SSL_MAX_MASTER_KEY_LENGTH
unsigned char rand_premaster_secret[SSL_MAX_MASTER_KEY_LENGTH];
if (flen < RSA_PKCS1_PADDING_SIZE + SSL_MAX_MASTER_KEY_LENGTH
|| tlen < SSL_MAX_MASTER_KEY_LENGTH) {
for (i = 2; i < flen - SSL_MAX_MASTER_KEY_LENGTH - 1; i++)
good &= constant_time_is_zero_8(from[flen - SSL_MAX_MASTER_KEY_LENGTH - 1]);
version_good = constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH],
version_good &= constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH + 1],
workaround_good = constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH],
workaround_good &= constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH + 1],
for (i = 0; i < SSL_MAX_MASTER_KEY_LENGTH; i++) {
from[flen - SSL_MAX_MASTER_KEY_LENGTH + i],
return SSL_MAX_MASTER_KEY_LENGTH;
*outlen = SSL_MAX_MASTER_KEY_LENGTH;
if (outsize < SSL_MAX_MASTER_KEY_LENGTH) {
pmslen = SSL_MAX_MASTER_KEY_LENGTH;
outlen = SSL_MAX_MASTER_KEY_LENGTH;
if (outlen != SSL_MAX_MASTER_KEY_LENGTH) {
OPENSSL_cleanse(rsa_decrypt, SSL_MAX_MASTER_KEY_LENGTH);
unsigned char b[SSL_MAX_MASTER_KEY_LENGTH];
unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH];
unsigned char actual_master_key[SSL_MAX_MASTER_KEY_LENGTH] = { 0 };
size_t master_key_size = SSL_MAX_MASTER_KEY_LENGTH;