Lines Matching refs:pms
1248 Array<uint8_t> pms; in do_send_client_key_exchange() local
1312 if (!pms.Init(SSL_MAX_MASTER_KEY_LENGTH)) { in do_send_client_key_exchange()
1322 pms[0] = hs->client_version >> 8; in do_send_client_key_exchange()
1323 pms[1] = hs->client_version & 0xff; in do_send_client_key_exchange()
1324 if (!RAND_bytes(&pms[2], SSL_MAX_MASTER_KEY_LENGTH - 2)) { in do_send_client_key_exchange()
1333 !RSA_encrypt(rsa, &enc_pms_len, ptr, RSA_size(rsa), pms.data(), in do_send_client_key_exchange()
1334 pms.size(), RSA_PKCS1_PADDING) || in do_send_client_key_exchange()
1348 if (!hs->key_shares[0]->Accept(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange()
1363 if (!pms.Init(psk_len)) { in do_send_client_key_exchange()
1366 OPENSSL_memset(pms.data(), 0, pms.size()); in do_send_client_key_exchange()
1378 if (!CBB_init(pms_cbb.get(), 2 + psk_len + 2 + pms.size()) || in do_send_client_key_exchange()
1380 !CBB_add_bytes(&child, pms.data(), pms.size()) || in do_send_client_key_exchange()
1383 !CBBFinishArray(pms_cbb.get(), &pms)) { in do_send_client_key_exchange()
1396 tls1_generate_master_secret(hs, hs->new_session->master_key, pms); in do_send_client_key_exchange()