Searched refs:random (Results 1 – 13 of 13) sorted by relevance
/ssl/test/runner/ |
A D | handshake_server.go | 144 copy(c.clientRandom[:], hs.clientHello.random) 145 copy(c.serverRandom[:], hs.hello.random) 183 if isAllZero(hs.clientHello.random) { 508 if isAllZero(helloInner.random) { 513 if bytes.Equal(helloInner.random, helloOuter.random) { 560 hs.hello.random = make([]byte, 32) 1089 randomSuffix := hs.hello.random[len(hs.hello.random)-echAcceptConfirmationLength:] 1515 hs.hello.random = make([]byte, 32) 1527 copy(hs.hello.random[len(hs.hello.random)-8:], downgradeTLS13) 1530 copy(hs.hello.random[len(hs.hello.random)-8:], downgradeTLS12) [all …]
|
A D | handshake_client.go | 199 challengeLength = len(hs.hello.random) 201 if challengeLength <= len(hs.hello.random) { 203 clear(hs.hello.random[:skip]) 204 hs.hello.v2Challenge = hs.hello.random[skip:] 207 copy(hs.hello.v2Challenge, hs.hello.random) 356 if isAllZero(hs.serverHello.random) { 435 copy(c.clientRandom[:], hs.hello.random) 497 random: make([]byte, 32), 918 random: hello.random, 1115 if isAllZero(hs.serverHello.random) { [all …]
|
A D | key_agreement.go | 627 msg = append(msg, clientHello.random...) 628 msg = append(msg, hello.random...) 692 msg = append(msg, clientHello.random...) 693 msg = append(msg, serverHello.random...)
|
A D | handshake_messages.go | 205 random []byte member 288 hello.AddBytes(m.random) 815 !reader.ReadBytes(&m.random, 32) || 1328 random []byte member 1372 hello.AddBytes(m.random) 1445 !reader.ReadBytes(&m.random, 32) { 2055 var random []byte 2060 !reader.ReadBytes(&random, 32) ||
|
/ssl/ |
A D | tls13_server.cc | 909 Span<uint8_t> random(ssl->s3->server_random); in do_send_server_hello() local 913 hints->server_random_tls13.size() == random.size()) { in do_send_server_hello() 914 OPENSSL_memcpy(random.data(), hints->server_random_tls13.data(), in do_send_server_hello() 915 random.size()); in do_send_server_hello() 917 RAND_bytes(random.data(), random.size()); in do_send_server_hello() 919 !hints->server_random_tls13.CopyFrom(random)) { in do_send_server_hello() 950 Span<uint8_t> random_suffix = random.last(ECH_CONFIRMATION_SIGNAL_LEN); in do_send_server_hello()
|
A D | s3_both.cc | 315 uint8_t random[SSL3_RANDOM_SIZE]; in read_v2_client_hello() local 316 OPENSSL_memset(random, 0, SSL3_RANDOM_SIZE); in read_v2_client_hello() 317 OPENSSL_memcpy(random + (SSL3_RANDOM_SIZE - rand_len), CBS_data(&challenge), in read_v2_client_hello() 338 !CBB_add_bytes(&hello_body, random, SSL3_RANDOM_SIZE) || in read_v2_client_hello()
|
A D | tls13_client.cc | 136 return Span<const uint8_t>(server_hello.random) == kHelloRetryRequest; in is_hello_retry_request() 420 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_hello.random), in do_read_server_hello()
|
A D | extensions.cc | 118 CBS random, session_id; in ssl_parse_client_hello_with_trailing_data() local 120 !CBS_get_bytes(cbs, &random, SSL3_RANDOM_SIZE) || in ssl_parse_client_hello_with_trailing_data() 127 out->random = CBS_data(&random); in ssl_parse_client_hello_with_trailing_data() 128 out->random_len = CBS_len(&random); in ssl_parse_client_hello_with_trailing_data()
|
A D | handshake_client.cc | 548 !CBS_get_bytes(&body, &out->random, SSL3_RANDOM_SIZE) || in ssl_parse_server_hello() 678 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_hello.random), in do_read_server_hello()
|
A D | encrypted_client_hello.cc | 66 !CBB_add_bytes(out, client_hello->random, client_hello->random_len) || in ssl_client_hello_write_without_extensions()
|
A D | handshake_server.cc | 631 OPENSSL_memcpy(ssl->s3->client_random, client_hello.random, in do_read_client_hello_after_ech()
|
A D | internal.h | 2170 CBS random; member
|
A D | ssl_test.cc | 10602 EXPECT_EQ(Bytes(client_hello.random, client_hello.random_len), in TEST()
|
Completed in 77 milliseconds