/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/ssl/ |
H A D | ssl_asn1.c | 71 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 132 a.master_key.length=in->master_key_length; 133 a.master_key.type=V_ASN1_OCTET_STRING; 134 a.master_key.data=in->master_key; 186 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 209 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 309 memcpy(ret->master_key,os.data,ret->master_key_length);
|
H A D | s2_lib.c | 441 if (s->session->master_key_length < 0 || s->session->master_key_length > sizeof s->session->master_key) 460 < sizeof s->session->master_key); 461 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
H A D | ssl_txt.c | 130 if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
|
H A D | s3_enc.c | 166 EVP_DigestUpdate(&s1,s->session->master_key, 173 EVP_DigestUpdate(&m5,s->session->master_key, 550 EVP_DigestUpdate(&ctx,s->session->master_key, 556 EVP_DigestUpdate(&ctx,s->session->master_key,
|
H A D | s2_clnt.c | 673 if (i > sizeof sess->master_key) 679 if (RAND_bytes(sess->master_key,i) <= 0) 701 memcpy(d,sess->master_key,(unsigned int)clear); 705 &(sess->master_key[clear]),d, 716 sess->master_key[clear]++;
|
H A D | t1_enc.c | 207 s->session->master_key,s->session->master_key_length, 210 printf("tls1_generate_key_block() ==> %d byte master_key =\n\t", 216 printf("%02X", s->session->master_key[i]); 478 { int z; for (z=0; z<s->session->master_key_length; z++) printf("%02X%c",s->session->master_key[z],((z+1)%16)?' ':'\n'); } 687 s->session->master_key,s->session->master_key_length, 778 s->session->master_key,buff,sizeof buff);
|
H A D | ssl_sess.c | 532 OPENSSL_cleanse(ss->master_key,sizeof ss->master_key);
|
H A D | s3_clnt.c | 1499 s->session->master_key, 1629 s->session->master_key, 1677 s->session->master_key,p,n);
|
H A D | s3_srvr.c | 1504 s->session->master_key, 1568 s->session->master_key,p,i); 1726 s->session->master_key, pms, outl);
|
H A D | s2_srvr.c | 534 memcpy(s->session->master_key,p,(unsigned int)i);
|
H A D | ssl.h | 415 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_asn1.c | 71 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 132 a.master_key.length=in->master_key_length; 133 a.master_key.type=V_ASN1_OCTET_STRING; 134 a.master_key.data=in->master_key; 186 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 209 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 309 memcpy(ret->master_key,os.data,ret->master_key_length);
|
H A D | s2_lib.c | 391 s->session->master_key_length > (int)sizeof(s->session->master_key)) 411 < (int)sizeof(s->session->master_key)); 412 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
H A D | s3_enc.c | 165 EVP_DigestUpdate(&s1,s->session->master_key, 172 EVP_DigestUpdate(&m5,s->session->master_key, 564 EVP_DigestUpdate(&ctx,s->session->master_key, 570 EVP_DigestUpdate(&ctx,s->session->master_key,
|
H A D | ssl_txt.c | 130 if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
|
H A D | s2_clnt.c | 656 if (i > (int)sizeof(sess->master_key)) 662 if (RAND_bytes(sess->master_key,i) <= 0) 684 memcpy(d,sess->master_key,(unsigned int)clear); 688 &(sess->master_key[clear]),d, 699 sess->master_key[clear]++;
|
H A D | t1_enc.c | 205 s->session->master_key,s->session->master_key_length, 208 printf("tls1_generate_key_block() ==> %d byte master_key =\n\t", 214 printf("%02X", s->session->master_key[i]); 489 { int z; for (z=0; z<s->session->master_key_length; z++) printf("%02X%c",s->session->master_key[z],((z+1)%16)?' ':'\n'); } 706 s->session->master_key,s->session->master_key_length, 800 s->session->master_key,buff,sizeof buff);
|
H A D | ssl_sess.c | 544 OPENSSL_cleanse(ss->master_key,sizeof ss->master_key);
|
H A D | d1_clnt.c | 759 s->session->master_key, 889 s->session->master_key, 937 s->session->master_key,p,n);
|
H A D | s3_clnt.c | 1701 s->session->master_key, 1833 s->session->master_key, 1881 s->session->master_key,p,n); 2027 s->session->master_key,
|
H A D | s3_srvr.c | 1782 s->session->master_key, 1846 s->session->master_key,p,i); 2023 s->session->master_key, pms, outl); 2187 generate_master_secret(s, s->session->master_key, p, i);
|
H A D | s2_srvr.c | 516 memcpy(s->session->master_key,p,(unsigned int)i);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/net/ |
H A D | ppp_mppe.c | 103 unsigned char master_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state 145 nbytes = setup_sg(&sg[0], state->master_key, state->keylen); 199 if (optlen != CILEN_MPPE + sizeof(state->master_key) 230 memcpy(state->master_key, &options[CILEN_MPPE], 231 sizeof(state->master_key)); 232 memcpy(state->session_key, state->master_key, 233 sizeof(state->master_key)); 303 char mkey[sizeof(state->master_key) * 2 + 1]; 310 for (i = 0; i < sizeof(state->master_key); i++) 311 sprintf(mkey + i * 2, "%02x", state->master_key[ [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/ |
H A D | ssl.h | 415 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 433 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
|