Lines Matching defs:hash
29 * |datalen| (e.g. typically a hash of the handshake messages), derive a new
262 unsigned char hash[EVP_MAX_MD_SIZE];
278 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) {
296 params, key, hashlen, hash, hashlen,
310 * for initialising the cipher and hash. Returns 1 on success or 0 on failure.
315 const EVP_MD *hash;
318 if (!ssl_cipher_get_evp(s->ctx, s->session, &c, &hash, NULL, NULL, NULL,
328 s->s3.tmp.new_hash = hash;
336 const unsigned char *hash,
353 if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen,
428 unsigned char *hash = hashval;
572 * The handshake hash used for the server read/client write handshake
573 * traffic secret is the same as the hash for the server
580 hash = s->handshake_traffic_hash;
588 * Finished hash. We do not include the client's Finished, which is
592 hash = s->server_finished_hash;
622 * Save the hash of handshakes up to now for use when we calculate the
634 * hash for the whole handshake including the Client Finished
651 insecret, hash, label, labellen, secret, key,
663 hash, hashlen, s->exporter_master_secret,
830 unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE];
844 || EVP_DigestFinal_ex(ctx, hash, &hashsize) <= 0
851 sizeof(exporterlabel) - 1, hash, hashsize,
872 unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE];
891 * Calculate the hash value and store it in |data|. The reason why
903 * Here Transcript-Hash is the cipher suite hash algorithm.
908 || EVP_DigestFinal_ex(ctx, hash, &hashsize) <= 0
915 sizeof(exporterlabel) - 1, hash, hashsize,