Lines Matching refs:key
76 static uchar_t TLS_KEY_EXPANSION_LABEL[] = {"key expansion"};
79 static uchar_t TLS_CLIENT_KEY_LABEL[] = {"client write key"};
82 static uchar_t TLS_SERVER_KEY_LABEL[] = {"server write key"};
97 static void soft_delete_derived_key(soft_session_t *sp, soft_object_t *key);
401 * . mech_p: key derivation mechanism. the mechanism parameter carries the
403 * . basekey_p: The pre-master secret key.
404 * . pTemplate & ulAttributeCount: Any extra attributes for the key to be
406 * . phKey: store for handle to the derived key.
465 /* Invalid pre-master key length. What else to return? */
598 * . mech_p: key derivation mechanism. the mechanism parameter carries the
600 * the specification of the key and IV sizes, and the location
602 * . basekey_p: The master secret key.
603 * . pTemplate & ulAttributeCount: Any extra attributes for the key to be
607 * Derive the SSL key material (Client and server MAC secrets, symmetric
623 * PRF(master_secret, "key expansion",
695 * key block. They are directly derived from the client and
970 * Add the derived key to the session, and, if it's a token object,
1025 * Delete the derived key from the session, and, if it's a token object,
1029 soft_delete_derived_key(soft_session_t *sp, soft_object_t *key)
1033 if (IS_TOKEN_OBJECT(key))
1034 soft_delete_token_object(key, B_FALSE, B_FALSE);
1036 soft_delete_object(sp, key, B_FALSE, B_FALSE);
1041 * Reduce the key length to an exportable size.
1051 * "client write key",
1055 * "server write key",