| /src/crypto/openssl/ssl/ |
| H A D | t1_enc.c | 98 SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 308 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 310 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_setup_key_block() 404 s->s3.client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 406 s->s3.server_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 419 BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 421 BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); in tls1_generate_master_secret() 456 vallen = llen + SSL3_RANDOM_SIZE * 2; in tls1_export_keying_material() 467 memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material() 468 currentvalpos += SSL3_RANDOM_SIZE; in tls1_export_keying_material() [all …]
|
| H A D | s3_enc.c | 56 || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 57 || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) in ssl3_generate_key_block() 406 SSL3_RANDOM_SIZE) in ssl3_generate_master_secret() 409 SSL3_RANDOM_SIZE) in ssl3_generate_master_secret()
|
| H A D | d1_lib.c | 609 if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) in DTLSv1_listen()
|
| H A D | ssl_local.h | 644 unsigned char random[SSL3_RANDOM_SIZE]; 1315 unsigned char server_random[SSL3_RANDOM_SIZE]; 1316 unsigned char client_random[SSL3_RANDOM_SIZE];
|
| H A D | ssl_lib.c | 6765 return SSL3_RANDOM_SIZE; in SSL_client_hello_get0_random() 7038 SSL3_RANDOM_SIZE, in ssl_log_secret()
|
| /src/crypto/openssl/test/ |
| H A D | bad_dtls_test.c | 49 static unsigned char client_random[SSL3_RANDOM_SIZE]; 50 static unsigned char server_random[SSL3_RANDOM_SIZE]; 233 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello() 578 server_random, SSL3_RANDOM_SIZE, in send_finished() 579 client_random, SSL3_RANDOM_SIZE, in send_finished()
|
| H A D | clienthellotest.c | 166 || !TEST_true(PACKET_forward(&pkt, CLIENT_VERSION_LEN + SSL3_RANDOM_SIZE)) in test_client_hello()
|
| H A D | servername_test.c | 61 || !TEST_true(PACKET_forward(&pkt, CLIENT_VERSION_LEN + SSL3_RANDOM_SIZE)) in get_sni_from_client_hello()
|
| H A D | sslapitest.c | 217 unsigned char actual_client_random[SSL3_RANDOM_SIZE] = { 0 }; in test_keylog_output() 218 size_t client_random_size = SSL3_RANDOM_SIZE; in test_keylog_output() 258 SSL3_RANDOM_SIZE); in test_keylog_output() 259 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 313 SSL3_RANDOM_SIZE); in test_keylog_output() 314 if (!TEST_size_t_eq(client_random_size, SSL3_RANDOM_SIZE)) in test_keylog_output() 7382 || !TEST_true(PACKET_forward(&pkt, CLIENT_VERSION_LEN + SSL3_RANDOM_SIZE)) in get_MFL_from_client_hello()
|
| /src/contrib/wpa/src/crypto/ |
| H A D | tls_openssl.c | 91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random() 93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 94 return SSL3_RANDOM_SIZE; in SSL_get_client_random() 101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random() 103 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); in SSL_get_server_random() 104 return SSL3_RANDOM_SIZE; in SSL_get_server_random() 277 unsigned char client_random[SSL3_RANDOM_SIZE]; 278 unsigned char server_random[SSL3_RANDOM_SIZE]; 1510 if (end - pos < 2 + SSL3_RANDOM_SIZE) in check_server_hello() 1512 pos += 2 + SSL3_RANDOM_SIZE; in check_server_hello() [all …]
|
| /src/crypto/openssl/ssl/statem/ |
| H A D | statem_lib.c | 1726 || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE in tls_get_message_body() 1729 SSL3_RANDOM_SIZE) in tls_get_message_body() 2391 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2403 s->s3.server_random + SSL3_RANDOM_SIZE in ssl_choose_client_version() 2798 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs() 2805 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2806 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2808 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
|
| H A D | statem_clnt.c | 1263 || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { in tls_construct_client_hello() 1490 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE in tls_process_server_hello() 1491 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello() 1503 if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 1508 if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { in tls_process_server_hello() 3358 SSL3_RANDOM_SIZE) in tls_construct_cke_gost() 3361 SSL3_RANDOM_SIZE) in tls_construct_cke_gost() 3432 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3433 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
|
| H A D | statem_srvr.c | 1620 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello() 1621 ? SSL3_RANDOM_SIZE in tls_process_client_hello() 1623 memset(clienthello->random, 0, SSL3_RANDOM_SIZE); in tls_process_client_hello() 1625 clienthello->random + SSL3_RANDOM_SIZE - challenge_len, challenge_len) in tls_process_client_hello() 1635 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) in tls_process_client_hello() 1753 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); in tls_early_post_process_client_hello() 1995 if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { in tls_early_post_process_client_hello() 2448 SSL3_RANDOM_SIZE)) { in tls_construct_server_hello()
|
| H A D | extensions_srvr.c | 35 #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \ 1157 || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) in tls_parse_ctos_cookie()
|
| /src/crypto/openssl/include/openssl/ |
| H A D | ssl3.h | 137 #define SSL3_RANDOM_SIZE 32 macro
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_get_client_random.pod | 68 (and also server_random) is always SSL3_RANDOM_SIZE bytes. Support for
|
| H A D | SSL_CTX_set_client_hello_cb.pod | 47 SSL3_RANDOM_SIZE bytes with zeros if needed. For SSLv2 format ClientHellos,
|