Home | History | Annotate | Download | only in ssl

Lines Matching refs:s3

288 	ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
290 s->s3->server_random,SSL3_RANDOM_SIZE,
291 s->s3->client_random,SSL3_RANDOM_SIZE,
333 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
334 c=s->s3->tmp.new_sym_enc;
335 m=s->s3->tmp.new_hash;
336 mac_type = s->s3->tmp.new_mac_pkey_type;
338 comp=s->s3->tmp.new_compression;
340 key_block=s->s3->tmp.key_block;
345 s->s3->tmp.new_cipher->algorithm_mkey,
346 s->s3->tmp.new_cipher->algorithm_auth,
351 printf("\tkey_block: len= %d, data= ", s->s3->tmp.key_block_length);
354 for (i=0; i<s->s3->tmp.key_block_length; i++)
361 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
389 if (s->s3->rrec.comp == NULL)
390 s->s3->rrec.comp=(unsigned char *)
392 if (s->s3->rrec.comp == NULL)
398 memset(&(s->s3->read_sequence[0]),0,8);
399 mac_secret= &(s->s3->read_mac_secret[0]);
400 mac_secret_size=&(s->s3->read_mac_secret_size);
404 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
435 memset(&(s->s3->write_sequence[0]),0,8);
436 mac_secret= &(s->s3->write_mac_secret[0]);
437 mac_secret_size = &(s->s3->write_mac_secret_size);
443 p=s->s3->tmp.key_block;
444 i=*mac_secret_size=s->s3->tmp.new_mac_secret_size;
447 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
448 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
451 er1= &(s->s3->client_random[0]);
452 er2= &(s->s3->server_random[0]);
474 if (n > s->s3->tmp.key_block_length)
494 if (!tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
496 s->s3->client_random,SSL3_RANDOM_SIZE,
497 s->s3->server_random,SSL3_RANDOM_SIZE,
505 if (!tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
507 s->s3->client_random,SSL3_RANDOM_SIZE,
508 s->s3->server_random,SSL3_RANDOM_SIZE,
565 if (s->s3->tmp.key_block_length != 0)
574 s->s3->tmp.new_sym_enc=c;
575 s->s3->tmp.new_hash=hash;
576 s->s3->tmp.new_mac_pkey_type = mac_type;
577 s->s3->tmp.new_mac_secret_size = mac_secret_size;
589 s->s3->tmp.key_block_length=num;
590 s->s3->tmp.key_block=p1;
600 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); }
602 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->server_random[z],((z+1)%16)?' ':'\n'); }
618 s->s3->need_empty_fragments = 1;
623 s->s3->need_empty_fragments = 0;
627 s->s3->need_empty_fragments = 0;
658 rec= &(s->s3->wrec);
672 rec= &(s->s3->rrec);
704 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
767 if ((memcmp(s->s3->read_sequence,
769 s->s3->flags|=TLS1_FLAGS_TLS_PADDING_BUG;
770 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
802 if (s->s3->handshake_buffer)
808 if (s->s3->handshake_dgst[i]&&EVP_MD_CTX_type(s->s3->handshake_dgst[i])==md_nid)
810 d=s->s3->handshake_dgst[i];
840 if (s->s3->handshake_buffer)
848 if (mask & s->s3->tmp.new_cipher->algorithm2)
858 EVP_MD_CTX_copy_ex(&ctx,s->s3->handshake_dgst[idx]);
867 if (!tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
894 rec= &(ssl->s3->wrec);
895 mac_sec= &(ssl->s3->write_mac_secret[0]);
896 seq= &(ssl->s3->write_sequence[0]);
901 rec= &(ssl->s3->rrec);
902 mac_sec= &(ssl->s3->read_mac_secret[0]);
903 seq= &(ssl->s3->read_sequence[0]);
984 if (s->s3->client_opaque_prf_input != NULL && s->s3->server_opaque_prf_input != NULL &&
985 s->s3->client_opaque_prf_input_len > 0 &&
986 s->s3->client_opaque_prf_input_len == s->s3->server_opaque_prf_input_len)
988 co = s->s3->client_opaque_prf_input;
989 col = s->s3->server_opaque_prf_input_len;
990 so = s->s3->server_opaque_prf_input;
991 sol = s->s3->client_opaque_prf_input_len; /* must be same as col (see draft-rescorla-tls-opaque-prf-input-00.txt, section 3.1) */
995 tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
997 s->s3->client_random,SSL3_RANDOM_SIZE,
999 s->s3->server_random,SSL3_RANDOM_SIZE,