Lines Matching refs:eng
112 xc = ctx->eng.x509ctx; in make_pms_rsa()
135 if (nlen > sizeof ctx->eng.pad) { in make_pms_rsa()
142 pms = ctx->eng.pad + nlen - 48; in make_pms_rsa()
143 br_enc16be(pms, ctx->eng.version_max); in make_pms_rsa()
144 br_hmac_drbg_generate(&ctx->eng.rng, pms + 2, 46); in make_pms_rsa()
145 br_ssl_engine_compute_master(&ctx->eng, prf_id, pms, 48); in make_pms_rsa()
150 ctx->eng.pad[0] = 0x00; in make_pms_rsa()
151 ctx->eng.pad[1] = 0x02; in make_pms_rsa()
152 ctx->eng.pad[nlen - 49] = 0x00; in make_pms_rsa()
153 br_hmac_drbg_generate(&ctx->eng.rng, ctx->eng.pad + 2, nlen - 51); in make_pms_rsa()
155 while (ctx->eng.pad[u] == 0) { in make_pms_rsa()
156 br_hmac_drbg_generate(&ctx->eng.rng, in make_pms_rsa()
157 &ctx->eng.pad[u], 1); in make_pms_rsa()
164 if (!ctx->irsapub(ctx->eng.pad, nlen, &pk->key.rsa)) { in make_pms_rsa()
200 xc = ctx->eng.x509ctx; in verify_SKE_sig()
203 br_multihash_copyimpl(&mhc, &ctx->eng.mhash); in verify_SKE_sig()
206 ctx->eng.client_random, sizeof ctx->eng.client_random); in verify_SKE_sig()
208 ctx->eng.server_random, sizeof ctx->eng.server_random); in verify_SKE_sig()
211 head[2] = ctx->eng.ecdhe_curve; in verify_SKE_sig()
212 head[3] = ctx->eng.ecdhe_point_len; in verify_SKE_sig()
215 ctx->eng.ecdhe_point, ctx->eng.ecdhe_point_len); in verify_SKE_sig()
238 if (!ctx->eng.irsavrfy(ctx->eng.pad, sig_len, in verify_SKE_sig()
245 if (!ctx->eng.iecdsa(ctx->eng.iec, hv, hv_len, &pk->key.ec, in verify_SKE_sig()
246 ctx->eng.pad, sig_len)) in verify_SKE_sig()
273 curve = ctx->eng.ecdhe_curve; in make_pms_ecdh()
274 point_src = ctx->eng.ecdhe_point; in make_pms_ecdh()
275 point_len = ctx->eng.ecdhe_point_len; in make_pms_ecdh()
280 xc = ctx->eng.x509ctx; in make_pms_ecdh()
286 if ((ctx->eng.iec->supported_curves & ((uint32_t)1 << curve)) == 0) { in make_pms_ecdh()
296 order = ctx->eng.iec->order(curve, &olen); in make_pms_ecdh()
301 br_hmac_drbg_generate(&ctx->eng.rng, key, olen); in make_pms_ecdh()
309 ctx->eng.iec->generator(curve, &glen); in make_pms_ecdh()
315 if (!ctx->eng.iec->mul(point, glen, key, olen, curve)) { in make_pms_ecdh()
322 xoff = ctx->eng.iec->xoff(curve, &xlen); in make_pms_ecdh()
323 br_ssl_engine_compute_master(&ctx->eng, prf_id, point + xoff, xlen); in make_pms_ecdh()
325 ctx->eng.iec->mulgen(point, key, olen, curve); in make_pms_ecdh()
326 memcpy(ctx->eng.pad, point, glen); in make_pms_ecdh()
348 xc = ctx->eng.x509ctx; in make_pms_static_ecdh()
360 br_ssl_engine_compute_master(&ctx->eng, in make_pms_static_ecdh()
383 hv_len = br_multihash_out(&ctx->eng.mhash, in make_client_sign()
384 ctx->hash_id, ctx->eng.pad); in make_client_sign()
386 br_multihash_out(&ctx->eng.mhash, in make_client_sign()
387 br_md5_ID, ctx->eng.pad); in make_client_sign()
388 br_multihash_out(&ctx->eng.mhash, in make_client_sign()
389 br_sha1_ID, ctx->eng.pad + 16); in make_client_sign()
394 ctx->eng.pad, sizeof ctx->eng.pad); in make_client_sign()