys 311 * @server_random_first: seed is 0 = client_random|server_random, 312 * 1 = server_random|client_random 323 * when it is called with seed set to client_random|server_random (or 324 * server_random|client_random). 534 const u8 *server_random, u8 *master_secret);
|
H A D | tls_gnutls.c | 35 * It looks like gnutls does not provide access to client/server_random and 60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon33856 768 keys->server_random = sec->server_random; 772 keys->server_random =
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 19 const u8 *server_random; member in struct:tls_keys 311 * @server_random_first: seed is 0 = client_random|server_random, 312 * 1 = server_random|client_random 323 * when it is called with seed set to client_random|server_random (or 324 * server_random|client_random). 534 const u8 *server_random, u8 *master_secret);
|
H A D | tls_gnutls.c | 35 * It looks like gnutls does not provide access to client/server_random and 60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon34107 768 keys->server_random = sec->server_random; 772 keys->server_random =
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 798 CBS server_hello, server_random, session_id; local 816 !CBS_get_bytes(&server_hello, &server_random, SSL3_RANDOM_SIZE) || 856 memcpy(s->s3->server_random, CBS_data(&server_random), SSL3_RANDOM_SIZE); 1510 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); 1529 EVP_VerifyUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 75 const u8 *server_random, 82 if (client_random == NULL || server_random == NULL || 106 server_random, client_random, 73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 122 const u8 *server_random, 259 eap_fast_derive_master_secret(pac_key, server_random, client_random, 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 75 const u8 *server_random, 82 if (client_random == NULL || server_random == NULL || 106 server_random, client_random, 73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 122 const u8 *server_random, 259 eap_fast_derive_master_secret(pac_key, server_random, client_random, 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 75 const u8 *server_random, 82 if (client_random == NULL || server_random == NULL || 106 server_random, client_random, 73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 122 const u8 *server_random, 259 eap_fast_derive_master_secret(pac_key, server_random, client_random, 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|