Searched refs:premaster (Results 1 - 8 of 8) sorted by relevance
/third_party/mbedtls/library/ |
H A D | ssl_tls12_server.c | 3382 * Receive G^Y mod P, premaster = (G^Y)^X mod P in ssl_parse_client_dh_public() 3462 * Prepare to decrypt the premaster using own private RSA key in ssl_decrypt_encrypted_pms() 3480 * Decrypt the premaster secret in ssl_decrypt_encrypted_pms() 3525 unsigned char *pms = ssl->handshake->premaster + pms_offset; in ssl_parse_encrypted_pms() 3569 * successful. In particular, always generate the fake premaster secret, in ssl_parse_encrypted_pms() 3585 if (sizeof(ssl->handshake->premaster) < pms_offset || in ssl_parse_encrypted_pms() 3586 sizeof(ssl->handshake->premaster) - pms_offset < 48) { in ssl_parse_encrypted_pms() 3710 ssl->handshake->premaster, in ssl_parse_client_key_exchange() 3768 handshake->premaster, sizeof(handshake->premaster), in ssl_parse_client_key_exchange() [all...] |
H A D | ssl_tls12_client.c | 1916 unsigned char *p = ssl->handshake->premaster + pms_offset; in ssl_write_encrypted_pms() 2737 ssl->handshake->premaster, in ssl_write_client_key_exchange() 2811 /* The ECDH secret is the premaster secret used for key derivation. */ in ssl_write_client_key_exchange() 2818 ssl->handshake->premaster, in ssl_write_client_key_exchange() 2819 sizeof(ssl->handshake->premaster), in ssl_write_client_key_exchange() 2874 ssl->handshake->premaster, in ssl_write_client_key_exchange() 2983 /* As RFC 5489 section 2, the premaster secret is formed as follows: in ssl_write_client_key_exchange() 2989 unsigned char *pms = ssl->handshake->premaster; in ssl_write_client_key_exchange() 2991 sizeof(ssl->handshake->premaster); in ssl_write_client_key_exchange() 3089 unsigned char *pms = ssl->handshake->premaster; in ssl_write_client_key_exchange() [all...] |
H A D | ssl_tls.c | 6998 * [in] resume, premaster, extended_ms, calc_verify, tls_prf 7000 * [out] premaster (cleared) 7047 MBEDTLS_SSL_DEBUG_MSG(3, ("no premaster (session resumed)")); in ssl_compute_master() 7091 * Other secret is stored in premaster, where first 2 bytes hold the in ssl_compute_master() 7097 other_secret = handshake->premaster + 2; in ssl_compute_master() 7101 other_secret_len = MBEDTLS_GET_UINT16_BE(handshake->premaster, 0); in ssl_compute_master() 7102 other_secret = handshake->premaster + 2; in ssl_compute_master() 7167 handshake->premaster, in ssl_compute_master() 7180 ret = handshake->tls_prf(handshake->premaster, handshake->pmslen, in ssl_compute_master() 7189 MBEDTLS_SSL_DEBUG_BUF(3, "premaster secre in ssl_compute_master() [all...] |
H A D | ssl_misc.h | 989 unsigned char premaster[MBEDTLS_PREMASTER_SIZE]; member 990 /*!< premaster secret */ 991 size_t pmslen; /*!< premaster length */
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_lib.c | 5691 const uint8_t *premaster, in ssl_log_rsa_client_key_exchange() 5699 /* We only want the first 8 bytes of the encrypted premaster as a tag. */ in ssl_log_rsa_client_key_exchange() 5704 premaster, in ssl_log_rsa_client_key_exchange() 5688 ssl_log_rsa_client_key_exchange(SSL *ssl, const uint8_t *encrypted_premaster, size_t encrypted_premaster_len, const uint8_t *premaster, size_t premaster_len) ssl_log_rsa_client_key_exchange() argument
|
H A D | ssl_local.h | 1363 /* Temporary storage for premaster secret */ 2787 * ssl_log_rsa_client_key_exchange logs |premaster| to the SSL_CTX associated 2795 const uint8_t *premaster,
|
/third_party/openssl/ssl/ |
H A D | ssl_lib.c | 5575 const uint8_t *premaster, in ssl_log_rsa_client_key_exchange() 5583 /* We only want the first 8 bytes of the encrypted premaster as a tag. */ in ssl_log_rsa_client_key_exchange() 5588 premaster, in ssl_log_rsa_client_key_exchange() 5572 ssl_log_rsa_client_key_exchange(SSL *ssl, const uint8_t *encrypted_premaster, size_t encrypted_premaster_len, const uint8_t *premaster, size_t premaster_len) ssl_log_rsa_client_key_exchange() argument
|
H A D | ssl_local.h | 1339 /* Temporary storage for premaster secret */ 2731 * ssl_log_rsa_client_key_exchange logs |premaster| to the SSL_CTX associated 2739 const uint8_t *premaster,
|
Completed in 68 milliseconds