Lines Matching defs:tmp

342                 (s->s3->tmp.
344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) {
409 if (s->s3->tmp.cert_req)
446 if (s->s3->tmp.cert_req == 1) {
485 s->session->cipher = s->s3->tmp.new_cipher;
489 if (s->s3->tmp.new_compression == NULL)
492 s->session->compress_meth = s->s3->tmp.new_compression->id;
536 s->s3->tmp.next_state = SSL_ST_OK;
548 s->s3->tmp.next_state = SSL3_ST_CR_SESSION_TICKET_A;
552 s->s3->tmp.next_state = SSL3_ST_CR_FINISHED_A;
600 s->state = s->s3->tmp.next_state;
648 if (!s->s3->tmp.reuse_message && !skip) {
921 if (s->s3->tmp.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) {
923 s->s3->tmp.reuse_message = 1;
934 if (s->s3->tmp.message_type != SSL3_MT_SERVER_HELLO) {
1098 s->s3->tmp.new_cipher = c;
1145 s->s3->tmp.new_compression = comp;
1193 if ((s->s3->tmp.message_type == SSL3_MT_SERVER_KEY_EXCHANGE) ||
1194 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) &&
1195 (s->s3->tmp.message_type == SSL3_MT_SERVER_DONE))) {
1196 s->s3->tmp.reuse_message = 1;
1200 if (s->s3->tmp.message_type != SSL3_MT_CERTIFICATE) {
1258 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1259 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
1291 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1292 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
1299 s->s3->tmp.new_cipher->name,
1300 s->s3->tmp.new_cipher->algorithm_mkey,
1301 s->s3->tmp.new_cipher->algorithm_auth, need_cert);
1322 int exp_idx = ssl_cipher_get_cert_index(s->s3->tmp.new_cipher);
1408 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
1410 if (s->s3->tmp.message_type != SSL3_MT_SERVER_KEY_EXCHANGE) {
1433 s->s3->tmp.reuse_message = 1;
1464 alg_a = s->s3->tmp.new_cipher->algorithm_auth;
1615 if (!SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)) {
1675 if (EVP_PKEY_bits(pkey) <= SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
1766 BIGNUM *tmp = NULL;
1777 if ((tmp = BN_new()) == NULL
1778 || BN_copy(tmp, dh->p) == NULL
1779 || !BN_sub_word(tmp, 1)) {
1780 BN_free(tmp);
1784 if (BN_cmp(dh->g, tmp) >= 0) {
1785 BN_free(tmp);
1789 BN_free(tmp);
1874 if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) &&
2095 s->s3->tmp.cert_req = 0;
2097 if (s->s3->tmp.message_type == SSL3_MT_SERVER_DONE) {
2098 s->s3->tmp.reuse_message = 1;
2110 if (s->s3->tmp.message_type != SSL3_MT_CERTIFICATE_REQUEST) {
2118 if (s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) {
2151 s->s3->tmp.ctype[i] = p[i];
2189 out = fopen("/tmp/vsign.der", "w");
2251 s->s3->tmp.cert_req = 1;
2252 s->s3->tmp.ctype_num = ctype_num;
2253 if (s->s3->tmp.ca_names != NULL)
2254 sk_X509_NAME_pop_free(s->s3->tmp.ca_names, X509_NAME_free);
2255 s->s3->tmp.ca_names = ca_sk;
2397 if (s->s3->tmp.message_type != SSL3_MT_CERTIFICATE_STATUS) {
2402 s->s3->tmp.reuse_message = 1;
2519 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
2993 unsigned char premaster_secret[32], shared_ukm[32], tmp[256];
3069 if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, premaster_secret, 32)
3083 memcpy(p, tmp, msglen);
3393 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
3474 s->s3->tmp.cert_req = 0;
3478 s->s3->tmp.cert_req = 2;
3489 (s->s3->tmp.cert_req ==
3518 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
3519 alg_a = s->s3->tmp.new_cipher->algorithm_auth;
3578 if (!SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) &&
3583 } else if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)) {
3584 if (pkey_bits <= SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
3633 if ((!SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && dh_size < 1024)
3634 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && dh_size < 512)) {
3641 if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) &&
3642 pkey_bits > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
3650 SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
3662 SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
3725 s->s3->tmp.reuse_message = 1;
3727 if (s->s3->tmp.message_type == SSL3_MT_FINISHED)