Home
last modified time | relevance | path

Searched refs:SSL3_RANDOM_SIZE (Results 1 – 16 of 16) sorted by relevance

/openssl-master/ssl/
A Dt1_enc.c94 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block()
566 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block()
568 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block()
673 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
675 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
687 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret()
714 vallen = llen + SSL3_RANDOM_SIZE * 2; in tls1_export_keying_material()
725 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
726 currentvalpos += SSL3_RANDOM_SIZE; in tls1_export_keying_material()
727 memcpy(val + currentvalpos, s->s3.server_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
[all …]
A Ds3_enc.c54 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block()
55 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block()
499 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
501 SSL3_RANDOM_SIZE) <= 0 in ssl3_generate_master_secret()
A Dssl_local.h727 unsigned char random[SSL3_RANDOM_SIZE];
1266 unsigned char server_random[SSL3_RANDOM_SIZE];
1267 unsigned char client_random[SSL3_RANDOM_SIZE];
A Dd1_lib.c640 if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) in DTLSv1_listen()
A Dssl_lib.c5334 return SSL3_RANDOM_SIZE; in SSL_client_hello_get0_random()
5530 SSL3_RANDOM_SIZE, in ssl_log_secret()
/openssl-master/test/
A Dbad_dtls_test.c49 static unsigned char client_random[SSL3_RANDOM_SIZE];
50 static unsigned char server_random[SSL3_RANDOM_SIZE];
152 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello()
376 server_random, SSL3_RANDOM_SIZE, in send_finished()
377 client_random, SSL3_RANDOM_SIZE, in send_finished()
A Dclienthellotest.c206 + SSL3_RANDOM_SIZE)) in test_client_hello()
A Dservername_test.c63 + SSL3_RANDOM_SIZE)) in get_sni_from_client_hello()
A Dsslapitest.c219 unsigned char actual_client_random[SSL3_RANDOM_SIZE] = {0}; in test_keylog_output()
220 size_t client_random_size = SSL3_RANDOM_SIZE; in test_keylog_output()
260 SSL3_RANDOM_SIZE); in test_keylog_output()
261 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output()
315 SSL3_RANDOM_SIZE); in test_keylog_output()
316 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output()
6582 + SSL3_RANDOM_SIZE)) in get_MFL_from_client_hello()
/openssl-master/ssl/statem/
A Dstatem_lib.c1325 || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE in tls_get_message_body()
1328 SSL3_RANDOM_SIZE) != 0) { in tls_get_message_body()
1964 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version()
1976 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version()
2349 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs()
2356 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
2357 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
2359 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
A Dstatem_clnt.c1181 || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { in tls_construct_client_hello()
1396 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE in tls_process_server_hello()
1397 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello()
1400 if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { in tls_process_server_hello()
1405 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello()
3067 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost()
3069 SSL3_RANDOM_SIZE) <= 0 in tls_construct_cke_gost()
3136 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
3137 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
A Dstatem_srvr.c1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello()
1491 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello()
1492 memset(clienthello->random, 0, SSL3_RANDOM_SIZE); in tls_process_client_hello()
1494 clienthello->random + SSL3_RANDOM_SIZE - in tls_process_client_hello()
1505 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) in tls_process_client_hello()
1621 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); in tls_early_post_process_client_hello()
1877 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { in tls_early_post_process_client_hello()
2318 SSL3_RANDOM_SIZE)) { in tls_construct_server_hello()
A Dextensions_srvr.c34 #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \
828 || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) in tls_parse_ctos_cookie()
/openssl-master/include/openssl/
A Dssl3.h137 # define SSL3_RANDOM_SIZE 32 macro
/openssl-master/doc/man3/
A DSSL_get_client_random.pod68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for
A DSSL_CTX_set_client_hello_cb.pod45 SSL3_RANDOM_SIZE bytes with zeros if needed. For SSLv2 format ClientHellos,

Completed in 80 milliseconds