Searched refs:SSL3_RANDOM_SIZE (Results 1 - 10 of 10) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Ds23_clnt.c329 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0)
390 /* Note that ch_len must be <= SSL3_RANDOM_SIZE (32),
394 if (SSL3_RANDOM_SIZE < ch_len)
395 i=SSL3_RANDOM_SIZE;
399 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE);
400 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0)
403 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
427 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE);
428 p += SSL3_RANDOM_SIZE;
570 /* Note that ch_len must be <= SSL3_RANDOM_SIZE (3
[all...]
H A Ds23_srvr.c446 i=(cl > SSL3_RANDOM_SIZE)?SSL3_RANDOM_SIZE:cl;
447 memset(d,0,SSL3_RANDOM_SIZE);
448 memcpy(&(d[SSL3_RANDOM_SIZE-i]),&(p[csl+sil]),i);
449 d+=SSL3_RANDOM_SIZE;
H A Dt1_enc.c289 s->s3->server_random,SSL3_RANDOM_SIZE,
290 s->s3->client_random,SSL3_RANDOM_SIZE,
492 s->s3->client_random,SSL3_RANDOM_SIZE,
493 s->s3->server_random,SSL3_RANDOM_SIZE,
503 s->s3->client_random,SSL3_RANDOM_SIZE,
504 s->s3->server_random,SSL3_RANDOM_SIZE,
596 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); }
598 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->server_random[z],((z+1)%16)?' ':'\n'); }
991 s->s3->client_random,SSL3_RANDOM_SIZE,
993 s->s3->server_random,SSL3_RANDOM_SIZE,
[all...]
H A Dssl3.h250 #define SSL3_RANDOM_SIZE 32 macro
395 unsigned char server_random[SSL3_RANDOM_SIZE];
396 unsigned char client_random[SSL3_RANDOM_SIZE];
H A Ds3_enc.c191 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE);
192 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE);
358 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE);
359 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE);
366 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE);
367 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE);
793 SSL3_RANDOM_SIZE);
795 SSL3_RANDOM_SIZE);
H A Dd1_srvr.c762 RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-sizeof(Time));
770 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE);
771 p+=SSL3_RANDOM_SIZE;
1217 EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
1218 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
1241 EVP_SignUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
1242 EVP_SignUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
1260 EVP_SignUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
1261 EVP_SignUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
H A Ds3_srvr.c847 session_length = *(p + SSL3_RANDOM_SIZE);
848 cookie_length = *(p + SSL3_RANDOM_SIZE + session_length + 1);
855 memcpy(s->s3->client_random,p,SSL3_RANDOM_SIZE);
856 p+=SSL3_RANDOM_SIZE;
1067 if (RAND_pseudo_bytes(pos,SSL3_RANDOM_SIZE-4) <= 0)
1300 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0)
1310 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE);
1311 p+=SSL3_RANDOM_SIZE;
1762 EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
1763 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
[all...]
H A Ds3_clnt.c632 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0)
643 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE);
644 p+=SSL3_RANDOM_SIZE;
782 memcpy(s->s3->server_random,p,SSL3_RANDOM_SIZE);
783 p+=SSL3_RANDOM_SIZE;
1555 EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
1556 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
1585 EVP_VerifyUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
1586 EVP_VerifyUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
1603 EVP_VerifyUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
[all...]
H A Dd1_clnt.c641 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE);
642 p+=SSL3_RANDOM_SIZE;
/barrelfish-master/include/openssl/
H A Dssl3.h250 #define SSL3_RANDOM_SIZE 32 macro
395 unsigned char server_random[SSL3_RANDOM_SIZE];
396 unsigned char client_random[SSL3_RANDOM_SIZE];

Completed in 162 milliseconds