| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_trce.c | 1042 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey; local 1044 if (alg_k & SSL_kRSA) { 1048 if (alg_k & SSL_kDHE) { 1052 if (alg_k & SSL_kECDHE) { 1056 if (alg_k & SSL_kPSK) { 1060 if (alg_k & SSL_kRSAPSK) { 1064 if (alg_k & SSL_kDHEPSK) { 1068 if (alg_k & SSL_kECDHEPSK) { 1072 if (alg_k & SSL_kSRP) { 1076 if (alg_k & SSL_kGOST) [all...] |
| s3_lib.c | 4144 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; local 4276 alg_k = c->algorithm_mkey; 4281 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) 4285 ok = (alg_k & mask_k) && (alg_a & mask_a); 4287 fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k, 4296 if (alg_k & SSL_kECDHE) 4310 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) 4340 uint32_t alg_k, alg_a = 0; local 4348 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 4351 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST) 4613 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_clnt.c | 62 long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 68 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK 2262 long alg_k; local 2268 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2277 if (alg_k & SSL_PSK) { 2285 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { 2286 } else if (alg_k & SSL_kSRP) { 2291 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { 2296 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { 2301 } else if (alg_k) { 3325 unsigned long alg_k; local 3591 long alg_k, alg_a; local [all...] |
| statem_srvr.c | 326 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 336 if (alg_k & (SSL_kDHE | SSL_kECDHE) 343 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) 346 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) 350 || (alg_k & SSL_kSRP) 3460 unsigned long alg_k; local 3462 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3465 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { 3470 if (alg_k & SSL_kPSK) { 3483 } else if (alg_k & (SSL_kRSA | SSL_kRSAPSK)) [all...] |
| extensions.c | 1042 unsigned long alg_k, alg_a; local 1047 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1059 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) {
|
| extensions_clnt.c | 119 unsigned long alg_k, alg_a; local 133 alg_k = c->algorithm_mkey; 135 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
|
| extensions_srvr.c | 1386 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 1388 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_trce.c | 1125 unsigned long alg_k = sc->s3.tmp.new_cipher->algorithm_mkey; local 1127 if (alg_k & SSL_kRSA) { 1131 if (alg_k & SSL_kDHE) { 1135 if (alg_k & SSL_kECDHE) { 1139 if (alg_k & SSL_kPSK) { 1143 if (alg_k & SSL_kRSAPSK) { 1147 if (alg_k & SSL_kDHEPSK) { 1151 if (alg_k & SSL_kECDHEPSK) { 1155 if (alg_k & SSL_kSRP) { 1159 if (alg_k & SSL_kGOST) [all...] |
| s3_lib.c | 4718 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; local 4849 alg_k = c->algorithm_mkey; 4854 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) 4858 ok = (alg_k & mask_k) && (alg_a & mask_a); 4861 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name); 4867 if (alg_k & SSL_kECDHE) 4880 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) 4913 uint32_t alg_k, alg_a = 0; local 4921 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 4924 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST) 5208 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; local 1055 if (alg_k & SSL_kRSA) { 1059 if (alg_k & SSL_kDHE) { 1063 if (alg_k & SSL_kECDHE) { 1067 if (alg_k & SSL_kPSK) { 1071 if (alg_k & SSL_kRSAPSK) { 1075 if (alg_k & SSL_kDHEPSK) { 1079 if (alg_k & SSL_kECDHEPSK) { 1083 if (alg_k & SSL_kSRP) { 1087 if (alg_k & SSL_kGOST) [all...] |
| s3_lib.c | 4140 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; local 4268 alg_k = c->algorithm_mkey; 4273 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) 4277 ok = (alg_k & mask_k) && (alg_a & mask_a); 4280 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name); 4286 if (alg_k & SSL_kECDHE) 4299 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) 4331 uint32_t alg_k, alg_a = 0; local 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 4342 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST) 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 75 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 81 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK | SSL_kSRP)) { 2444 long alg_k; local 2451 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 2458 if (alg_k & SSL_PSK) { 2466 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { 2467 } else if (alg_k & SSL_kSRP) { 2472 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { 2477 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { 2482 } else if (alg_k) { 3575 unsigned long alg_k; local 3968 long alg_k, alg_a; local [all...] |
| statem_srvr.c | 353 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 363 if (alg_k & (SSL_kDHE | SSL_kECDHE) 370 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) 373 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) 377 || (alg_k & SSL_kSRP) 3425 unsigned long alg_k; local 3427 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 3430 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { 3435 if (alg_k & SSL_kPSK) { 3446 } else if (alg_k & (SSL_kRSA | SSL_kRSAPSK)) [all...] |
| extensions.c | 1038 unsigned long alg_k, alg_a; local 1043 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 1055 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) {
|
| extensions_clnt.c | 142 unsigned long alg_k, alg_a; local 157 alg_k = c->algorithm_mkey; 159 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
|
| extensions_srvr.c | 1645 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 1647 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_clnt.c | 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 72 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK 2181 long alg_k; local 2187 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 2194 if (alg_k & SSL_PSK) { 2202 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { 2203 } else if (alg_k & SSL_kSRP) { 2208 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { 2213 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { 2218 } else if (alg_k) { 3284 unsigned long alg_k; local 3542 long alg_k, alg_a; local [all...] |
| statem_srvr.c | 325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 335 if (alg_k & (SSL_kDHE | SSL_kECDHE) 342 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) 345 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) 349 || (alg_k & SSL_kSRP) 3283 unsigned long alg_k; local 3285 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 3288 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { 3293 if (alg_k & SSL_kPSK) { 3304 } else if (alg_k & (SSL_kRSA | SSL_kRSAPSK)) [all...] |
| extensions.c | 1035 unsigned long alg_k, alg_a; local 1040 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 1052 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) {
|
| extensions_clnt.c | 114 unsigned long alg_k, alg_a; local 128 alg_k = c->algorithm_mkey; 130 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
|
| extensions_srvr.c | 1317 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 1319 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
|