Searched refs:SSL_MAX_MASTER_KEY_LENGTH (Results 1 - 22 of 22) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dssl_asn1.c305 if (ret->master_key_length > SSL_MAX_MASTER_KEY_LENGTH)
306 ret->master_key_length=SSL_MAX_MASTER_KEY_LENGTH;
H A Dd1_clnt.c709 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
775 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
776 unsigned char epms[SSL_MAX_MASTER_KEY_LENGTH
H A Ds3_srvr.c1736 if (i != SSL_MAX_MASTER_KEY_LENGTH)
1773 i = SSL_MAX_MASTER_KEY_LENGTH;
1862 unsigned char pms[SSL_MAX_MASTER_KEY_LENGTH
1981 if (outl > SSL_MAX_MASTER_KEY_LENGTH)
1994 if (outl > SSL_MAX_MASTER_KEY_LENGTH)
H A Ds3_clnt.c1651 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
1717 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
1718 unsigned char epms[SSL_MAX_MASTER_KEY_LENGTH
H A Dssl.h248 #define SSL_MAX_MASTER_KEY_LENGTH 48 macro
433 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH];
H A Ds2_srvr.c509 if (i > SSL_MAX_MASTER_KEY_LENGTH)
H A Dt1_enc.c785 unsigned char buff[SSL_MAX_MASTER_KEY_LENGTH];
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssl_asn1.c462 if (os.length > SSL_MAX_MASTER_KEY_LENGTH)
463 ret->master_key_length = SSL_MAX_MASTER_KEY_LENGTH;
H A Dtls_srp.c232 unsigned char b[SSL_MAX_MASTER_KEY_LENGTH];
455 unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH];
H A Ds3_srvr.c2164 unsigned char rand_premaster_secret[SSL_MAX_MASTER_KEY_LENGTH];
2213 * size of a premaster secret (SSL_MAX_MASTER_KEY_LENGTH). The
2217 if (n < SSL_MAX_MASTER_KEY_LENGTH) {
2243 * decrypt_len should be SSL_MAX_MASTER_KEY_LENGTH. decrypt_good will
2247 constant_time_eq_int_8(decrypt_len, SSL_MAX_MASTER_KEY_LENGTH);
2411 unsigned char pms[SSL_MAX_MASTER_KEY_LENGTH + EVP_MAX_BLOCK_LENGTH];
2522 if (outl > SSL_MAX_MASTER_KEY_LENGTH) {
2535 if (outl > SSL_MAX_MASTER_KEY_LENGTH) {
H A Ds2_srvr.c382 unsigned char rand_premaster_secret[SSL_MAX_MASTER_KEY_LENGTH];
490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) {
H A Dssl.h224 # define SSL_MAX_MASTER_KEY_LENGTH 48 macro
505 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH];
H A Dt1_enc.c1138 unsigned char buff[SSL_MAX_MASTER_KEY_LENGTH];
H A Ds3_clnt.c2490 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
2569 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
2570 unsigned char epms[SSL_MAX_MASTER_KEY_LENGTH + EVP_MAX_IV_LENGTH];
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssl_asn1.c462 if (os.length > SSL_MAX_MASTER_KEY_LENGTH)
463 ret->master_key_length = SSL_MAX_MASTER_KEY_LENGTH;
H A Dtls_srp.c232 unsigned char b[SSL_MAX_MASTER_KEY_LENGTH];
455 unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH];
H A Ds3_srvr.c2164 unsigned char rand_premaster_secret[SSL_MAX_MASTER_KEY_LENGTH];
2213 * size of a premaster secret (SSL_MAX_MASTER_KEY_LENGTH). The
2217 if (n < SSL_MAX_MASTER_KEY_LENGTH) {
2243 * decrypt_len should be SSL_MAX_MASTER_KEY_LENGTH. decrypt_good will
2247 constant_time_eq_int_8(decrypt_len, SSL_MAX_MASTER_KEY_LENGTH);
2411 unsigned char pms[SSL_MAX_MASTER_KEY_LENGTH + EVP_MAX_BLOCK_LENGTH];
2522 if (outl > SSL_MAX_MASTER_KEY_LENGTH) {
2535 if (outl > SSL_MAX_MASTER_KEY_LENGTH) {
H A Ds2_srvr.c382 unsigned char rand_premaster_secret[SSL_MAX_MASTER_KEY_LENGTH];
490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) {
H A Dssl.h224 # define SSL_MAX_MASTER_KEY_LENGTH 48 macro
505 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH];
H A Dt1_enc.c1138 unsigned char buff[SSL_MAX_MASTER_KEY_LENGTH];
H A Ds3_clnt.c2490 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
2569 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
2570 unsigned char epms[SSL_MAX_MASTER_KEY_LENGTH + EVP_MAX_IV_LENGTH];
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl.h248 #define SSL_MAX_MASTER_KEY_LENGTH 48 macro
433 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH];

Completed in 263 milliseconds