Home | History | Annotate | Download | only in ssl

Lines Matching refs:s3

300 		 s->s3->server_random,SSL3_RANDOM_SIZE,
301 s->s3->client_random,SSL3_RANDOM_SIZE,
343 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
344 c=s->s3->tmp.new_sym_enc;
345 m=s->s3->tmp.new_hash;
346 mac_type = s->s3->tmp.new_mac_pkey_type;
348 comp=s->s3->tmp.new_compression;
354 s->s3->tmp.new_cipher->algorithm_mkey,
355 s->s3->tmp.new_cipher->algorithm_auth,
360 printf("\tkey_block: len= %d, data= ", s->s3->tmp.key_block_length);
363 for (i=0; i<s->s3->tmp.key_block_length; i++)
370 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
398 if (s->s3->rrec.comp == NULL)
399 s->s3->rrec.comp=(unsigned char *)
401 if (s->s3->rrec.comp == NULL)
407 memset(&(s->s3->read_sequence[0]),0,8);
408 mac_secret= &(s->s3->read_mac_secret[0]);
409 mac_secret_size=&(s->s3->read_mac_secret_size);
413 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
444 memset(&(s->s3->write_sequence[0]),0,8);
445 mac_secret= &(s->s3->write_mac_secret[0]);
446 mac_secret_size = &(s->s3->write_mac_secret_size);
452 p=s->s3->tmp.key_block;
453 i=*mac_secret_size=s->s3->tmp.new_mac_secret_size;
456 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
457 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
485 if (n > s->s3->tmp.key_block_length)
511 s->s3->client_random,SSL3_RANDOM_SIZE,
512 s->s3->server_random,SSL3_RANDOM_SIZE,
522 s->s3->client_random,SSL3_RANDOM_SIZE,
523 s->s3->server_random,SSL3_RANDOM_SIZE,
592 if (s->s3->tmp.key_block_length != 0)
601 s->s3->tmp.new_sym_enc=c;
602 s->s3->tmp.new_hash=hash;
603 s->s3->tmp.new_mac_pkey_type = mac_type;
604 s->s3->tmp.new_mac_secret_size = mac_secret_size;
616 s->s3->tmp.key_block_length=num;
617 s->s3->tmp.key_block=p1;
627 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); }
629 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->server_random[z],((z+1)%16)?' ':'\n'); }
646 s->s3->need_empty_fragments = 1;
651 s->s3->need_empty_fragments = 0;
655 s->s3->need_empty_fragments = 0;
686 rec= &(s->s3->wrec);
721 rec= &(s->s3->rrec);
747 seq = send?s->s3->write_sequence:s->s3->read_sequence;
789 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
864 if ((memcmp(s->s3->read_sequence,
866 s->s3->flags|=TLS1_FLAGS_TLS_PADDING_BUG;
867 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
910 if (s->s3->handshake_buffer)
916 if (s->s3->handshake_dgst[i]&&EVP_MD_CTX_type(s->s3->handshake_dgst[i])==md_nid)
918 d=s->s3->handshake_dgst[i];
948 if (s->s3->handshake_buffer)
966 EVP_MD_CTX_copy_ex(&ctx,s->s3->handshake_dgst[idx]);
1002 rec= &(ssl->s3->wrec);
1003 seq= &(ssl->s3->write_sequence[0]);
1008 rec= &(ssl->s3->rrec);
1009 seq= &(ssl->s3->read_sequence[0]);
1091 if (s->s3->client_opaque_prf_input != NULL && s->s3->server_opaque_prf_input != NULL &&
1092 s->s3->client_opaque_prf_input_len > 0 &&
1093 s->s3->client_opaque_prf_input_len == s->s3->server_opaque_prf_input_len)
1095 co = s->s3->client_opaque_prf_input;
1096 col = s->s3->server_opaque_prf_input_len;
1097 so = s->s3->server_opaque_prf_input;
1098 sol = s->s3->client_opaque_prf_input_len; /* must be same as col (see draft-rescorla-tls-opaque-prf-input-00.txt, section 3.1) */
1104 s->s3->client_random,SSL3_RANDOM_SIZE,
1106 s->s3->server_random,SSL3_RANDOM_SIZE,
1114 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE);
1116 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE);
1159 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE);
1161 memcpy(val + currentvalpos, s->s3->server_random, SSL3_RANDOM_SIZE);
1190 rv = tls1_PRF(s->s3->tmp.new_cipher->algorithm2,