/freebsd/crypto/openssl/ssl/ |
H A D | t1_enc.c | 98 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 305 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 307 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 396 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 398 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 410 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 412 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 446 vallen = llen + SSL3_RANDOM_SIZE * 2; in tls1_export_keying_material() 457 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material() 458 currentvalpos += SSL3_RANDOM_SIZE; in tls1_export_keying_material() [all …]
|
H A D | s3_enc.c | 56 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 57 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 406 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret() 408 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
|
H A D | d1_lib.c | 613 if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) in DTLSv1_listen()
|
H A D | ssl_local.h | 646 unsigned char random[SSL3_RANDOM_SIZE]; 1317 unsigned char server_random[SSL3_RANDOM_SIZE]; 1318 unsigned char client_random[SSL3_RANDOM_SIZE];
|
H A D | ssl_lib.c | 6810 return SSL3_RANDOM_SIZE; in SSL_client_hello_get0_random() 7083 SSL3_RANDOM_SIZE, in ssl_log_secret()
|
/freebsd/crypto/openssl/test/ |
H A D | bad_dtls_test.c | 49 static unsigned char client_random[SSL3_RANDOM_SIZE]; 50 static unsigned char server_random[SSL3_RANDOM_SIZE]; 152 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello() 377 server_random, SSL3_RANDOM_SIZE, in send_finished() 378 client_random, SSL3_RANDOM_SIZE, in send_finished()
|
H A D | clienthellotest.c | 169 + SSL3_RANDOM_SIZE)) in test_client_hello()
|
H A D | servername_test.c | 63 + SSL3_RANDOM_SIZE)) in get_sni_from_client_hello()
|
H A D | sslapitest.c | 209 unsigned char actual_client_random[SSL3_RANDOM_SIZE] = {0}; in test_keylog_output() 210 size_t client_random_size = SSL3_RANDOM_SIZE; in test_keylog_output() 250 SSL3_RANDOM_SIZE); in test_keylog_output() 251 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 305 SSL3_RANDOM_SIZE); in test_keylog_output() 306 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 7375 + SSL3_RANDOM_SIZE)) in get_MFL_from_client_hello()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random() 93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 94 return SSL3_RANDOM_SIZE; in SSL_get_client_random() 101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random() 103 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); in SSL_get_server_random() 104 return SSL3_RANDOM_SIZE; in SSL_get_server_random() 277 unsigned char client_random[SSL3_RANDOM_SIZE]; 278 unsigned char server_random[SSL3_RANDOM_SIZE]; 1510 if (end - pos < 2 + SSL3_RANDOM_SIZE) in check_server_hello() 1512 pos += 2 + SSL3_RANDOM_SIZE; in check_server_hello() [all …]
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 1720 || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE in tls_get_message_body() 1723 SSL3_RANDOM_SIZE) != 0) { in tls_get_message_body() 2387 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2398 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2792 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs() 2799 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2800 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2802 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
|
H A D | statem_clnt.c | 1266 || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { in tls_construct_client_hello() 1493 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE in tls_process_server_hello() 1494 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello() 1506 if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 1511 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 3354 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost() 3356 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost() 3425 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3426 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
|
H A D | statem_srvr.c | 1605 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello() 1606 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello() 1607 memset(clienthello->random, 0, SSL3_RANDOM_SIZE); in tls_process_client_hello() 1609 clienthello->random + SSL3_RANDOM_SIZE - in tls_process_client_hello() 1620 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) in tls_process_client_hello() 1738 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); in tls_early_post_process_client_hello() 1980 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { in tls_early_post_process_client_hello() 2432 SSL3_RANDOM_SIZE)) { in tls_construct_server_hello()
|
H A D | extensions_srvr.c | 35 #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \ 1156 || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) in tls_parse_ctos_cookie()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl3.h | 137 # define SSL3_RANDOM_SIZE 32 macro
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_client_random.pod | 68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for
|
H A D | SSL_CTX_set_client_hello_cb.pod | 47 SSL3_RANDOM_SIZE bytes with zeros if needed. For SSLv2 format ClientHellos,
|