/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | ssl3Callouts.c | 70 SSLBuffer leader, masterSecret, serverRandom, clientRandom, shaHash, md5Hash; local 85 serverRandom.data = ctx->serverRandom; 86 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 113 if ((err = SSLHashSHA1.update(&shaContext, &serverRandom)) != 0) 155 * On entry: clientRandom, serverRandom, preMasterSecret valid 163 serverRandom, shaHash, md5Hash, leader; local 175 serverRandom.data = ctx->serverRandom; 176 serverRandom [all...] |
H A D | sslKeyExchange.c | 246 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local 259 serverRandom.data = ctx->serverRandom; 260 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 290 if ((err = hashRef->update(&hashCtx, &serverRandom)) != 0) 333 SSLBuffer clientRandom,serverRandom,hashCtx, hash; local 342 serverRandom.data = ctx->serverRandom; 343 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 356 if ((err = SSLHashMD5.update(&hashCtx, &serverRandom)) ! 579 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local 658 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local [all...] |
H A D | tls1Callouts.c | 300 memmove(seedBuf + PLS_KEY_EXPAND_LEN, ctx->serverRandom, 318 * On entry: clientRandom, serverRandom, preMasterSecret valid 334 ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE);
|
H A D | sslContext.h | 328 uint8_t serverRandom[SSL_CLIENT_SRVR_RAND_SIZE]; member in struct:SSLContext 368 /* server PAC resume sets serverRandom early to allow for secret acquisition */
|
H A D | sslHandshakeHello.c | 120 /* serverRandom might have already been set, in SSLAdvanceHandshake() */ 122 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0) { 128 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0) 132 memcpy(charPtr, ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE); 374 memcpy(ctx->serverRandom, p, 32);
|
H A D | sslHandshake.c | 595 /* the master secret callback requires serverRandom, now... */ 596 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0)
|
H A D | sslContext.c | 2142 memmove(randBuf, ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | ssl3Callouts.c | 70 SSLBuffer leader, masterSecret, serverRandom, clientRandom, shaHash, md5Hash; local 85 serverRandom.data = ctx->serverRandom; 86 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 113 if ((err = SSLHashSHA1.update(&shaContext, &serverRandom)) != 0) 155 * On entry: clientRandom, serverRandom, preMasterSecret valid 163 serverRandom, shaHash, md5Hash, leader; local 175 serverRandom.data = ctx->serverRandom; 176 serverRandom [all...] |
H A D | sslKeyExchange.c | 246 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local 259 serverRandom.data = ctx->serverRandom; 260 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 290 if ((err = hashRef->update(&hashCtx, &serverRandom)) != 0) 333 SSLBuffer clientRandom,serverRandom,hashCtx, hash; local 342 serverRandom.data = ctx->serverRandom; 343 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 356 if ((err = SSLHashMD5.update(&hashCtx, &serverRandom)) ! 579 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local 658 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local [all...] |
H A D | tls1Callouts.c | 300 memmove(seedBuf + PLS_KEY_EXPAND_LEN, ctx->serverRandom, 318 * On entry: clientRandom, serverRandom, preMasterSecret valid 334 ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE);
|
H A D | sslContext.h | 328 uint8_t serverRandom[SSL_CLIENT_SRVR_RAND_SIZE]; member in struct:SSLContext 368 /* server PAC resume sets serverRandom early to allow for secret acquisition */
|
H A D | sslHandshakeHello.c | 120 /* serverRandom might have already been set, in SSLAdvanceHandshake() */ 122 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0) { 128 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0) 132 memcpy(charPtr, ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE); 374 memcpy(ctx->serverRandom, p, 32);
|
H A D | sslHandshake.c | 595 /* the master secret callback requires serverRandom, now... */ 596 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0)
|
H A D | sslContext.c | 2142 memmove(randBuf, ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | ssl3Callouts.c | 70 SSLBuffer leader, masterSecret, serverRandom, clientRandom, shaHash, md5Hash; local 85 serverRandom.data = ctx->serverRandom; 86 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 113 if ((err = SSLHashSHA1.update(&shaContext, &serverRandom)) != 0) 155 * On entry: clientRandom, serverRandom, preMasterSecret valid 163 serverRandom, shaHash, md5Hash, leader; local 175 serverRandom.data = ctx->serverRandom; 176 serverRandom [all...] |
H A D | sslKeyExchange.c | 246 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local 259 serverRandom.data = ctx->serverRandom; 260 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 290 if ((err = hashRef->update(&hashCtx, &serverRandom)) != 0) 333 SSLBuffer clientRandom,serverRandom,hashCtx, hash; local 342 serverRandom.data = ctx->serverRandom; 343 serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE; 356 if ((err = SSLHashMD5.update(&hashCtx, &serverRandom)) ! 579 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local 658 SSLBuffer hashOut, hashCtx, clientRandom, serverRandom; local [all...] |
H A D | tls1Callouts.c | 300 memmove(seedBuf + PLS_KEY_EXPAND_LEN, ctx->serverRandom, 318 * On entry: clientRandom, serverRandom, preMasterSecret valid 334 ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE);
|
H A D | sslContext.h | 328 uint8_t serverRandom[SSL_CLIENT_SRVR_RAND_SIZE]; member in struct:SSLContext 368 /* server PAC resume sets serverRandom early to allow for secret acquisition */
|
H A D | sslHandshakeHello.c | 120 /* serverRandom might have already been set, in SSLAdvanceHandshake() */ 122 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0) { 128 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0) 132 memcpy(charPtr, ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE); 374 memcpy(ctx->serverRandom, p, 32);
|
H A D | sslHandshake.c | 595 /* the master secret callback requires serverRandom, now... */ 596 if ((err = SSLEncodeRandom(ctx->serverRandom, ctx)) != 0)
|
H A D | sslContext.c | 2142 memmove(randBuf, ctx->serverRandom, SSL_CLIENT_SRVR_RAND_SIZE);
|