/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_common.c | 339 const u8 *client_random, 350 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 378 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 390 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_client.c | 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 516 * @server_random_first: seed is 0 = client_random|server_random, 517 * 1 = server_random|client_random 532 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 535 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 695 keys->client_random = conn->client_random;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_common.c | 339 const u8 *client_random, 350 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 378 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 390 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_client.c | 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 516 * @server_random_first: seed is 0 = client_random|server_random, 517 * 1 = server_random|client_random 532 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 535 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 695 keys->client_random = conn->client_random;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_common.c | 339 const u8 *client_random, 350 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 378 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 390 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 338 tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
|
H A D | tlsv1_client.c | 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 516 * @server_random_first: seed is 0 = client_random|server_random, 517 * 1 = server_random|client_random 532 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 535 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 695 keys->client_random = conn->client_random;
|
/external/openssl/ssl/ |
H A D | s23_clnt.c | 382 p=s->s3->client_random; 471 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); 472 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) 475 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 499 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 664 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
|