Searched refs:new_cipher (Results 1 - 12 of 12) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dd1_srvr.c327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
414 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
419 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)
422 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
573 s->session->cipher=s->s3->tmp.new_cipher;
795 if (s->s3->tmp.new_cipher
[all...]
H A Dt1_enc.c287 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
332 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
343 s->s3->tmp.new_cipher->algorithm_mkey,
344 s->s3->tmp.new_cipher->algorithm_auth,
359 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
402 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
445 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
446 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
490 if (!tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
501 if (!tls1_PRF(s->s3->tmp.new_cipher
[all...]
H A Ds3_srvr.c349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)
351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
417 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
418 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
445 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
450 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)
453 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
629 s->session->cipher=s->s3->tmp.new_cipher;
[all...]
H A Ds3_clnt.c307 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
308 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
429 s->session->cipher=s->s3->tmp.new_cipher;
880 s->s3->tmp.new_cipher=c;
988 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) &&
1053 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1054 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
1080 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1081 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
1087 printf("cipher, alg, nc = %s, %lx, %lx, %d\n", s->s3->tmp.new_cipher
[all...]
H A Dt1_lib.c606 if (((s->s3->tmp.new_cipher->id & 0xFFFF)==0x80 || (s->s3->tmp.new_cipher->id & 0xFFFF)==0x81)
1307 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
1308 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
1465 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
1466 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
H A Ds3_enc.c231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
320 j=is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
321 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
613 if ((mask & s->s3->tmp.new_cipher->algorithm2) && md)
H A Dd1_clnt.c303 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
304 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
417 s->session->cipher=s->s3->tmp.new_cipher;
799 alg_k=s->s3->tmp.new_cipher->algorithm_mkey;
H A Dssl3.h472 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon1348
H A Ds3_pkt.c1230 if (s->s3->tmp.new_cipher == NULL)
1375 s->session->cipher=s->s3->tmp.new_cipher;
H A Dssl_lib.c2118 ssl_set_cert_masks(c, s->s3->tmp.new_cipher);
2120 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
2121 alg_a = s->s3->tmp.new_cipher->algorithm_auth;
H A Ds3_lib.c3089 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
/barrelfish-master/include/openssl/
H A Dssl3.h472 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon248

Completed in 120 milliseconds