Searched refs:premaster_secret (Results 1 - 6 of 6) sorted by relevance
/external/chromium_org/net/quic/crypto/ |
H A D | crypto_utils.h | 54 // |premaster_secret|, |client_nonce|, |server_nonce| and |hkdf_input|. |aead| 58 // |subkey_secret| will have the same length as |premaster_secret|. 59 static bool DeriveKeys(base::StringPiece premaster_secret,
|
H A D | crypto_utils.cc | 81 bool CryptoUtils::DeriveKeys(StringPiece premaster_secret, argument 94 subkey_secret == NULL ? 0 : premaster_secret.length(); 103 crypto::HKDF hkdf(premaster_secret, nonce, hkdf_input, key_bytes,
|
H A D | p256_key_exchange_nss.cc | 190 crypto::ScopedPK11SymKey premaster_secret( 205 if (!premaster_secret.get()) { 210 if (PK11_ExtractKeyValue(premaster_secret.get()) != SECSuccess) { 215 SECItem* key_data = PK11_GetKeyData(premaster_secret.get());
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_srvr.c | 1752 uint8_t *premaster_secret = NULL; local 1836 /* Depending on the key exchange method, compute |premaster_secret| and 1941 premaster_secret = BUF_memdup( 1944 if (premaster_secret == NULL) 1959 version_good = premaster_secret[0] ^ (s->client_version>>8); 1960 version_good |= premaster_secret[1] ^ (s->client_version&0xff); 1984 /* Now copy rand_premaster_secret over premaster_secret using 1988 premaster_secret[j] = (premaster_secret[j] & decrypt_good_mask) | 2024 premaster_secret [all...] |
/external/openssl/ssl/ |
H A D | s3_clnt.c | 3066 unsigned char premaster_secret[32],shared_ukm[32], tmp[256]; local 3090 RAND_bytes(premaster_secret,32); 3118 if (EVP_PKEY_encrypt(pkey_ctx,tmp,&msglen,premaster_secret,32)<0) { 3144 s->session->master_key,premaster_secret,32);
|
H A D | s3_srvr.c | 2928 unsigned char premaster_secret[32], *start; local 2963 if (EVP_PKEY_decrypt(pkey_ctx,premaster_secret,&outlen,start,inlen) <=0) 2971 s->session->master_key,premaster_secret,32);
|
Completed in 1091 milliseconds