Searched refs:new_cipher (Results 1 - 12 of 12) sorted by relevance
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | d1_srvr.c | 327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 414 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 419 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) 422 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 573 s->session->cipher=s->s3->tmp.new_cipher; 795 if (s->s3->tmp.new_cipher [all...] |
H A D | t1_enc.c | 287 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2, 332 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 343 s->s3->tmp.new_cipher->algorithm_mkey, 344 s->s3->tmp.new_cipher->algorithm_auth, 359 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) 402 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) 445 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 446 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl; 490 if (!tls1_PRF(s->s3->tmp.new_cipher->algorithm2, 501 if (!tls1_PRF(s->s3->tmp.new_cipher [all...] |
H A D | s3_srvr.c | 349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK) 351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 417 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 418 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 445 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 450 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) 453 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 629 s->session->cipher=s->s3->tmp.new_cipher; [all...] |
H A D | s3_clnt.c | 307 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 308 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 429 s->session->cipher=s->s3->tmp.new_cipher; 880 s->s3->tmp.new_cipher=c; 988 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) && 1053 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1054 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 1080 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1081 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 1087 printf("cipher, alg, nc = %s, %lx, %lx, %d\n", s->s3->tmp.new_cipher [all...] |
H A D | t1_lib.c | 606 if (((s->s3->tmp.new_cipher->id & 0xFFFF)==0x80 || (s->s3->tmp.new_cipher->id & 0xFFFF)==0x81) 1307 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1308 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; 1465 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1466 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
|
H A D | s3_enc.c | 231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 320 j=is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 321 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl; 613 if ((mask & s->s3->tmp.new_cipher->algorithm2) && md)
|
H A D | d1_clnt.c | 303 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 304 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 417 s->session->cipher=s->s3->tmp.new_cipher; 799 alg_k=s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | ssl3.h | 472 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon1348
|
H A D | s3_pkt.c | 1230 if (s->s3->tmp.new_cipher == NULL) 1375 s->session->cipher=s->s3->tmp.new_cipher;
|
H A D | ssl_lib.c | 2118 ssl_set_cert_masks(c, s->s3->tmp.new_cipher); 2120 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2121 alg_a = s->s3->tmp.new_cipher->algorithm_auth;
|
H A D | s3_lib.c | 3089 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
/barrelfish-master/include/openssl/ |
H A D | ssl3.h | 472 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon248
|
Completed in 120 milliseconds