Searched refs:masterKey (Results 1 - 4 of 4) sorted by relevance
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslnonce.c | 121 SECITEM_ZfreeItem(&sid->u.ssl2.masterKey, PR_FALSE); 289 PRINT_BUF(8, (0, "masterKey:", 290 sid->u.ssl2.masterKey.data, sid->u.ssl2.masterKey.len)); 359 PRINT_BUF(8, (0, "masterKey:", 360 zap->u.ssl2.masterKey.data, zap->u.ssl2.masterKey.len));
|
H A D | sslsnce.c | 109 /* 64 */ PRUint8 masterKey[SSL_MAX_MASTER_KEY_BYTES]; member in struct:sidCacheEntryStr::__anon9733::__anon9734 467 if ((from->u.ssl2.masterKey.len > SSL_MAX_MASTER_KEY_BYTES) || 470 myPid, from->u.ssl2.masterKey.len, 477 to->u.ssl2.masterKeyLen = from->u.ssl2.masterKey.len; 483 PORT_Memcpy(to->u.ssl2.masterKey, from->u.ssl2.masterKey.data, 484 from->u.ssl2.masterKey.len); 488 PORT_Memset(to->u.ssl2.masterKey+from->u.ssl2.masterKey.len, 0, 489 sizeof(to->u.ssl2.masterKey) [all...] |
H A D | sslcon.c | 1278 PORT_Assert(sid->u.ssl2.masterKey.data == 0); 1284 sid->u.ssl2.masterKey.data = (PRUint8*) PORT_Alloc(keyLen); 1285 if (!sid->u.ssl2.masterKey.data) { 1288 PORT_Memcpy(sid->u.ssl2.masterKey.data, keyData, keyLen); 1289 sid->u.ssl2.masterKey.len = keyLen; 1311 ** Construct session keys given the masterKey (tied to the session-id), 1320 SECItem * masterKey, 1364 rv |= PK11_DigestOp(cx, masterKey->data, masterKey->len); 1437 rv = ssl2_ProduceKeys(ss, &readKey, &writeKey, &sid->u.ssl2.masterKey, 1317 ssl2_ProduceKeys(sslSocket * ss, SECItem * readKey, SECItem * writeKey, SECItem * masterKey, PRUint8 * challenge, PRUint8 * nonce, int cipherType) argument [all...] |
H A D | sslimpl.h | 661 SECItem masterKey; /* never wrapped */ member in struct:sslSessionIDStr::__anon9713::__anon9714
|
Completed in 1840 milliseconds