/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
H A D | evppkey_kdf_tls1_prf.txt | 21 Ctrl.server_random = hexseed:135e4d557fdf3aa6406d82975d5c606a9734c9334b42136e96990fbd5358cdb2 28 Ctrl.server_random = hexseed:67267e650eb32444119d222a368c191af3082888dc35afe8368e638c828874be 46 Ctrl.server_random = hexseed:f6c9575ed7ddd73e1f7d16eca115415812a43c2b747daaaae043abfb50053fce 53 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868 62 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868
|
H A D | evpkdf_tls12_prf.txt | 21 Ctrl.server_random = hexseed:f6c9575ed7ddd73e1f7d16eca115415812a43c2b747daaaae043abfb50053fce 28 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868 37 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868
|
H A D | evpkdf_tls11_prf.txt | 21 Ctrl.server_random = hexseed:135e4d557fdf3aa6406d82975d5c606a9734c9334b42136e96990fbd5358cdb2 28 Ctrl.server_random = hexseed:67267e650eb32444119d222a368c191af3082888dc35afe8368e638c828874be
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | bad_dtls_test.c | 48 static unsigned char server_random[SSL3_RANDOM_SIZE]; variable 257 memcpy(server_hello + SH_RANDOM_OFS, server_random, sizeof(server_random)); in send_server_hello() 360 server_random, SSL3_RANDOM_SIZE, in send_finished() 459 RAND_bytes(server_random + 4, sizeof(server_random) - 4); in test_bad_dtls() 462 memcpy(server_random, &now, sizeof(now)); in test_bad_dtls()
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | bad_dtls_test.c | 50 static unsigned char server_random[SSL3_RANDOM_SIZE]; variable 260 memcpy(server_hello + SH_RANDOM_OFS, server_random, sizeof(server_random)); in send_server_hello() 376 server_random, SSL3_RANDOM_SIZE, in send_finished() 478 RAND_bytes(server_random + 4, sizeof(server_random) - 4); in test_bad_dtls() 481 memcpy(server_random, &now, sizeof(now)); in test_bad_dtls()
|
/netbsd-src/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_server.c | 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tlsv1_server_derive_keys() 83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 495 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 500 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tlsv1_server_prf() 655 keys->server_random = conn->server_random; in tlsv1_server_get_random()
|
H A D | tlsv1_server_i.h | 27 u8 server_random[TLS_RANDOM_LEN]; member
|
H A D | tlsv1_server.h | 43 const u8 *server_random, u8 *master_secret);
|
H A D | tlsv1_client.h | 49 const u8 *server_random, u8 *master_secret);
|
/netbsd-src/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_fast_common.c | 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, in eap_fast_derive_master_secret() argument 78 server_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
H A D | eap_fast_common.h | 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/30-test_evp_data/ |
H A D | evpkdf.txt | 22 Ctrl.server_random = hexseed:135e4d557fdf3aa6406d82975d5c606a9734c9334b42136e96990fbd5358cdb2 29 Ctrl.server_random = hexseed:67267e650eb32444119d222a368c191af3082888dc35afe8368e638c828874be 38 Ctrl.server_random = hexseed:f6c9575ed7ddd73e1f7d16eca115415812a43c2b747daaaae043abfb50053fce 45 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868 54 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | t1_enc.c | 73 TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3->server_random, in tls1_generate_key_block() 388 printf("%02X%c", s->s3->server_random[z], in tls1_setup_key_block() 500 s->s3->server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 513 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret() 550 memcpy(val + currentvalpos, s->s3->server_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
H A D | s3_enc.c | 54 || !EVP_DigestUpdate(s1, s->s3->server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 499 || EVP_DigestUpdate(ctx, &(s->s3->server_random[0]), in ssl3_generate_master_secret()
|
H A D | ssl_lib.c | 4239 return sizeof(ssl->s3->server_random); in SSL_get_server_random() 4240 if (outlen > sizeof(ssl->s3->server_random)) in SSL_get_server_random() 4241 outlen = sizeof(ssl->s3->server_random); in SSL_get_server_random() 4242 memcpy(out, ssl->s3->server_random, outlen); in SSL_get_server_random()
|
H A D | ssl_local.h | 1536 unsigned char server_random[SSL3_RANDOM_SIZE]; member
|
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/ |
H A D | t1_enc.c | 93 TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3.server_random, in tls1_generate_key_block() 573 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 680 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 694 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 732 memcpy(val + currentvalpos, s->s3.server_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
H A D | s3_enc.c | 54 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 504 || EVP_DigestUpdate(ctx, &(s->s3.server_random[0]), in ssl3_generate_master_secret()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_get_client_random.pod | 68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for 73 Finally, though the "client_random" and "server_random" values are called
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_get_client_random.pod | 68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for 73 Finally, though the "client_random" and "server_random" values are called
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_lib.c | 1974 s->s3->server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 1987 s->s3->server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2382 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3->server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
|
H A D | statem_clnt.c | 1438 if (!PACKET_copy_bytes(pkt, s->s3->server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 3242 || EVP_DigestUpdate(ukm_hash, s->s3->server_random, in tls_construct_cke_gost()
|
H A D | statem_srvr.c | 1920 pos = s->s3->server_random; in tls_early_post_process_client_hello() 2381 ? hrrrandom : s->s3->server_random, in tls_construct_server_hello()
|
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_clnt.c | 1411 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 3076 || EVP_DigestUpdate(ukm_hash, s->s3.server_random, in tls_construct_cke_gost() 3145 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
|
H A D | statem_srvr.c | 1876 pos = s->s3.server_random; in tls_early_post_process_client_hello() 2317 ? hrrrandom : s->s3.server_random, in tls_construct_server_hello()
|