/openssl-master/ssl/ |
A D | t1_enc.c | 94 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 566 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 568 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 673 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 675 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 687 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 714 vallen = llen + SSL3_RANDOM_SIZE * 2; in tls1_export_keying_material() 725 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material() 726 currentvalpos += SSL3_RANDOM_SIZE; in tls1_export_keying_material() 727 memcpy(val + currentvalpos, s->s3.server_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material() [all …]
|
A D | s3_enc.c | 54 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 55 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 499 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret() 501 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
|
A D | ssl_local.h | 727 unsigned char random[SSL3_RANDOM_SIZE]; 1266 unsigned char server_random[SSL3_RANDOM_SIZE]; 1267 unsigned char client_random[SSL3_RANDOM_SIZE];
|
A D | d1_lib.c | 640 if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) in DTLSv1_listen()
|
A D | ssl_lib.c | 5334 return SSL3_RANDOM_SIZE; in SSL_client_hello_get0_random() 5530 SSL3_RANDOM_SIZE, in ssl_log_secret()
|
/openssl-master/test/ |
A D | bad_dtls_test.c | 49 static unsigned char client_random[SSL3_RANDOM_SIZE]; 50 static unsigned char server_random[SSL3_RANDOM_SIZE]; 152 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello() 376 server_random, SSL3_RANDOM_SIZE, in send_finished() 377 client_random, SSL3_RANDOM_SIZE, in send_finished()
|
A D | clienthellotest.c | 206 + SSL3_RANDOM_SIZE)) in test_client_hello()
|
A D | servername_test.c | 63 + SSL3_RANDOM_SIZE)) in get_sni_from_client_hello()
|
A D | sslapitest.c | 219 unsigned char actual_client_random[SSL3_RANDOM_SIZE] = {0}; in test_keylog_output() 220 size_t client_random_size = SSL3_RANDOM_SIZE; in test_keylog_output() 260 SSL3_RANDOM_SIZE); in test_keylog_output() 261 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 315 SSL3_RANDOM_SIZE); in test_keylog_output() 316 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 6582 + SSL3_RANDOM_SIZE)) in get_MFL_from_client_hello()
|
/openssl-master/ssl/statem/ |
A D | statem_lib.c | 1325 || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE in tls_get_message_body() 1328 SSL3_RANDOM_SIZE) != 0) { in tls_get_message_body() 1964 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 1976 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2349 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs() 2356 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2357 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2359 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
|
A D | statem_clnt.c | 1181 || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { in tls_construct_client_hello() 1396 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE in tls_process_server_hello() 1397 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello() 1400 if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 1405 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 3067 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost() 3069 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost() 3136 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3137 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
|
A D | statem_srvr.c | 1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello() 1491 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello() 1492 memset(clienthello->random, 0, SSL3_RANDOM_SIZE); in tls_process_client_hello() 1494 clienthello->random + SSL3_RANDOM_SIZE - in tls_process_client_hello() 1505 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) in tls_process_client_hello() 1621 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); in tls_early_post_process_client_hello() 1877 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { in tls_early_post_process_client_hello() 2318 SSL3_RANDOM_SIZE)) { in tls_construct_server_hello()
|
A D | extensions_srvr.c | 34 #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \ 828 || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) in tls_parse_ctos_cookie()
|
/openssl-master/include/openssl/ |
A D | ssl3.h | 137 # define SSL3_RANDOM_SIZE 32 macro
|
/openssl-master/doc/man3/ |
A D | SSL_get_client_random.pod | 68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for
|
A D | SSL_CTX_set_client_hello_cb.pod | 45 SSL3_RANDOM_SIZE bytes with zeros if needed. For SSLv2 format ClientHellos,
|