/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslSession.c | 259 * For SSLv3 and TLSv1, we know that selectedCipher has already been specified in 265 assert(ctx->selectedCipher == 0); 266 ctx->selectedCipher = session->cipherSuite; 273 if(ctx->selectedCipher != session->cipherSuite) { 276 session->cipherSuite, ctx->selectedCipher); 282 assert(ctx->selectedCipher != 0); 283 if(ctx->selectedCipher != session->cipherSuite) { 287 session->cipherSuite, ctx->selectedCipher); 290 session->cipherSuite, ctx->selectedCipher);
|
H A D | sslTypes.h | 124 uint16_t selectedCipher,
|
H A D | tlsCallbacks.c | 131 uint16_t selectedCipher, 135 sslDebugLog("%p, cipher=%04x, server=%d\n", ctx, selectedCipher, server); 137 return myCtx->recFuncs->initPendingCiphers(myCtx->recCtx, selectedCipher, server, key); 130 tls_handshake_init_pending_cipher_callback(tls_handshake_ctx_t ctx, uint16_t selectedCipher, bool server, SSLBuffer key) argument
|
H A D | sslContext.h | 126 uint16_t selectedCipher; /* currently selected */ member in struct:SSLContext
|
H A D | SSLRecordInternal.c | 264 SSLInitInternalRecordLayerPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool isServer, SSLBuffer key) argument 267 return tls_record_init_pending_ciphers(ctx->filter, selectedCipher, isServer, key);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslSession.c | 259 * For SSLv3 and TLSv1, we know that selectedCipher has already been specified in 265 assert(ctx->selectedCipher == 0); 266 ctx->selectedCipher = session->cipherSuite; 273 if(ctx->selectedCipher != session->cipherSuite) { 276 session->cipherSuite, ctx->selectedCipher); 282 assert(ctx->selectedCipher != 0); 283 if(ctx->selectedCipher != session->cipherSuite) { 287 session->cipherSuite, ctx->selectedCipher); 290 session->cipherSuite, ctx->selectedCipher);
|
H A D | sslTypes.h | 124 uint16_t selectedCipher,
|
H A D | tlsCallbacks.c | 131 uint16_t selectedCipher, 135 sslDebugLog("%p, cipher=%04x, server=%d\n", ctx, selectedCipher, server); 137 return myCtx->recFuncs->initPendingCiphers(myCtx->recCtx, selectedCipher, server, key); 130 tls_handshake_init_pending_cipher_callback(tls_handshake_ctx_t ctx, uint16_t selectedCipher, bool server, SSLBuffer key) argument
|
H A D | sslContext.h | 126 uint16_t selectedCipher; /* currently selected */ member in struct:SSLContext
|
H A D | SSLRecordInternal.c | 264 SSLInitInternalRecordLayerPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool isServer, SSLBuffer key) argument 267 return tls_record_init_pending_ciphers(ctx->filter, selectedCipher, isServer, key);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslSession.c | 259 * For SSLv3 and TLSv1, we know that selectedCipher has already been specified in 265 assert(ctx->selectedCipher == 0); 266 ctx->selectedCipher = session->cipherSuite; 273 if(ctx->selectedCipher != session->cipherSuite) { 276 session->cipherSuite, ctx->selectedCipher); 282 assert(ctx->selectedCipher != 0); 283 if(ctx->selectedCipher != session->cipherSuite) { 287 session->cipherSuite, ctx->selectedCipher); 290 session->cipherSuite, ctx->selectedCipher);
|
H A D | sslTypes.h | 124 uint16_t selectedCipher,
|
H A D | tlsCallbacks.c | 131 uint16_t selectedCipher, 135 sslDebugLog("%p, cipher=%04x, server=%d\n", ctx, selectedCipher, server); 137 return myCtx->recFuncs->initPendingCiphers(myCtx->recCtx, selectedCipher, server, key); 130 tls_handshake_init_pending_cipher_callback(tls_handshake_ctx_t ctx, uint16_t selectedCipher, bool server, SSLBuffer key) argument
|
H A D | sslContext.h | 126 uint16_t selectedCipher; /* currently selected */ member in struct:SSLContext
|
H A D | SSLRecordInternal.c | 264 SSLInitInternalRecordLayerPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool isServer, SSLBuffer key) argument 267 return tls_record_init_pending_ciphers(ctx->filter, selectedCipher, isServer, key);
|
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/ |
H A D | tlssocket.c | 209 uint16_t selectedCipher, 218 buf[0] = selectedCipher >> 8; 219 buf[1] = selectedCipher & 0xff; 223 printf("%s: cipher=%04x, keylen=%ld\n", __FUNCTION__, selectedCipher, key.length); 208 TLSSocket_InitPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool server, SSLBuffer key) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-51-state.c | 265 uint16_t selectedCipher, 271 test_printf("%s: %p, cipher=%04x, server=%d\n", __FUNCTION__, ref, selectedCipher, server); 272 return tls_record_init_pending_ciphers(handle->record, selectedCipher, server, key); 264 mySSLRecordInitPendingCiphersFunc(tls_handshake_ctx_t ref, uint16_t selectedCipher, bool server, tls_buffer key) argument
|
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnke/ |
H A D | tlsnke.c | 700 uint16_t selectedCipher; local 714 selectedCipher = (buf[0] << 8) | buf[1]; 719 tls_printf("tlsnke(%p):%s - Init Ciphers. cipherspec=%04x. server=%d.\n", dtls_ref, __FUNCTION__, selectedCipher, server); 720 rc = SSLRecordLayerInternal.initPendingCiphers(dtls_ref->ssl_ctx, selectedCipher, server, key);
|