/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_both.c | 127 /* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or SSL3_RT_CHANGE_CIPHER_SPEC) */ 135 if (type == SSL3_RT_HANDSHAKE) 187 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 394 i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, 418 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, p, 4, s, s->msg_callback_arg); 475 i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE,&p[s->init_num],n,0); 487 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data, (size_t)s->init_num + 4, s, s->msg_callback_arg);
|
H A D | d1_both.c | 174 /* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or SSL3_RT_CHANGE_CIPHER_SPEC) */ 223 if ( s->init_off == 0 && type == SSL3_RT_HANDSHAKE) 249 if ( type == SSL3_RT_HANDSHAKE) 294 if (type == SSL3_RT_HANDSHAKE && ! s->d1->retransmitting) 505 i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, 550 i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE,&p[s->init_num], 595 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 678 i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, 745 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data, 798 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); [all...] |
H A D | d1_pkt.c | 631 * - SSL3_RT_HANDSHAKE (when ssl3_get_message calls us) 668 (type != SSL3_RT_HANDSHAKE) && type) || 679 /* Now s->d1->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. */ 721 && (rr->type != SSL3_RT_HANDSHAKE)) 738 if (type == rr->type) /* SSL3_RT_APPLICATION_DATA or SSL3_RT_HANDSHAKE */ 783 if (rr->type == SSL3_RT_HANDSHAKE) 826 /* s->d1->handshake_fragment_len == 12 iff rr->type == SSL3_RT_HANDSHAKE; 850 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 1090 case SSL3_RT_HANDSHAKE: 1092 * of SSL3_RT_HANDSHAKE whe [all...] |
H A D | d1_srvr.c | 610 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 654 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 733 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 757 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 997 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 1096 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 1129 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE));
|
H A D | s23_clnt.c | 382 *(d++) = SSL3_RT_HANDSHAKE; 409 s->msg_callback(1, version, SSL3_RT_HANDSHAKE, s->init_buf->data+5, ret-5, s, s->msg_callback_arg); 496 else if ((p[0] == SSL3_RT_HANDSHAKE) &&
|
H A D | s3_pkt.c | 766 * - SSL3_RT_HANDSHAKE (when ssl3_get_message calls us) 801 if ((type && (type != SSL3_RT_APPLICATION_DATA) && (type != SSL3_RT_HANDSHAKE) && type) || 808 if ((type == SSL3_RT_HANDSHAKE) && (s->s3->handshake_fragment_len > 0)) 829 /* Now s->s3->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. */ 862 && (rr->type != SSL3_RT_HANDSHAKE)) 879 if (type == rr->type) /* SSL3_RT_APPLICATION_DATA or SSL3_RT_HANDSHAKE */ 924 if (rr->type == SSL3_RT_HANDSHAKE) 955 /* s->s3->handshake_fragment_len == 4 iff rr->type == SSL3_RT_HANDSHAKE; 977 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->s3->handshake_fragment, 4, s, s->msg_callback_arg); 1169 case SSL3_RT_HANDSHAKE [all...] |
H A D | d1_clnt.c | 627 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 978 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 1056 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); 1140 return(dtls1_do_write(s,SSL3_RT_HANDSHAKE));
|
H A D | s3_srvr.c | 626 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 1105 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 1129 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 1544 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 1640 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 2553 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE));
|
H A D | s23_srvr.c | 314 else if ((p[0] == SSL3_RT_HANDSHAKE) &&
|
H A D | ssl3.h | 275 #define SSL3_RT_HANDSHAKE 22 macro
|
H A D | s3_clnt.c | 616 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 2101 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 2196 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE)); 2275 return(ssl3_do_write(s,SSL3_RT_HANDSHAKE));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | d1_both.c | 261 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 277 if (s->init_off == 0 && type == SSL3_RT_HANDSHAKE) 302 if (type == SSL3_RT_HANDSHAKE && s->init_off != 0) { 376 if (type == SSL3_RT_HANDSHAKE) { 421 if (type == SSL3_RT_HANDSHAKE && !s->d1->retransmitting) { 542 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 721 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 734 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 817 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 843 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, [all...] |
