Home
last modified time | relevance | path

Searched refs:client_random (Results 1 – 25 of 33) sorted by relevance

12

/dragonfly/crypto/libressl/ssl/
H A Dssl_packet.c77 unsigned char *client_random = NULL, *data = NULL; in ssl_convert_sslv2_client_hello() local
161 if ((client_random = malloc(SSL3_RANDOM_SIZE)) == NULL) in ssl_convert_sslv2_client_hello()
163 if (!CBB_init_fixed(&cbb, client_random, SSL3_RANDOM_SIZE)) in ssl_convert_sslv2_client_hello()
191 if (!CBB_add_bytes(&client_hello, client_random, SSL3_RANDOM_SIZE)) in ssl_convert_sslv2_client_hello()
222 free(client_random); in ssl_convert_sslv2_client_hello()
H A Dt1_enc.c295 s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block()
447 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
H A Dtls12_lib.c110 s->s3->client_random, SSL3_RANDOM_SIZE, NULL, 0, in tls12_derive_master_secret()
H A Dssl_clnt.c257 memset(s->s3->client_random, 0, in ssl3_connect()
258 sizeof(s->s3->client_random)); in ssl3_connect()
676 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); in ssl3_send_client_hello()
686 if (!CBB_add_bytes(&client_hello, s->s3->client_random, in ssl3_send_client_hello()
687 sizeof(s->s3->client_random))) in ssl3_send_client_hello()
1387 if (!EVP_DigestVerifyUpdate(md_ctx, s->s3->client_random, in ssl3_get_server_key_exchange()
1980 if (!EVP_DigestUpdate(ukm_hash, s->s3->client_random, SSL3_RANDOM_SIZE)) in ssl3_send_client_kex_gost()
H A Dtls13_server.c147 CBS cipher_suites, client_random, compression_methods, session_id; in tls13_client_hello_process() local
157 if (!CBS_get_bytes(cbs, &client_random, SSL3_RANDOM_SIZE)) in tls13_client_hello_process()
196 if (!tls13_clienthello_hash_update(ctx, &client_random)) { in tls13_client_hello_process()
H A Dssl_srvr.c780 CBS cbs, client_random, session_id, cookie, cipher_suites; in ssl3_get_client_hello() local
820 if (!CBS_get_bytes(&cbs, &client_random, SSL3_RANDOM_SIZE)) in ssl3_get_client_hello()
882 if (!CBS_write_bytes(&client_random, s->s3->client_random, in ssl3_get_client_hello()
883 sizeof(s->s3->client_random), NULL)) in ssl3_get_client_hello()
1495 if (!EVP_DigestSignUpdate(md_ctx, s->s3->client_random, in ssl3_send_server_key_exchange()
H A Dtls13_client.c59 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); in tls13_client_init()
100 if (!CBB_add_bytes(cbb, s->s3->client_random, SSL3_RANDOM_SIZE)) in tls13_client_hello_build()
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dtlsv1_common.c339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash()
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
H A Dtlsv1_server.c68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf()
499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf()
651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
H A Dtlsv1_client.c62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf()
551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf()
751 keys->client_random = conn->client_random; in tlsv1_client_get_random()
H A Dtlsv1_common.h263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
H A Dtlsv1_client_write.c78 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello()
79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello()
85 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
H A Dtlsv1_server.h42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member
H A Dtlsv1_client.h48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member
H A Dtlsv1_server_write.c133 conn->client_random, conn->server_random, in tls_write_server_hello()
573 conn->client_random, in tls_write_server_key_exchange()
621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
H A Dtlsv1_client_read.c245 conn->client_random, conn->server_random, in tls_process_server_hello()
755 conn->client_random, in tlsv1_process_diffie_hellman()
764 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_fast_common.c69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument
76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
H A Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dtls_wolfssl.c80 unsigned char client_random[RAN_LEN]; member
1978 keys->client_random = conn->client_random; in tls_connection_get_random()
1980 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random()
2016 byte *client_random; in tls_connection_get_eap_fast_key() local
2032 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key()
2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key()
2079 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local
2086 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb()
2087 sizeof(client_random)) == 0 || in tls_sess_sec_cb()
2099 client_random, server_random, secret); in tls_sess_sec_cb()
H A Dtls.h15 const u8 *client_random; member
619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
H A Dtls_openssl.c83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random()
269 unsigned char client_random[SSL3_RANDOM_SIZE]; member
3969 keys->client_random = conn->client_random; in tls_connection_get_random()
3971 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random()
4064 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_connection_get_eap_fast_key() local
4100 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in tls_connection_get_eap_fast_key()
4106 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZE); in tls_connection_get_eap_fast_key()
5354 s->s3->client_random, in tls_sess_sec_cb()
5357 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local
5363 SSL_get_client_random(s, client_random, sizeof(client_random)); in tls_sess_sec_cb()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_tls_common.c176 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id()
186 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_tls_common.c439 keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id()
449 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()

12