H A D | softSSL.c | 89 uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, 92 uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, 99 uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, 109 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument 123 SHA1Update(&sha1_ctx, rand1, rand1len); 145 uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, 189 * the 'seed' here is rand1 + rand2 193 P_MD5(S1, L_S1, label, labellen, rand1, rand1len, rand2, rand2len, 197 P_SHA1(S2, L_S2, label, labellen, rand1, rand1len, rand2, rand2len, 214 * The seed is the concatenation of 'babel', 'rand1', an 144 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen) argument 217 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 297 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 1060 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |