/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_kdf_tls1_prf.txt | 20 Ctrl.client_random = hexseed:e5acaf549cd25c22d964c0d930fa4b5261d2507fad84c33715b7b9a864020693 29 Ctrl.client_random = hexseed:d58a7b1cd4fedaa232159df652ce188f9d997e061b9bf48e83b62990440931f6 45 Ctrl.client_random = hexseed:36c129d01a3200894b9179faac589d9835d58775f9b5ea3587cb8fd0364cae8c 54 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616 63 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616
|
H A D | evpkdf_tls12_prf.txt | 20 Ctrl.client_random = hexseed:36c129d01a3200894b9179faac589d9835d58775f9b5ea3587cb8fd0364cae8c 29 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616 38 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616
|
H A D | evpkdf_tls11_prf.txt | 20 Ctrl.client_random = hexseed:e5acaf549cd25c22d964c0d930fa4b5261d2507fad84c33715b7b9a864020693 29 Ctrl.client_random = hexseed:d58a7b1cd4fedaa232159df652ce188f9d997e061b9bf48e83b62990440931f6
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_keyexport.c | 58 chunks[0].data = cc->client_random; in br_ssl_key_export() 59 chunks[0].len = sizeof cc->client_random; in br_ssl_key_export()
|
H A D | ssl_engine.c | 1344 { cc->client_random, sizeof cc->client_random }, in br_ssl_engine_compute_master() 1363 { cc->client_random, sizeof cc->client_random } in compute_key_block()
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 405 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
H A D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
|
H A D | tlsv1_client.c | 86 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 572 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 575 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 775 keys->client_random = conn->client_random; in tlsv1_client_get_random()
|
H A D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
H A D | tlsv1_server.h | 42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member
|
H A D | tlsv1_client_write.c | 66 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() 67 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 73 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello() 98 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
|
H A D | tlsv1_client.h | 48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member
|
H A D | tlsv1_server_write.c | 133 conn->client_random, conn->server_random, in tls_write_server_hello() 573 conn->client_random, in tls_write_server_key_exchange() 621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
H A D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_wolfssl.c | 86 unsigned char client_random[RAN_LEN]; member 2034 keys->client_random = conn->client_random; in tls_connection_get_random() 2036 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 2082 byte *client_random; in tls_connection_get_eap_fast_key() local 2098 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key() 2100 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2151 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local 2158 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb() 2159 sizeof(client_random)) == 0 || in tls_sess_sec_cb() 2171 client_random, server_random, secret); in tls_sess_sec_cb()
|
H A D | tls.h | 15 const u8 *client_random; member 625 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
H A D | tls_openssl.c | 93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 277 unsigned char client_random[SSL3_RANDOM_SIZE]; member 4318 keys->client_random = conn->client_random; in tls_connection_get_random() 4320 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 4428 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_connection_get_eap_fast_key() local 4464 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in tls_connection_get_eap_fast_key() 4470 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZE); in tls_connection_get_eap_fast_key() 5801 s->s3->client_random, in tls_sess_sec_cb() 5804 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local 5810 SSL_get_client_random(s, client_random, sizeof(client_random)); in tls_sess_sec_cb() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_client_random.pod | 30 total size of the client_random value. 67 In current versions of the TLS protocols, the length of client_random 73 Finally, though the "client_random" and "server_random" values are called
|
/freebsd/crypto/openssl/ssl/ |
H A D | t1_enc.c | 94 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 511 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 618 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 632 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 670 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
H A D | s3_enc.c | 55 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 502 || EVP_DigestUpdate(ctx, &(s->s3.client_random[0]), in ssl3_generate_master_secret()
|
/freebsd/crypto/openssl/test/ |
H A D | bad_dtls_test.c | 49 static unsigned char client_random[SSL3_RANDOM_SIZE]; variable 152 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello() 377 client_random, SSL3_RANDOM_SIZE, in send_finished()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls_common.c | 182 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id() 192 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
|