/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s23_clnt.c | 241 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) 302 if (SSL3_RANDOM_SIZE < ch_len) 303 i=SSL3_RANDOM_SIZE; 307 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); 308 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) 311 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 335 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 336 p += SSL3_RANDOM_SIZE; 460 i=(SSL3_RANDOM_SIZE < ch_len) 461 ?SSL3_RANDOM_SIZE [all...] |
H A D | t1_enc.c | 192 unsigned char buf[SSL3_RANDOM_SIZE*2+ 199 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE); 200 p+=SSL3_RANDOM_SIZE; 201 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); 202 p+=SSL3_RANDOM_SIZE; 225 SSL3_RANDOM_SIZE*2]; 386 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); 387 p+=SSL3_RANDOM_SIZE; 388 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE); 389 p+=SSL3_RANDOM_SIZE; [all...] |
H A D | s23_srvr.c | 437 i=(cl > SSL3_RANDOM_SIZE)?SSL3_RANDOM_SIZE:cl; 438 memset(d,0,SSL3_RANDOM_SIZE); 439 memcpy(&(d[SSL3_RANDOM_SIZE-i]),&(p[csl+sil]),i); 440 d+=SSL3_RANDOM_SIZE;
|
H A D | s3_enc.c | 167 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE); 168 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 330 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 331 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE); 338 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 339 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE); 673 SSL3_RANDOM_SIZE); 675 SSL3_RANDOM_SIZE);
|
H A D | ssl3.h | 244 #define SSL3_RANDOM_SIZE 32 macro 344 unsigned char server_random[SSL3_RANDOM_SIZE]; 345 unsigned char client_random[SSL3_RANDOM_SIZE];
|
H A D | d1_srvr.c | 671 RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-sizeof(Time)); 679 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE); 680 p+=SSL3_RANDOM_SIZE; 937 EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); 938 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); 961 EVP_SignUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); 962 EVP_SignUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
|
H A D | s3_clnt.c | 546 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) 557 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); 558 p+=SSL3_RANDOM_SIZE; 680 memcpy(s->s3->server_random,p,SSL3_RANDOM_SIZE); 681 p+=SSL3_RANDOM_SIZE; 1338 EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); 1339 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); 1368 EVP_VerifyUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); 1369 EVP_VerifyUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); 1386 EVP_VerifyUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); [all...] |
H A D | s3_srvr.c | 715 memcpy(s->s3->client_random,p,SSL3_RANDOM_SIZE); 716 p+=SSL3_RANDOM_SIZE; 1045 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) 1054 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE); 1055 p+=SSL3_RANDOM_SIZE; 1468 EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); 1469 EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); 1492 EVP_SignUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); 1493 EVP_SignUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); 1511 EVP_SignUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); [all...] |
H A D | d1_clnt.c | 549 RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-sizeof(Time)); 559 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); 560 p+=SSL3_RANDOM_SIZE;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s23_clnt.c | 387 if (ssl_fill_hello_random(s, 0, p, SSL3_RANDOM_SIZE) <= 0) 458 * Note that ch_len must be <= SSL3_RANDOM_SIZE (32), because it 463 if (SSL3_RANDOM_SIZE < ch_len) 464 i = SSL3_RANDOM_SIZE; 468 memset(&(s->s3->client_random[0]), 0, SSL3_RANDOM_SIZE); 470 (&(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i) <= 0) 473 memcpy(p, &(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i); 498 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 499 p += SSL3_RANDOM_SIZE; 661 * Note that ch_len must be <= SSL3_RANDOM_SIZE (3 [all...] |
H A D | t1_enc.c | 302 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE, 530 s->s3->client_random, SSL3_RANDOM_SIZE, 531 s->s3->server_random, SSL3_RANDOM_SIZE, 540 s->s3->client_random, SSL3_RANDOM_SIZE, 541 s->s3->server_random, SSL3_RANDOM_SIZE, 683 for (z = 0; z < SSL3_RANDOM_SIZE; z++) 690 for (z = 0; z < SSL3_RANDOM_SIZE; z++) 1166 s->s3->client_random, SSL3_RANDOM_SIZE, local 1168 s->s3->server_random, SSL3_RANDOM_SIZE, local 1175 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); local 1177 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE); local [all...] |
