• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/openssl/ssl/statem/

Lines Matching defs:method

549             && (!s->method->ssl3_enc->change_cipher_state(s,
556 sender = s->method->ssl3_enc->server_finished_label;
557 slen = s->method->ssl3_enc->server_finished_label_len;
559 sender = s->method->ssl3_enc->client_finished_label;
560 slen = s->method->ssl3_enc->client_finished_label_len;
563 finish_md_len = s->method->ssl3_enc->final_finish_mac(s,
681 sender = s->method->ssl3_enc->server_finished_label;
682 slen = s->method->ssl3_enc->server_finished_label_len;
684 sender = s->method->ssl3_enc->client_finished_label;
685 slen = s->method->ssl3_enc->client_finished_label_len;
689 s->method->ssl3_enc->final_finish_mac(s, sender, slen,
841 !s->method->ssl3_enc->change_cipher_state(s,
849 if (!s->method->ssl3_enc->generate_master_secret(s,
855 if (!s->method->ssl3_enc->change_cipher_state(s,
1160 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, &recvd_type,
1275 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, NULL,
1479 * @s: The SSL handle for the candidate method
1480 * @method: the intended method.
1484 static int ssl_method_error(const SSL *s, const SSL_METHOD *method)
1486 int version = method->version;
1497 if ((s->options & method->mask) != 0)
1499 if ((method->flags & SSL_METHOD_NO_SUITEB) != 0 && tls1_suiteb(s))
1576 * @s: The SSL handle for the candidate method
1586 switch (s->method->version) {
1588 /* Version should match method version for non-ANY method */
1631 * (according to s->ctx->method, as version negotiation may have changed
1632 * s->method).
1634 if (s->version == s->ctx->method->version)
1641 if (s->ctx->method->version == TLS_method()->version)
1643 else if (s->ctx->method->version == DTLS_method()->version)
1659 * protocols, provided the initial (D)TLS method is version-flexible. This
1660 * function sanity-checks the proposed value and makes sure the method is
1742 * the version specific method.
1753 * s->method->version == (D)TLS_ANY_VERSION,
1756 * So we detect version-flexible methods via the method version, not the
1759 int server_version = s->method->version;
1775 * If this SSL handle is not from a version flexible method we don't
1779 * ssl_method_error(s, s->method)
1850 s->method = best_method;
1868 const SSL_METHOD *method;
1873 method = vent->smeth();
1874 if (ssl_method_error(s, method) == 0) {
1877 s->method = method;
1888 * the version specific method.
1922 switch (s->method->version) {
1924 if (s->version != s->method->version) {
1932 * If this SSL handle is not from a version flexible method we don't
1936 * ssl_method_error(s, s->method)
2002 s->method = vent->cmeth();
2040 const SSL_METHOD *method;
2044 switch (s->method->version) {
2047 * If this SSL handle is not from a version flexible method we don't
2051 * ssl_method_error(s, s->method)
2056 * flexible method.
2072 * capability" vector contiguous. Any versions with a NULL client method
2076 * the first version in the method table are disabled (a "hole" above
2079 * Whenever "hole == 1", and we hit an enabled method, its version becomes
2080 * the selected version, and the method becomes a candidate "single"
2081 * method. We're no longer in a hole, so "hole" becomes 0.
2083 * If "hole == 0" and we hit an enabled method, then "single" is cleared,
2085 * a disabled method, then hole becomes true again, but nothing else
2087 * If we again hit an enabled method after the new hole, it becomes
2097 * A table entry with a NULL client method is still a hole in the
2105 method = vent->cmeth();
2110 if (ssl_method_error(s, method) != 0) {
2114 *min_version = method->version;
2118 version = (single = method)->version;