Lines Matching +full:1 +full:kb

52 #define BR_USE_URANDOM   1
63 #define BR_USE_WIN32_RAND 1
254 * With TLS-1.0 and CBC mode, we apply a 1/n-1 split, for a maximum
257 * 32 bytes for the first record payload (AES-CBC + HMAC/SHA-1)
259 * 20 bytes for the MAC (HMAC/SHA-1)
261 * -1 byte to account for the payload byte in the first record
263 * Note that with TLS-1.0, the MAC is HMAC with either MD5 or SHA-1, but
432 flen = (size_t)1 << u; in br_ssl_engine_set_buffers_bidi()
445 rc->max_frag_len = (size_t)1 << u; in br_ssl_engine_set_buffers_bidi()
474 return 1; in rng_init()
481 * If using TLS-1.0 or 1.1 then SHA-1 must be present. in rng_init()
483 * Though HMAC_DRBG/SHA-1 is, as far as we know, as safe as in rng_init()
485 * SHA-1, if only for public relations (known theoretical in rng_init()
486 * weaknesses of SHA-1 with regards to collisions are mostly in rng_init()
502 cc->rng_init_done = 1; in rng_init()
503 return 1; in rng_init()
526 cc->rng_os_rand_done = 1; in br_ssl_engine_init_rand()
532 return 1; in br_ssl_engine_init_rand()
651 version = br_dec16be(rc->ibuf + 1); in recvrec_ack()
770 return 1; in br_ssl_engine_recvrec_finished()
875 rc->oxb = rc->oxa + 1; in sendpld_ack()
952 br_enc16be(buf + 1, version); in clear_encrypt()
1032 * Give control to handshake processor. 'action' is 1 for a close,
1122 if (!(cc->application_data & 1)) { in br_ssl_engine_sendapp_buf()
1140 if (!(cc->application_data & 1) in br_ssl_engine_recvapp_buf()
1170 || (cc->application_data & 1) == 0)) in br_ssl_engine_sendrec_ack()
1208 if (cc->application_data == 1) { in br_ssl_engine_recvrec_ack()
1250 jump_handshake(cc, 1); in br_ssl_engine_close()
1260 if (br_ssl_engine_closed(cc) || cc->reneg == 1 in br_ssl_engine_renegotiate()
1267 return 1; in br_ssl_engine_renegotiate()
1301 if (!br_ssl_engine_closed(cc) && (cc->application_data & 1) != 0) { in br_ssl_engine_flush()
1358 size_t half_len, unsigned char *kb) in compute_key_block() argument
1367 iprf(kb, half_len << 1, in compute_key_block()
1378 unsigned char kb[192]; in br_ssl_engine_switch_cbc_in() local
1396 mac_key_len + cipher_key_len + iv_len, kb); in br_ssl_engine_switch_cbc_in()
1398 mac_key = &kb[mac_key_len]; in br_ssl_engine_switch_cbc_in()
1399 cipher_key = &kb[(mac_key_len << 1) + cipher_key_len]; in br_ssl_engine_switch_cbc_in()
1400 iv = &kb[((mac_key_len + cipher_key_len) << 1) + iv_len]; in br_ssl_engine_switch_cbc_in()
1402 mac_key = &kb[0]; in br_ssl_engine_switch_cbc_in()
1403 cipher_key = &kb[mac_key_len << 1]; in br_ssl_engine_switch_cbc_in()
1404 iv = &kb[(mac_key_len + cipher_key_len) << 1]; in br_ssl_engine_switch_cbc_in()
1412 cc->incrypt = 1; in br_ssl_engine_switch_cbc_in()
1421 unsigned char kb[192]; in br_ssl_engine_switch_cbc_out() local
1439 mac_key_len + cipher_key_len + iv_len, kb); in br_ssl_engine_switch_cbc_out()
1441 mac_key = &kb[0]; in br_ssl_engine_switch_cbc_out()
1442 cipher_key = &kb[mac_key_len << 1]; in br_ssl_engine_switch_cbc_out()