H A D | s23_srvr.c | 499 i = (cl > SSL3_RANDOM_SIZE) ? SSL3_RANDOM_SIZE : cl; 500 memset(d, 0, SSL3_RANDOM_SIZE); 501 memcpy(&(d[SSL3_RANDOM_SIZE - i]), &(p[csl + sil]), i); 502 d += SSL3_RANDOM_SIZE;
|
H A D | s3_enc.c | 193 EVP_DigestUpdate(&s1, s->s3->server_random, SSL3_RANDOM_SIZE); 194 EVP_DigestUpdate(&s1, s->s3->client_random, SSL3_RANDOM_SIZE); 365 EVP_DigestUpdate(&md, er1, SSL3_RANDOM_SIZE); 366 EVP_DigestUpdate(&md, er2, SSL3_RANDOM_SIZE); 372 EVP_DigestUpdate(&md, er1, SSL3_RANDOM_SIZE); 373 EVP_DigestUpdate(&md, er2, SSL3_RANDOM_SIZE); 865 SSL3_RANDOM_SIZE) <= 0 867 SSL3_RANDOM_SIZE) <= 0 888 s->s3->client_random, SSL3_RANDOM_SIZE, 891 s->s3->server_random, SSL3_RANDOM_SIZE, [all...] |
H A D | clienthellotest.c | 151 data += CLIENT_VERSION_LEN + SSL3_RANDOM_SIZE;
|
H A D | ssl3.h | 280 # define SSL3_RANDOM_SIZE 32 macro 490 unsigned char server_random[SSL3_RANDOM_SIZE]; 491 unsigned char client_random[SSL3_RANDOM_SIZE];
|
H A D | s3_srvr.c | 941 * 2 bytes for client version, SSL3_RANDOM_SIZE bytes for random, 1 byte 944 if (n < 2 + SSL3_RANDOM_SIZE + 1) { 981 session_length = *(p + SSL3_RANDOM_SIZE); 983 if (p + SSL3_RANDOM_SIZE + session_length + 1 >= d + n) { 988 cookie_length = *(p + SSL3_RANDOM_SIZE + session_length + 1); 995 memcpy(s->s3->client_random, p, SSL3_RANDOM_SIZE); 996 p += SSL3_RANDOM_SIZE; 1253 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE) <= 0) { 1498 if (ssl_fill_hello_random(s, 1, p, SSL3_RANDOM_SIZE) <= 0) { 1510 memcpy(p, s->s3->server_random, SSL3_RANDOM_SIZE); [all...] |
H A D | s3_clnt.c | 800 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 801 p += SSL3_RANDOM_SIZE; 974 memcpy(s->s3->server_random, p, SSL3_RANDOM_SIZE); 975 p += SSL3_RANDOM_SIZE; 1963 SSL3_RANDOM_SIZE) <= 0 1965 SSL3_RANDOM_SIZE) <= 0 1993 SSL3_RANDOM_SIZE) <= 0 1995 SSL3_RANDOM_SIZE) <= 0 3022 SSL3_RANDOM_SIZE) <= 0 3024 SSL3_RANDOM_SIZE) < [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s23_clnt.c | 387 if (ssl_fill_hello_random(s, 0, p, SSL3_RANDOM_SIZE) <= 0) 458 * Note that ch_len must be <= SSL3_RANDOM_SIZE (32), because it 463 if (SSL3_RANDOM_SIZE < ch_len) 464 i = SSL3_RANDOM_SIZE; 468 memset(&(s->s3->client_random[0]), 0, SSL3_RANDOM_SIZE); 470 (&(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i) <= 0) 473 memcpy(p, &(s->s3->client_random[SSL3_RANDOM_SIZE - i]), i); 498 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 499 p += SSL3_RANDOM_SIZE; 661 * Note that ch_len must be <= SSL3_RANDOM_SIZE (3 [all...] |
H A D | t1_enc.c | 302 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE, 530 s->s3->client_random, SSL3_RANDOM_SIZE, 531 s->s3->server_random, SSL3_RANDOM_SIZE, 540 s->s3->client_random, SSL3_RANDOM_SIZE, 541 s->s3->server_random, SSL3_RANDOM_SIZE, 683 for (z = 0; z < SSL3_RANDOM_SIZE; z++) 690 for (z = 0; z < SSL3_RANDOM_SIZE; z++) 1166 s->s3->client_random, SSL3_RANDOM_SIZE, local 1168 s->s3->server_random, SSL3_RANDOM_SIZE, local 1175 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); local 1177 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE); local [all...] |
H A D | s23_srvr.c | 499 i = (cl > SSL3_RANDOM_SIZE) ? SSL3_RANDOM_SIZE : cl; 500 memset(d, 0, SSL3_RANDOM_SIZE); 501 memcpy(&(d[SSL3_RANDOM_SIZE - i]), &(p[csl + sil]), i); 502 d += SSL3_RANDOM_SIZE;
|
H A D | s3_enc.c | 193 EVP_DigestUpdate(&s1, s->s3->server_random, SSL3_RANDOM_SIZE); 194 EVP_DigestUpdate(&s1, s->s3->client_random, SSL3_RANDOM_SIZE); 365 EVP_DigestUpdate(&md, er1, SSL3_RANDOM_SIZE); 366 EVP_DigestUpdate(&md, er2, SSL3_RANDOM_SIZE); 372 EVP_DigestUpdate(&md, er1, SSL3_RANDOM_SIZE); 373 EVP_DigestUpdate(&md, er2, SSL3_RANDOM_SIZE); 865 SSL3_RANDOM_SIZE) <= 0 867 SSL3_RANDOM_SIZE) <= 0 888 s->s3->client_random, SSL3_RANDOM_SIZE, 891 s->s3->server_random, SSL3_RANDOM_SIZE, [all...] |
H A D | clienthellotest.c | 151 data += CLIENT_VERSION_LEN + SSL3_RANDOM_SIZE;
|
H A D | ssl3.h | 280 # define SSL3_RANDOM_SIZE 32 macro 490 unsigned char server_random[SSL3_RANDOM_SIZE]; 491 unsigned char client_random[SSL3_RANDOM_SIZE];
|
H A D | s3_srvr.c | 941 * 2 bytes for client version, SSL3_RANDOM_SIZE bytes for random, 1 byte 944 if (n < 2 + SSL3_RANDOM_SIZE + 1) { 981 session_length = *(p + SSL3_RANDOM_SIZE); 983 if (p + SSL3_RANDOM_SIZE + session_length + 1 >= d + n) { 988 cookie_length = *(p + SSL3_RANDOM_SIZE + session_length + 1); 995 memcpy(s->s3->client_random, p, SSL3_RANDOM_SIZE); 996 p += SSL3_RANDOM_SIZE; 1253 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE) <= 0) { 1498 if (ssl_fill_hello_random(s, 1, p, SSL3_RANDOM_SIZE) <= 0) { 1510 memcpy(p, s->s3->server_random, SSL3_RANDOM_SIZE); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl3.h | 244 #define SSL3_RANDOM_SIZE 32 macro 344 unsigned char server_random[SSL3_RANDOM_SIZE]; 345 unsigned char client_random[SSL3_RANDOM_SIZE];
|