Home
last modified time | relevance | path

Searched refs:client_random (Results 1 – 25 of 25) sorted by relevance

/hostap-latest/src/tls/
Dtlsv1_common.c339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash()
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
405 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
Dtlsv1_server.c68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf()
499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf()
651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
Dtlsv1_client.c86 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
572 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf()
575 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf()
775 keys->client_random = conn->client_random; in tlsv1_client_get_random()
Dtlsv1_common.h263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
Dtlsv1_client_write.c66 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello()
67 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello()
73 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
98 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
Dtlsv1_server.h42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtlsv1_server_i.h26 u8 client_random[TLS_RANDOM_LEN]; member
Dtlsv1_client.h48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtlsv1_client_i.h25 u8 client_random[TLS_RANDOM_LEN]; member
Dtlsv1_server_write.c133 conn->client_random, conn->server_random, in tls_write_server_hello()
573 conn->client_random, in tls_write_server_key_exchange()
621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
Dtlsv1_client_read.c245 conn->client_random, conn->server_random, in tls_process_server_hello()
763 conn->client_random, in tlsv1_process_diffie_hellman()
772 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
Dtlsv1_server_read.c213 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN); in tls_process_client_hello()
216 conn->client_random, TLS_RANDOM_LEN); in tls_process_client_hello()
/hostap-latest/src/eap_common/
Deap_fast_common.c69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument
76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
Deap_fast_common.h99 const u8 *client_random, u8 *master_secret);
/hostap-latest/src/crypto/
Dtls_wolfssl.c86 unsigned char client_random[RAN_LEN]; member
2034 keys->client_random = conn->client_random; in tls_connection_get_random()
2036 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random()
2082 byte *client_random; in tls_connection_get_eap_fast_key() local
2098 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key()
2100 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key()
2151 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local
2158 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb()
2159 sizeof(client_random)) == 0 || in tls_sess_sec_cb()
2171 client_random, server_random, secret); in tls_sess_sec_cb()
Dtls.h15 const u8 *client_random; member
627 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
Dtls_openssl.c93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random()
277 unsigned char client_random[SSL3_RANDOM_SIZE]; member
4318 keys->client_random = conn->client_random; in tls_connection_get_random()
4320 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random()
4428 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_connection_get_eap_fast_key() local
4464 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in tls_connection_get_eap_fast_key()
4470 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZE); in tls_connection_get_eap_fast_key()
5801 s->s3->client_random, in tls_sess_sec_cb()
5804 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local
5810 SSL_get_client_random(s, client_random, sizeof(client_random)); in tls_sess_sec_cb()
[all …]
Dtls_mbedtls_alt.c1905 …int ret = conn->session_ticket_cb(conn->session_ticket_cb_ctx, buf, len, data.client_random, data.… in tls_mbedtls_ssl_ticket_parse()
2009 … const unsigned char client_random[MBEDTLS_EXPKEY_RAND_LEN], in tls_connection_export_keys_cb()
2025 os_memcpy(conn->expkey_randbytes, client_random, MBEDTLS_EXPKEY_RAND_LEN); in tls_connection_export_keys_cb()
2035 const unsigned char client_random[MBEDTLS_EXPKEY_RAND_LEN], in tls_connection_export_keys_cb()
2046 os_memcpy(conn->expkey_randbytes, client_random, MBEDTLS_EXPKEY_RAND_LEN); in tls_connection_export_keys_cb()
2056 data->client_random = conn->expkey_randbytes; in tls_connection_get_random()
Dtls_gnutls.c888 keys->client_random = client.data; in tls_connection_get_random()
/hostap-latest/src/eap_server/
Deap_server_tls_common.c182 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id()
192 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
Deap_server_fast.c121 const u8 *client_random, in eap_fast_session_ticket_cb() argument
263 eap_fast_derive_master_secret(pac_key, server_random, client_random, in eap_fast_session_ticket_cb()
Deap_server_teap.c141 const u8 *client_random, in eap_teap_session_ticket_cb() argument
/hostap-latest/src/eap_peer/
Deap_tls_common.c450 keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id()
460 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
Deap_fast.c75 const u8 *client_random, in eap_fast_session_ticket_cb() argument
83 if (client_random == NULL || server_random == NULL || in eap_fast_session_ticket_cb()
107 server_random, client_random, in eap_fast_session_ticket_cb()
Deap_teap.c79 const u8 *client_random, in eap_teap_session_ticket_cb() argument