/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | t1_trce.c | 1042 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey; local 1044 if (alg_k & SSL_kRSA) { 1048 if (alg_k & SSL_kDHE) { 1052 if (alg_k & SSL_kECDHE) { 1056 if (alg_k & SSL_kPSK) { 1060 if (alg_k & SSL_kRSAPSK) { 1064 if (alg_k & SSL_kDHEPSK) { 1068 if (alg_k & SSL_kECDHEPSK) { 1072 if (alg_k & SSL_kSRP) { 1076 if (alg_k [all...] |
H A D | s3_lib.c | 4144 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; local 4276 alg_k = c->algorithm_mkey; 4281 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) 4285 ok = (alg_k & mask_k) && (alg_a & mask_a); 4287 fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k, 4296 if (alg_k & SSL_kECDHE) 4310 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) 4340 uint32_t alg_k, alg_a = 0; local 4348 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 4351 if (s->version >= TLS1_VERSION && (alg_k 4613 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_clnt.c | 62 long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 68 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK 2262 long alg_k; local 2268 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2277 if (alg_k & SSL_PSK) { 2285 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { 2286 } else if (alg_k & SSL_kSRP) { 2291 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { 2296 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { 2301 } else if (alg_k) { 3325 unsigned long alg_k; local 3591 long alg_k, alg_a; local [all...] |
H A D | statem_srvr.c | 326 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 336 if (alg_k & (SSL_kDHE | SSL_kECDHE) 343 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) 346 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) 350 || (alg_k & SSL_kSRP) 3460 unsigned long alg_k; local 3462 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3465 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { 3470 if (alg_k & SSL_kPSK) { 3483 } else if (alg_k [all...] |
H A D | extensions.c | 1042 unsigned long alg_k, alg_a; local 1047 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1059 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) {
|
H A D | extensions_clnt.c | 119 unsigned long alg_k, alg_a; local 133 alg_k = c->algorithm_mkey; 135 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
|
H A D | extensions_srvr.c | 1386 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 1388 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/ |
H A D | t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; local 1055 if (alg_k & SSL_kRSA) { 1059 if (alg_k & SSL_kDHE) { 1063 if (alg_k & SSL_kECDHE) { 1067 if (alg_k & SSL_kPSK) { 1071 if (alg_k & SSL_kRSAPSK) { 1075 if (alg_k & SSL_kDHEPSK) { 1079 if (alg_k & SSL_kECDHEPSK) { 1083 if (alg_k & SSL_kSRP) { 1087 if (alg_k [all...] |
H A D | s3_lib.c | 4140 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; local 4268 alg_k = c->algorithm_mkey; 4273 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) 4277 ok = (alg_k & mask_k) && (alg_a & mask_a); 4280 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name); 4286 if (alg_k & SSL_kECDHE) 4299 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) 4331 uint32_t alg_k, alg_a = 0; local 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 4342 if (s->version >= TLS1_VERSION && (alg_k 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_clnt.c | 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 72 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK 2181 long alg_k; local 2187 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 2194 if (alg_k & SSL_PSK) { 2202 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { 2203 } else if (alg_k & SSL_kSRP) { 2208 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { 2213 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { 2218 } else if (alg_k) { 3284 unsigned long alg_k; local 3542 long alg_k, alg_a; local [all...] |
H A D | statem_srvr.c | 325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 335 if (alg_k & (SSL_kDHE | SSL_kECDHE) 342 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) 345 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) 349 || (alg_k & SSL_kSRP) 3283 unsigned long alg_k; local 3285 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 3288 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { 3293 if (alg_k & SSL_kPSK) { 3304 } else if (alg_k [all...] |
H A D | extensions.c | 1035 unsigned long alg_k, alg_a; local 1040 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; 1052 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) {
|
H A D | extensions_clnt.c | 114 unsigned long alg_k, alg_a; local 128 alg_k = c->algorithm_mkey; 130 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
|
H A D | extensions_srvr.c | 1312 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; local 1314 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
|