Searched refs:client_random (Results 1 - 25 of 71) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
H A Deap_fast_common.c69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_server.h41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client.h47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
H A Dtlsv1_common.c339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
517 * @server_random_first: seed is 0 = client_random|server_random,
518 * 1 = server_random|client_random
533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
727 keys->client_random = conn->client_random;
/external/wpa_supplicant_8/src/eap_common/
H A Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
H A Deap_fast_common.c69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_server.h41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client.h47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
H A Dtlsv1_common.c339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
517 * @server_random_first: seed is 0 = client_random|server_random,
518 * 1 = server_random|client_random
533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
727 keys->client_random = conn->client_random;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
H A Deap_fast_common.c69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_server.h41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client.h47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
H A Dtlsv1_common.c339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
338 tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, const u8 *client_random, const u8 *server_random, const u8 *server_params, size_t server_params_len, u8 *hash) argument
H A Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
517 * @server_random_first: seed is 0 = client_random|server_random,
518 * 1 = server_random|client_random
533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
727 keys->client_random = conn->client_random;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls.h15 const u8 *client_random; member in struct:tls_random
343 * @server_random_first: seed is 0 = client_random|server_random,
344 * 1 = server_random|client_random
353 * client_random|server_random (or server_random|client_random). For TLSv1.2 and
562 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,

Completed in 218 milliseconds

123