Searched refs:key_arg (Results 1 – 18 of 18) sorted by relevance
/external/openssl/ssl/ |
D | s2_enc.c | 105 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg)); in ssl2_enc_init() 107 s->session->key_arg); in ssl2_enc_init() 109 s->session->key_arg); in ssl2_enc_init()
|
D | ssl_asn1.c | 101 ASN1_OCTET_STRING key_arg; member 204 a.key_arg.length=in->key_arg_length; in i2d_SSL_SESSION() 205 a.key_arg.type=V_ASN1_OCTET_STRING; in i2d_SSL_SESSION() 206 a.key_arg.data=in->key_arg; in i2d_SSL_SESSION() 295 M_ASN1_I2D_len_IMP_opt(&(a.key_arg),i2d_ASN1_OCTET_STRING); in i2d_SSL_SESSION() 341 M_ASN1_I2D_put_IMP_opt(&(a.key_arg),i2d_ASN1_OCTET_STRING,0); in i2d_SSL_SESSION() 485 memcpy(ret->key_arg,os.data,ret->key_arg_length); in d2i_SSL_SESSION()
|
D | ssl_txt.c | 174 if (BIO_printf(bp,"%02X",x->key_arg[i]) <= 0) goto err; in SSL_SESSION_print()
|
D | s2_clnt.c | 650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) in client_master_key() 707 if (karg > (int)sizeof(sess->key_arg)) in client_master_key() 713 memcpy(d,sess->key_arg,(unsigned int)karg); in client_master_key()
|
D | ssl_sess.c | 762 OPENSSL_cleanse(ss->key_arg,sizeof ss->key_arg); in SSL_SESSION_free()
|
D | s2_srvr.c | 440 memcpy(s->session->key_arg,&(p[s->s2->tmp.clear+s->s2->tmp.enc]), in get_client_master_key()
|
D | ssl.h | 476 unsigned char key_arg[SSL_MAX_KEY_ARG_LENGTH]; member
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
D | s2_enc.c | 105 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg)); in ssl2_enc_init() 107 s->session->key_arg); in ssl2_enc_init() 109 s->session->key_arg); in ssl2_enc_init()
|
D | ssl_asn1.c | 101 ASN1_OCTET_STRING key_arg; member 204 a.key_arg.length=in->key_arg_length; in i2d_SSL_SESSION() 205 a.key_arg.type=V_ASN1_OCTET_STRING; in i2d_SSL_SESSION() 206 a.key_arg.data=in->key_arg; in i2d_SSL_SESSION() 295 M_ASN1_I2D_len_IMP_opt(&(a.key_arg),i2d_ASN1_OCTET_STRING); in i2d_SSL_SESSION() 341 M_ASN1_I2D_put_IMP_opt(&(a.key_arg),i2d_ASN1_OCTET_STRING,0); in i2d_SSL_SESSION() 485 memcpy(ret->key_arg,os.data,ret->key_arg_length); in d2i_SSL_SESSION()
|
D | ssl_txt.c | 174 if (BIO_printf(bp,"%02X",x->key_arg[i]) <= 0) goto err; in SSL_SESSION_print()
|
D | s2_clnt.c | 650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) in client_master_key() 707 if (karg > (int)sizeof(sess->key_arg)) in client_master_key() 713 memcpy(d,sess->key_arg,(unsigned int)karg); in client_master_key()
|
D | ssl_sess.c | 762 OPENSSL_cleanse(ss->key_arg,sizeof ss->key_arg); in SSL_SESSION_free()
|
D | s2_srvr.c | 440 memcpy(s->session->key_arg,&(p[s->s2->tmp.clear+s->s2->tmp.enc]), in get_client_master_key()
|
D | ssl.h | 479 unsigned char key_arg[SSL_MAX_KEY_ARG_LENGTH]; member
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
D | tls1_change_cipher_state_rewrite.patch | 481 + /* key_arg is used for SSLv2. We don't need it for TLS. */
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
D | ssl.h | 479 unsigned char key_arg[SSL_MAX_KEY_ARG_LENGTH]; member
|
/external/openssl/include/openssl/ |
D | ssl.h | 476 unsigned char key_arg[SSL_MAX_KEY_ARG_LENGTH]; member
|
/external/chromium_org/third_party/openssl/patches.chromium/ |
D | 0007-chacha.patch | 8950 ++ /* key_arg is used for SSLv2. We don't need it for TLS. */
|