1443 iv = &kb[(mac_key_len + cipher_key_len) << 1]; in br_ssl_engine_switch_cbc_out()
1445 mac_key = &kb[mac_key_len]; in br_ssl_engine_switch_cbc_out()
1446 cipher_key = &kb[(mac_key_len << 1) + cipher_key_len]; in br_ssl_engine_switch_cbc_out()
1447 iv = &kb[((mac_key_len + cipher_key_len) << 1) + iv_len]; in br_ssl_engine_switch_cbc_out()
1463 unsigned char kb[72]; in br_ssl_engine_switch_gcm_in() local
1466 compute_key_block(cc, prf_id, cipher_key_len + 4, kb); in br_ssl_engine_switch_gcm_in()
1468 cipher_key = &kb[cipher_key_len]; in br_ssl_engine_switch_gcm_in()
1469 iv = &kb[(cipher_key_len << 1) + 4]; in br_ssl_engine_switch_gcm_in()
1471 cipher_key = &kb[0]; in br_ssl_engine_switch_gcm_in()
1472 iv = &kb[cipher_key_len << 1]; in br_ssl_engine_switch_gcm_in()
1476 cc->incrypt = 1; in br_ssl_engine_switch_gcm_in()
1485 unsigned char kb[72]; in br_ssl_engine_switch_gcm_out() local
1488 compute_key_block(cc, prf_id, cipher_key_len + 4, kb); in br_ssl_engine_switch_gcm_out()
1490 cipher_key = &kb[0]; in br_ssl_engine_switch_gcm_out()
1491 iv = &kb[cipher_key_len << 1]; in br_ssl_engine_switch_gcm_out()
1493 cipher_key = &kb[cipher_key_len]; in br_ssl_engine_switch_gcm_out()
1494 iv = &kb[(cipher_key_len << 1) + 4]; in br_ssl_engine_switch_gcm_out()
1505 unsigned char kb[88]; in br_ssl_engine_switch_chapol_in() local
1508 compute_key_block(cc, prf_id, 44, kb); in br_ssl_engine_switch_chapol_in()
1510 cipher_key = &kb[32]; in br_ssl_engine_switch_chapol_in()
1511 iv = &kb[76]; in br_ssl_engine_switch_chapol_in()
1513 cipher_key = &kb[0]; in br_ssl_engine_switch_chapol_in()
1514 iv = &kb[64]; in br_ssl_engine_switch_chapol_in()
1518 cc->incrypt = 1; in br_ssl_engine_switch_chapol_in()
1526 unsigned char kb[88]; in br_ssl_engine_switch_chapol_out() local
1529 compute_key_block(cc, prf_id, 44, kb); in br_ssl_engine_switch_chapol_out()
1531 cipher_key = &kb[0]; in br_ssl_engine_switch_chapol_out()
1532 iv = &kb[64]; in br_ssl_engine_switch_chapol_out()
1534 cipher_key = &kb[32]; in br_ssl_engine_switch_chapol_out()
1535 iv = &kb[76]; in br_ssl_engine_switch_chapol_out()
1548 unsigned char kb[72]; in br_ssl_engine_switch_ccm_in() local
1551 compute_key_block(cc, prf_id, cipher_key_len + 4, kb); in br_ssl_engine_switch_ccm_in()
1553 cipher_key = &kb[cipher_key_len]; in br_ssl_engine_switch_ccm_in()
1554 iv = &kb[(cipher_key_len << 1) + 4]; in br_ssl_engine_switch_ccm_in()
1556 cipher_key = &kb[0]; in br_ssl_engine_switch_ccm_in()
1557 iv = &kb[cipher_key_len << 1]; in br_ssl_engine_switch_ccm_in()
1561 cc->incrypt = 1; in br_ssl_engine_switch_ccm_in()
1571 unsigned char kb[72]; in br_ssl_engine_switch_ccm_out() local
1574 compute_key_block(cc, prf_id, cipher_key_len + 4, kb); in br_ssl_engine_switch_ccm_out()
1576 cipher_key = &kb[0]; in br_ssl_engine_switch_ccm_out()
1577 iv = &kb[cipher_key_len << 1]; in br_ssl_engine_switch_ccm_out()
1579 cipher_key = &kb[cipher_key_len]; in br_ssl_engine_switch_ccm_out()
1580 iv = &kb[(cipher_key_len << 1) + 4]; in br_ssl_engine_switch_ccm_out()