Lines Matching refs:pms

2831     unsigned char *pms = NULL;
2849 pms = OPENSSL_malloc(pmslen);
2850 if (pms == NULL) {
2855 pms[0] = s->client_version >> 8;
2856 pms[1] = s->client_version & 0xff;
2857 if (RAND_bytes_ex(s->ctx->libctx, pms + 2, pmslen - 2, 0) <= 0) {
2870 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) {
2875 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) {
2889 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
2894 s->s3.tmp.pms = pms;
2899 OPENSSL_clear_free(pms, pmslen);
3023 unsigned char *pms = NULL;
3054 pms = OPENSSL_malloc(pmslen);
3055 if (pms == NULL) {
3063 || RAND_bytes_ex(s->ctx->libctx, pms, pmslen, 0) <= 0) {
3094 if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, pms, pmslen) <= 0) {
3107 s->s3.tmp.pms = pms;
3113 OPENSSL_clear_free(pms, pmslen);
3166 unsigned char *pms = NULL;
3183 pms = OPENSSL_malloc(pmslen);
3184 if (pms == NULL) {
3189 if (RAND_bytes_ex(s->ctx->libctx, pms, pmslen, 0) <= 0) {
3228 if (EVP_PKEY_encrypt(pkey_ctx, NULL, &msglen, pms, pmslen) <= 0) {
3234 || EVP_PKEY_encrypt(pkey_ctx, encdata, &msglen, pms, pmslen) <= 0) {
3241 s->s3.tmp.pms = pms;
3247 OPENSSL_clear_free(pms, pmslen);
3321 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen);
3322 s->s3.tmp.pms = NULL;
3334 unsigned char *pms = NULL;
3337 pms = s->s3.tmp.pms;
3351 if (pms == NULL && !(s->s3.tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
3355 if (!ssl_generate_master_secret(s, pms, pmslen, 1)) {
3357 /* ssl_generate_master_secret frees the pms even on error */
3358 pms = NULL;
3362 pms = NULL;
3397 OPENSSL_clear_free(pms, pmslen);
3398 s->s3.tmp.pms = NULL;