/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_packet.c | 77 unsigned char *client_random = NULL, *data = NULL; in ssl_convert_sslv2_client_hello() local 161 if ((client_random = malloc(SSL3_RANDOM_SIZE)) == NULL) in ssl_convert_sslv2_client_hello() 163 if (!CBB_init_fixed(&cbb, client_random, SSL3_RANDOM_SIZE)) in ssl_convert_sslv2_client_hello() 191 if (!CBB_add_bytes(&client_hello, client_random, SSL3_RANDOM_SIZE)) in ssl_convert_sslv2_client_hello() 222 free(client_random); in ssl_convert_sslv2_client_hello()
|
H A D | t1_enc.c | 295 s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 447 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
H A D | tls12_lib.c | 110 s->s3->client_random, SSL3_RANDOM_SIZE, NULL, 0, in tls12_derive_master_secret()
|
H A D | ssl_clnt.c | 257 memset(s->s3->client_random, 0, in ssl3_connect() 258 sizeof(s->s3->client_random)); in ssl3_connect() 676 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); in ssl3_send_client_hello() 686 if (!CBB_add_bytes(&client_hello, s->s3->client_random, in ssl3_send_client_hello() 687 sizeof(s->s3->client_random))) in ssl3_send_client_hello() 1387 if (!EVP_DigestVerifyUpdate(md_ctx, s->s3->client_random, in ssl3_get_server_key_exchange() 1980 if (!EVP_DigestUpdate(ukm_hash, s->s3->client_random, SSL3_RANDOM_SIZE)) in ssl3_send_client_kex_gost()
|
H A D | tls13_server.c | 147 CBS cipher_suites, client_random, compression_methods, session_id; in tls13_client_hello_process() local 157 if (!CBS_get_bytes(cbs, &client_random, SSL3_RANDOM_SIZE)) in tls13_client_hello_process() 196 if (!tls13_clienthello_hash_update(ctx, &client_random)) { in tls13_client_hello_process()
|
H A D | ssl_srvr.c | 780 CBS cbs, client_random, session_id, cookie, cipher_suites; in ssl3_get_client_hello() local 820 if (!CBS_get_bytes(&cbs, &client_random, SSL3_RANDOM_SIZE)) in ssl3_get_client_hello() 882 if (!CBS_write_bytes(&client_random, s->s3->client_random, in ssl3_get_client_hello() 883 sizeof(s->s3->client_random), NULL)) in ssl3_get_client_hello() 1495 if (!EVP_DigestSignUpdate(md_ctx, s->s3->client_random, in ssl3_send_server_key_exchange()
|
H A D | tls13_client.c | 59 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); in tls13_client_init() 100 if (!CBB_add_bytes(cbb, s->s3->client_random, SSL3_RANDOM_SIZE)) in tls13_client_hello_build()
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
H A D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
|
H A D | tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 751 keys->client_random = conn->client_random; in tlsv1_client_get_random()
|
H A D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
H A D | tlsv1_client_write.c | 78 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() 79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 85 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello() 110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
|
H A D | tlsv1_server.h | 42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member
|
H A D | tlsv1_client.h | 48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member
|
H A D | tlsv1_server_write.c | 133 conn->client_random, conn->server_random, in tls_write_server_hello() 573 conn->client_random, in tls_write_server_key_exchange() 621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
|
H A D | tlsv1_client_read.c | 245 conn->client_random, conn->server_random, in tls_process_server_hello() 755 conn->client_random, in tlsv1_process_diffie_hellman() 764 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_wolfssl.c | 80 unsigned char client_random[RAN_LEN]; member 1978 keys->client_random = conn->client_random; in tls_connection_get_random() 1980 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 2016 byte *client_random; in tls_connection_get_eap_fast_key() local 2032 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key() 2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2079 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local 2086 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb() 2087 sizeof(client_random)) == 0 || in tls_sess_sec_cb() 2099 client_random, server_random, secret); in tls_sess_sec_cb()
|
H A D | tls.h | 15 const u8 *client_random; member 619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tls_openssl.c | 83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 269 unsigned char client_random[SSL3_RANDOM_SIZE]; member 3969 keys->client_random = conn->client_random; in tls_connection_get_random() 3971 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 4064 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_connection_get_eap_fast_key() local 4100 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in tls_connection_get_eap_fast_key() 4106 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZE); in tls_connection_get_eap_fast_key() 5354 s->s3->client_random, in tls_sess_sec_cb() 5357 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local 5363 SSL_get_client_random(s, client_random, sizeof(client_random)); in tls_sess_sec_cb() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 176 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id() 186 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 439 keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id() 449 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
|