Searched refs:pms (Results 1 - 6 of 6) sorted by path
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | derive.c | 438 const SECItem * pms, 458 PORT_Assert(pms->len == SSL3_RSA_PMS_LENGTH); 459 if (pms->len != SSL3_RSA_PMS_LENGTH) { 482 rv = TLS_P_hash(HASH_AlgSHA256, pms, "master secret", &crsr, 485 rv = TLS_PRF(pms, "master secret", &crsr, &master, isFIPS); 499 SHA1_Update(shaCtx, pms->data, pms->len); 505 MD5_Update(md5Ctx, pms->data, pms->len); 525 ssl_canExtractMS(PK11SymKey *pms, PRBoo argument 434 ssl3_MasterKeyDeriveBypass( ssl3CipherSpec * pwSpec, const unsigned char * cr, const unsigned char * sr, const SECItem * pms, PRBool isTLS, PRBool isRSA) argument [all...] |
H A D | ssl3con.c | 76 static SECStatus ssl3_DeriveMasterSecret(sslSocket *ss, PK11SymKey *pms); 2272 * NULL pms means re-use old master_secret. 2275 * For the bypass case, pms is NULL. 2278 ssl3_InitPendingCipherSpec(sslSocket *ss, PK11SymKey *pms) argument 2293 if (pms || (!pwSpec->msItem.len && !pwSpec->master_secret)) { 2294 rv = ssl3_DeriveMasterSecret(ss, pms); 3678 ssl3_DeriveMasterSecret(sslSocket *ss, PK11SymKey *pms) argument 3723 if (pms || !pwSpec->master_secret) { 3738 if (pms != NULL) { 3741 SECStatus extractRV = PK11_ExtractKeyValue(pms); 5982 PK11SymKey * pms = NULL; local 6086 PK11SymKey * pms = NULL; local 9495 PK11SymKey * pms = NULL; local 9574 PK11SymKey * pms; local [all...] |
H A D | ssl3ecc.c | 274 PK11SymKey * pms = NULL; local 313 pms = PK11_PubDeriveWithKDF(privKey, svrPubKey, PR_FALSE, NULL, NULL, 317 if (pms == NULL) { 327 rv = ssl3_InitPendingCipherSpec(ss, pms); 328 PK11_FreeSymKey(pms); pms = NULL; 354 if(pms) PK11_FreeSymKey(pms); 370 PK11SymKey * pms; local 404 pms [all...] |
H A D | sslimpl.h | 1629 const SECItem * pms, PRBool isTLS, PRBool isRSA); 1792 extern SECStatus ssl3_InitPendingCipherSpec(sslSocket *ss, PK11SymKey *pms);
|
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |
/external/openssl/ssl/ |
H A D | s3_srvr.c | 2517 unsigned char pms[SSL_MAX_MASTER_KEY_LENGTH local 2561 if(enc_pms.length > sizeof pms) 2629 if (!EVP_DecryptUpdate(&ciph_ctx, pms,&outl, 2642 if (!EVP_DecryptFinal_ex(&ciph_ctx,&(pms[outl]),&padl)) 2655 if (!((pms[0] == (s->client_version>>8)) && (pms[1] == (s->client_version & 0xff)))) 2677 s->session->master_key, pms, outl);
|
Completed in 337 milliseconds