/external/boringssl/src/ssl/ |
ssl_transcript.cc | 305 EVP_DigestUpdate(&ctx, session->master_key, session->master_key_length); 314 EVP_DigestUpdate(&ctx, session->master_key, session->master_key_length); 398 session->master_key, session->master_key_length, label,
|
tls13_enc.cc | 275 hs->new_session->master_key_length = hs->hash_len; 277 hs, hs->new_session->master_key, hs->new_session->master_key_length, 399 ssl->session->master_key_length, context, context_len, 434 session->master_key, session->master_key_length,
|
t1_enc.cc | 454 SSL_get_session(ssl)->master_key_length, 467 SSL_get_session(ssl)->master_key_length, 558 SSL_get_session(ssl)->master_key_length, label, label_len,
|
ssl_session.cc | 197 new_session->master_key_length = session->master_key_length; 199 session->master_key_length); 415 /* TODO(davidben): Fix master_key_length's type and remove these casts. */ 417 return (size_t)session->master_key_length; 419 if (max_out > (size_t)session->master_key_length) { 420 max_out = (size_t)session->master_key_length; [all...] |
ssl_asn1.cc | 217 !CBB_add_bytes(&child, in->master_key, in->master_key_length) || 627 ret->master_key_length = CBS_len(&master_key);
|
handshake_client.cc | 213 ssl->session->master_key_length) || [all...] |
s3_both.cc | 393 session->master_key_length)) {
|
tls13_client.cc | 303 hs->new_session->master_key_length)) {
|
handshake_server.cc | [all...] |
tls13_server.cc | 447 hs->new_session->master_key_length)) {
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 94 if (!session || session->master_key_length < 0 || 95 (size_t) session->master_key_length > outlen) 97 if ((size_t) session->master_key_length < outlen) 98 outlen = session->master_key_length; [all...] |
/external/boringssl/src/include/openssl/ |
ssl.h | 3976 int master_key_length; member in struct:ssl_session_st [all...] |