Lines Matching refs:s3
300 s->s3->server_random,SSL3_RANDOM_SIZE, in tls1_generate_key_block()
301 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_key_block()
343 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); in tls1_change_cipher_state()
344 c=s->s3->tmp.new_sym_enc; in tls1_change_cipher_state()
345 m=s->s3->tmp.new_hash; in tls1_change_cipher_state()
346 mac_type = s->s3->tmp.new_mac_pkey_type; in tls1_change_cipher_state()
348 comp=s->s3->tmp.new_compression; in tls1_change_cipher_state()
354 s->s3->tmp.new_cipher->algorithm_mkey, in tls1_change_cipher_state()
355 s->s3->tmp.new_cipher->algorithm_auth, in tls1_change_cipher_state()
360 printf("\tkey_block: len= %d, data= ", s->s3->tmp.key_block_length); in tls1_change_cipher_state()
363 for (i=0; i<s->s3->tmp.key_block_length; i++) in tls1_change_cipher_state()
364 printf("%02x", s->s3->tmp.key_block[i]); printf("\n"); in tls1_change_cipher_state()
370 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state()
398 if (s->s3->rrec.comp == NULL) in tls1_change_cipher_state()
399 s->s3->rrec.comp=(unsigned char *) in tls1_change_cipher_state()
401 if (s->s3->rrec.comp == NULL) in tls1_change_cipher_state()
407 memset(&(s->s3->read_sequence[0]),0,8); in tls1_change_cipher_state()
408 mac_secret= &(s->s3->read_mac_secret[0]); in tls1_change_cipher_state()
409 mac_secret_size=&(s->s3->read_mac_secret_size); in tls1_change_cipher_state()
413 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state()
444 memset(&(s->s3->write_sequence[0]),0,8); in tls1_change_cipher_state()
445 mac_secret= &(s->s3->write_mac_secret[0]); in tls1_change_cipher_state()
446 mac_secret_size = &(s->s3->write_mac_secret_size); in tls1_change_cipher_state()
452 p=s->s3->tmp.key_block; in tls1_change_cipher_state()
453 i=*mac_secret_size=s->s3->tmp.new_mac_secret_size; in tls1_change_cipher_state()
456 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? in tls1_change_cipher_state()
457 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl; in tls1_change_cipher_state()
485 if (n > s->s3->tmp.key_block_length) in tls1_change_cipher_state()
511 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state()
512 s->s3->server_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state()
522 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state()
523 s->s3->server_random,SSL3_RANDOM_SIZE, in tls1_change_cipher_state()
592 if (s->s3->tmp.key_block_length != 0) in tls1_setup_key_block()
601 s->s3->tmp.new_sym_enc=c; in tls1_setup_key_block()
602 s->s3->tmp.new_hash=hash; in tls1_setup_key_block()
603 s->s3->tmp.new_mac_pkey_type = mac_type; in tls1_setup_key_block()
604 s->s3->tmp.new_mac_secret_size = mac_secret_size; in tls1_setup_key_block()
616 s->s3->tmp.key_block_length=num; in tls1_setup_key_block()
617 s->s3->tmp.key_block=p1; in tls1_setup_key_block()
627 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':… in tls1_setup_key_block()
629 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->server_random[z],((z+1)%16)?' ':… in tls1_setup_key_block()
646 s->s3->need_empty_fragments = 1; in tls1_setup_key_block()
651 s->s3->need_empty_fragments = 0; in tls1_setup_key_block()
655 s->s3->need_empty_fragments = 0; in tls1_setup_key_block()
695 rec= &(s->s3->wrec); in tls1_enc()
730 rec= &(s->s3->rrec); in tls1_enc()
756 seq = send?s->s3->write_sequence:s->s3->read_sequence; in tls1_enc()
798 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG) in tls1_enc()
869 if (s->s3->handshake_buffer) in tls1_cert_verify_mac()
875 if (s->s3->handshake_dgst[i]&&EVP_MD_CTX_type(s->s3->handshake_dgst[i])==md_nid) in tls1_cert_verify_mac()
877 d=s->s3->handshake_dgst[i]; in tls1_cert_verify_mac()
907 if (s->s3->handshake_buffer) in tls1_final_finish_mac()
925 EVP_MD_CTX_copy_ex(&ctx,s->s3->handshake_dgst[idx]); in tls1_final_finish_mac()
961 rec= &(ssl->s3->wrec); in tls1_mac()
962 seq= &(ssl->s3->write_sequence[0]); in tls1_mac()
967 rec= &(ssl->s3->rrec); in tls1_mac()
968 seq= &(ssl->s3->read_sequence[0]); in tls1_mac()
1022 ssl->s3->read_mac_secret, in tls1_mac()
1023 ssl->s3->read_mac_secret_size, in tls1_mac()
1082 if (s->s3->client_opaque_prf_input != NULL && s->s3->server_opaque_prf_input != NULL && in tls1_generate_master_secret()
1083 s->s3->client_opaque_prf_input_len > 0 && in tls1_generate_master_secret()
1084 s->s3->client_opaque_prf_input_len == s->s3->server_opaque_prf_input_len) in tls1_generate_master_secret()
1086 co = s->s3->client_opaque_prf_input; in tls1_generate_master_secret()
1087 col = s->s3->server_opaque_prf_input_len; in tls1_generate_master_secret()
1088 so = s->s3->server_opaque_prf_input; in tls1_generate_master_secret()
1089 …sol = s->s3->client_opaque_prf_input_len; /* must be same as col (see draft-rescorla-tls-opaque-pr… in tls1_generate_master_secret()
1095 s->s3->client_random,SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
1097 s->s3->server_random,SSL3_RANDOM_SIZE, in tls1_generate_master_secret()
1105 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret()
1107 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret()
1150 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
1152 memcpy(val + currentvalpos, s->s3->server_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
1181 rv = tls1_PRF(s->s3->tmp.new_cipher->algorithm2, in tls1_export_keying_material()