Searched refs:selectedCipher (Results 1 - 18 of 18) sorted by relevance

/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslSession.c259 * For SSLv3 and TLSv1, we know that selectedCipher has already been specified in
265 assert(ctx->selectedCipher == 0);
266 ctx->selectedCipher = session->cipherSuite;
273 if(ctx->selectedCipher != session->cipherSuite) {
276 session->cipherSuite, ctx->selectedCipher);
282 assert(ctx->selectedCipher != 0);
283 if(ctx->selectedCipher != session->cipherSuite) {
287 session->cipherSuite, ctx->selectedCipher);
290 session->cipherSuite, ctx->selectedCipher);
H A DsslTypes.h124 uint16_t selectedCipher,
H A DtlsCallbacks.c131 uint16_t selectedCipher,
135 sslDebugLog("%p, cipher=%04x, server=%d\n", ctx, selectedCipher, server);
137 return myCtx->recFuncs->initPendingCiphers(myCtx->recCtx, selectedCipher, server, key);
130 tls_handshake_init_pending_cipher_callback(tls_handshake_ctx_t ctx, uint16_t selectedCipher, bool server, SSLBuffer key) argument
H A DsslContext.h126 uint16_t selectedCipher; /* currently selected */ member in struct:SSLContext
H A DSSLRecordInternal.c264 SSLInitInternalRecordLayerPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool isServer, SSLBuffer key) argument
267 return tls_record_init_pending_ciphers(ctx->filter, selectedCipher, isServer, key);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslSession.c259 * For SSLv3 and TLSv1, we know that selectedCipher has already been specified in
265 assert(ctx->selectedCipher == 0);
266 ctx->selectedCipher = session->cipherSuite;
273 if(ctx->selectedCipher != session->cipherSuite) {
276 session->cipherSuite, ctx->selectedCipher);
282 assert(ctx->selectedCipher != 0);
283 if(ctx->selectedCipher != session->cipherSuite) {
287 session->cipherSuite, ctx->selectedCipher);
290 session->cipherSuite, ctx->selectedCipher);
H A DsslTypes.h124 uint16_t selectedCipher,
H A DtlsCallbacks.c131 uint16_t selectedCipher,
135 sslDebugLog("%p, cipher=%04x, server=%d\n", ctx, selectedCipher, server);
137 return myCtx->recFuncs->initPendingCiphers(myCtx->recCtx, selectedCipher, server, key);
130 tls_handshake_init_pending_cipher_callback(tls_handshake_ctx_t ctx, uint16_t selectedCipher, bool server, SSLBuffer key) argument
H A DsslContext.h126 uint16_t selectedCipher; /* currently selected */ member in struct:SSLContext
H A DSSLRecordInternal.c264 SSLInitInternalRecordLayerPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool isServer, SSLBuffer key) argument
267 return tls_record_init_pending_ciphers(ctx->filter, selectedCipher, isServer, key);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslSession.c259 * For SSLv3 and TLSv1, we know that selectedCipher has already been specified in
265 assert(ctx->selectedCipher == 0);
266 ctx->selectedCipher = session->cipherSuite;
273 if(ctx->selectedCipher != session->cipherSuite) {
276 session->cipherSuite, ctx->selectedCipher);
282 assert(ctx->selectedCipher != 0);
283 if(ctx->selectedCipher != session->cipherSuite) {
287 session->cipherSuite, ctx->selectedCipher);
290 session->cipherSuite, ctx->selectedCipher);
H A DsslTypes.h124 uint16_t selectedCipher,
H A DtlsCallbacks.c131 uint16_t selectedCipher,
135 sslDebugLog("%p, cipher=%04x, server=%d\n", ctx, selectedCipher, server);
137 return myCtx->recFuncs->initPendingCiphers(myCtx->recCtx, selectedCipher, server, key);
130 tls_handshake_init_pending_cipher_callback(tls_handshake_ctx_t ctx, uint16_t selectedCipher, bool server, SSLBuffer key) argument
H A DsslContext.h126 uint16_t selectedCipher; /* currently selected */ member in struct:SSLContext
H A DSSLRecordInternal.c264 SSLInitInternalRecordLayerPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool isServer, SSLBuffer key) argument
267 return tls_record_init_pending_ciphers(ctx->filter, selectedCipher, isServer, key);
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/
H A Dtlssocket.c209 uint16_t selectedCipher,
218 buf[0] = selectedCipher >> 8;
219 buf[1] = selectedCipher & 0xff;
223 printf("%s: cipher=%04x, keylen=%ld\n", __FUNCTION__, selectedCipher, key.length);
208 TLSSocket_InitPendingCiphers(SSLRecordContextRef ref, uint16_t selectedCipher, bool server, SSLBuffer key) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-51-state.c265 uint16_t selectedCipher,
271 test_printf("%s: %p, cipher=%04x, server=%d\n", __FUNCTION__, ref, selectedCipher, server);
272 return tls_record_init_pending_ciphers(handle->record, selectedCipher, server, key);
264 mySSLRecordInitPendingCiphersFunc(tls_handshake_ctx_t ref, uint16_t selectedCipher, bool server, tls_buffer key) argument
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnke/
H A Dtlsnke.c700 uint16_t selectedCipher; local
714 selectedCipher = (buf[0] << 8) | buf[1];
719 tls_printf("tlsnke(%p):%s - Init Ciphers. cipherspec=%04x. server=%d.\n", dtls_ref, __FUNCTION__, selectedCipher, server);
720 rc = SSLRecordLayerInternal.initPendingCiphers(dtls_ref->ssl_ctx, selectedCipher, server, key);

Completed in 365 milliseconds