H A D | d1_pkt.c | 697 if (!(s->d1->listen && rr->type == SSL3_RT_HANDSHAKE && 747 * - SSL3_RT_HANDSHAKE (when ssl3_get_message calls us) 784 (type != SSL3_RT_HANDSHAKE) && type) || 797 * Now s->d1->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. 876 if (s->d1->listen && rr->type != SSL3_RT_HANDSHAKE) { 885 && (rr->type != SSL3_RT_HANDSHAKE)) { 911 * SSL3_RT_HANDSHAKE */ 983 if (rr->type == SSL3_RT_HANDSHAKE) { 1055 * s->d1->handshake_fragment_len == 12 iff rr->type == SSL3_RT_HANDSHAKE; 1080 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, [all...] |
H A D | s3_both.c | 128 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 139 if (type == SSL3_RT_HANDSHAKE) 371 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 396 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 438 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, &p[s->init_num], 461 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data,
|
H A D | s23_clnt.c | 573 *(d++) = SSL3_RT_HANDSHAKE; 608 s->msg_callback(1, version, SSL3_RT_HANDSHAKE, 706 ((p[0] == SSL3_RT_HANDSHAKE && p[5] == SSL3_MT_SERVER_HELLO) ||
|
H A D | s3_pkt.c | 1136 * - SSL3_RT_HANDSHAKE (when ssl3_get_message calls us) 1172 && (type != SSL3_RT_HANDSHAKE)) || (peek 1179 if ((type == SSL3_RT_HANDSHAKE) && (s->s3->handshake_fragment_len > 0)) 1201 * Now s->s3->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. 1236 && (rr->type != SSL3_RT_HANDSHAKE)) { 1253 * SSL3_RT_HANDSHAKE */ 1302 if (rr->type == SSL3_RT_HANDSHAKE) { 1341 * s->s3->handshake_fragment_len == 4 iff rr->type == SSL3_RT_HANDSHAKE; 1362 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 1596 case SSL3_RT_HANDSHAKE [all...] |
H A D | d1_lib.c | 572 return dtls1_do_write(s, SSL3_RT_HANDSHAKE);
|
H A D | s23_srvr.c | 329 else if ((p[0] == SSL3_RT_HANDSHAKE) &&
|
H A D | ssl3.h | 361 # define SSL3_RT_HANDSHAKE 22 macro
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | d1_both.c | 261 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 277 if (s->init_off == 0 && type == SSL3_RT_HANDSHAKE) 302 if (type == SSL3_RT_HANDSHAKE && s->init_off != 0) { 376 if (type == SSL3_RT_HANDSHAKE) { 421 if (type == SSL3_RT_HANDSHAKE && !s->d1->retransmitting) { 542 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 721 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 734 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 817 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 843 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, [all...] |
H A D | d1_pkt.c | 697 if (!(s->d1->listen && rr->type == SSL3_RT_HANDSHAKE && 747 * - SSL3_RT_HANDSHAKE (when ssl3_get_message calls us) 784 (type != SSL3_RT_HANDSHAKE) && type) || 797 * Now s->d1->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. 876 if (s->d1->listen && rr->type != SSL3_RT_HANDSHAKE) { 885 && (rr->type != SSL3_RT_HANDSHAKE)) { 911 * SSL3_RT_HANDSHAKE */ 983 if (rr->type == SSL3_RT_HANDSHAKE) { 1055 * s->d1->handshake_fragment_len == 12 iff rr->type == SSL3_RT_HANDSHAKE; 1080 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, [all...] |
H A D | s3_both.c | 128 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 139 if (type == SSL3_RT_HANDSHAKE) 371 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, 396 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 438 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, &p[s->init_num], 461 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data,
|
H A D | s23_clnt.c | 573 *(d++) = SSL3_RT_HANDSHAKE; 608 s->msg_callback(1, version, SSL3_RT_HANDSHAKE, 706 ((p[0] == SSL3_RT_HANDSHAKE && p[5] == SSL3_MT_SERVER_HELLO) ||
|
H A D | s3_pkt.c | 1136 * - SSL3_RT_HANDSHAKE (when ssl3_get_message calls us) 1172 && (type != SSL3_RT_HANDSHAKE)) || (peek 1179 if ((type == SSL3_RT_HANDSHAKE) && (s->s3->handshake_fragment_len > 0)) 1201 * Now s->s3->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. 1236 && (rr->type != SSL3_RT_HANDSHAKE)) { 1253 * SSL3_RT_HANDSHAKE */ 1302 if (rr->type == SSL3_RT_HANDSHAKE) { 1341 * s->s3->handshake_fragment_len == 4 iff rr->type == SSL3_RT_HANDSHAKE; 1362 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 1596 case SSL3_RT_HANDSHAKE [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl3.h | 275 #define SSL3_RT_HANDSHAKE 22 macro
|