Home
last modified time | relevance | path

Searched refs:SSL3_RANDOM_SIZE (Results 1 – 17 of 17) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dt1_enc.c94 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block()
511 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block()
513 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block()
618 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
620 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
632 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret()
634 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret()
659 vallen = llen + SSL3_RANDOM_SIZE * 2; in tls1_export_keying_material()
670 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
671 currentvalpos += SSL3_RANDOM_SIZE; in tls1_export_keying_material()
[all …]
H A Ds3_enc.c54 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block()
55 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block()
503 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
505 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
H A Dssl_local.h727 unsigned char random[SSL3_RANDOM_SIZE];
1272 unsigned char server_random[SSL3_RANDOM_SIZE];
1273 unsigned char client_random[SSL3_RANDOM_SIZE];
H A Dd1_lib.c657 if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) in DTLSv1_listen()
H A Dssl_lib.c5416 return SSL3_RANDOM_SIZE; in SSL_client_hello_get0_random()
5615 SSL3_RANDOM_SIZE, in ssl_log_secret()
/freebsd/crypto/openssl/test/
H A Dbad_dtls_test.c49 static unsigned char client_random[SSL3_RANDOM_SIZE];
50 static unsigned char server_random[SSL3_RANDOM_SIZE];
152 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello()
376 server_random, SSL3_RANDOM_SIZE, in send_finished()
377 client_random, SSL3_RANDOM_SIZE, in send_finished()
H A Dclienthellotest.c206 + SSL3_RANDOM_SIZE)) in test_client_hello()
H A Dservername_test.c63 + SSL3_RANDOM_SIZE)) in get_sni_from_client_hello()
H A Dsslapitest.c207 unsigned char actual_client_random[SSL3_RANDOM_SIZE] = {0}; in test_keylog_output()
208 size_t client_random_size = SSL3_RANDOM_SIZE; in test_keylog_output()
248 SSL3_RANDOM_SIZE); in test_keylog_output()
249 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output()
303 SSL3_RANDOM_SIZE); in test_keylog_output()
304 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output()
6972 + SSL3_RANDOM_SIZE)) in get_MFL_from_client_hello()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_lib.c1333 || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE in tls_get_message_body()
1336 SSL3_RANDOM_SIZE) != 0) { in tls_get_message_body()
1972 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version()
1984 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version()
2357 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs()
2364 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
2365 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
2367 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
H A Dstatem_clnt.c1181 || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { in tls_construct_client_hello()
1398 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE in tls_process_server_hello()
1399 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello()
1406 if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { in tls_process_server_hello()
1411 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello()
3075 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost()
3077 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost()
3144 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
3145 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
H A Dstatem_srvr.c1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello()
1491 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello()
1492 memset(clienthello->random, 0, SSL3_RANDOM_SIZE); in tls_process_client_hello()
1494 clienthello->random + SSL3_RANDOM_SIZE - in tls_process_client_hello()
1505 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) in tls_process_client_hello()
1621 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); in tls_early_post_process_client_hello()
1877 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { in tls_early_post_process_client_hello()
2318 SSL3_RANDOM_SIZE)) { in tls_construct_server_hello()
H A Dextensions_srvr.c34 #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \
840 || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) in tls_parse_ctos_cookie()
/freebsd/contrib/wpa/src/crypto/
H A Dtls_openssl.c91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random()
93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random()
94 return SSL3_RANDOM_SIZE; in SSL_get_client_random()
101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random()
103 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); in SSL_get_server_random()
104 return SSL3_RANDOM_SIZE; in SSL_get_server_random()
277 unsigned char client_random[SSL3_RANDOM_SIZE];
278 unsigned char server_random[SSL3_RANDOM_SIZE];
1510 if (end - pos < 2 + SSL3_RANDOM_SIZE) in check_server_hello()
1512 pos += 2 + SSL3_RANDOM_SIZE; in check_server_hello()
[all …]
/freebsd/crypto/openssl/include/openssl/
H A Dssl3.h137 # define SSL3_RANDOM_SIZE 32 macro
/freebsd/crypto/openssl/doc/man3/
H A DSSL_get_client_random.pod68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for
H A DSSL_CTX_set_client_hello_cb.pod45 SSL3_RANDOM_SIZE bytes with zeros if needed. For SSLv2 format ClientHellos,