H A D | softSSL.c | 106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument 120 SHA1Update(&sha1_ctx, rand1, rand1len); 142 uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, 186 * the 'seed' here is rand1 + rand2 190 P_MD5(S1, L_S1, label, labellen, rand1, rand1len, rand2, rand2len, 194 P_SHA1(S2, L_S2, label, labellen, rand1, rand1len, rand2, rand2len, 211 * The seed is the concatenation of 'babel', 'rand1', and 'rand2'. 215 uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, 236 /* A(1) = HMAC_MD5(secret, rand1 + rand2) */ 239 SOFT_MAC_UPDATE(MD5, &md5_hmac_ctx, rand1, rand1le 141 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen) argument 214 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 294 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 1054 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |