/freebsd/crypto/openssl/ssl/ |
H A D | t1_enc.c | 94 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 511 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 513 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 618 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 620 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 632 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 634 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 659 vallen = llen + SSL3_RANDOM_SIZE * 2; in tls1_export_keying_material() 670 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material() 671 currentvalpos += SSL3_RANDOM_SIZE; in tls1_export_keying_material() [all …]
|
H A D | s3_enc.c | 54 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 55 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 503 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret() 505 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
|
H A D | ssl_local.h | 727 unsigned char random[SSL3_RANDOM_SIZE]; 1272 unsigned char server_random[SSL3_RANDOM_SIZE]; 1273 unsigned char client_random[SSL3_RANDOM_SIZE];
|
H A D | d1_lib.c | 657 if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) in DTLSv1_listen()
|
H A D | ssl_lib.c | 5416 return SSL3_RANDOM_SIZE; in SSL_client_hello_get0_random() 5615 SSL3_RANDOM_SIZE, in ssl_log_secret()
|
/freebsd/crypto/openssl/test/ |
H A D | bad_dtls_test.c | 49 static unsigned char client_random[SSL3_RANDOM_SIZE]; 50 static unsigned char server_random[SSL3_RANDOM_SIZE]; 152 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello() 376 server_random, SSL3_RANDOM_SIZE, in send_finished() 377 client_random, SSL3_RANDOM_SIZE, in send_finished()
|
H A D | clienthellotest.c | 206 + SSL3_RANDOM_SIZE)) in test_client_hello()
|
H A D | servername_test.c | 63 + SSL3_RANDOM_SIZE)) in get_sni_from_client_hello()
|
H A D | sslapitest.c | 207 unsigned char actual_client_random[SSL3_RANDOM_SIZE] = {0}; in test_keylog_output() 208 size_t client_random_size = SSL3_RANDOM_SIZE; in test_keylog_output() 248 SSL3_RANDOM_SIZE); in test_keylog_output() 249 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 303 SSL3_RANDOM_SIZE); in test_keylog_output() 304 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 6972 + SSL3_RANDOM_SIZE)) in get_MFL_from_client_hello()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 1333 || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE in tls_get_message_body() 1336 SSL3_RANDOM_SIZE) != 0) { in tls_get_message_body() 1972 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 1984 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2357 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs() 2364 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2365 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2367 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
|
H A D | statem_clnt.c | 1181 || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { in tls_construct_client_hello() 1398 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE in tls_process_server_hello() 1399 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello() 1406 if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 1411 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 3075 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost() 3077 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost() 3144 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3145 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
|
H A D | statem_srvr.c | 1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello() 1491 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello() 1492 memset(clienthello->random, 0, SSL3_RANDOM_SIZE); in tls_process_client_hello() 1494 clienthello->random + SSL3_RANDOM_SIZE - in tls_process_client_hello() 1505 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) in tls_process_client_hello() 1621 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); in tls_early_post_process_client_hello() 1877 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { in tls_early_post_process_client_hello() 2318 SSL3_RANDOM_SIZE)) { in tls_construct_server_hello()
|
H A D | extensions_srvr.c | 34 #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \ 840 || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) in tls_parse_ctos_cookie()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random() 93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 94 return SSL3_RANDOM_SIZE; in SSL_get_client_random() 101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random() 103 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); in SSL_get_server_random() 104 return SSL3_RANDOM_SIZE; in SSL_get_server_random() 277 unsigned char client_random[SSL3_RANDOM_SIZE]; 278 unsigned char server_random[SSL3_RANDOM_SIZE]; 1510 if (end - pos < 2 + SSL3_RANDOM_SIZE) in check_server_hello() 1512 pos += 2 + SSL3_RANDOM_SIZE; in check_server_hello() [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl3.h | 137 # define SSL3_RANDOM_SIZE 32 macro
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_client_random.pod | 68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for
|
H A D | SSL_CTX_set_client_hello_cb.pod | 45 SSL3_RANDOM_SIZE bytes with zeros if needed. For SSLv2 format ClientHellos,
|