/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | t1_trce.c | 771 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey; local 772 if (alg_k & SSL_kRSA) { 776 if (alg_k & SSL_kDHr) { 780 if (alg_k & SSL_kDHd) { 784 if (alg_k & SSL_kKRB5) { 788 if (alg_k & SSL_kEDH) { 792 if (alg_k & SSL_kEECDH) { 796 if (alg_k & SSL_kECDHr) { 800 if (alg_k & SSL_kECDHe) { 804 if (alg_k [all...] |
H A D | s3_clnt.c | 1372 long i, param_len, n, alg_k, alg_a; local 1402 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1409 if (alg_k & (SSL_kDHE | SSL_kECDHE)) { 1420 if (alg_k & SSL_kPSK) { 1463 if (alg_k & SSL_kPSK) { 1501 if (alg_k & SSL_kSRP) { 1607 if (alg_k & SSL_kRSA) { 1682 else if (alg_k & SSL_kEDH) { 1783 } else if ((alg_k & SSL_kDHr) || (alg_k 2462 unsigned long alg_k; local 3362 unsigned long alg_k; local 3488 long alg_k, alg_a; local [all...] |
H A D | d1_srvr.c | 167 unsigned long alg_k; local 492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 510 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 512 || (alg_k & SSL_kDHE) 513 || (alg_k & SSL_kEECDH) 514 || ((alg_k & SSL_kRSA)
|
H A D | s3_srvr.c | 215 unsigned long alg_k, Time = (unsigned long)time(NULL); local 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 473 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 477 || (alg_k & SSL_kSRP) 479 || (alg_k & SSL_kEDH) 480 || (alg_k & SSL_kEECDH) 481 || ((alg_k & SSL_kRSA) 2130 unsigned long alg_k; local 2160 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2163 if (alg_k [all...] |
H A D | s3_lib.c | 4092 unsigned long alg_k, alg_a, mask_k, mask_a, emask_k, emask_a; local 4161 alg_k = c->algorithm_mkey; 4165 if (alg_k & SSL_kKRB5) { 4172 if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL) 4177 ok = (alg_k & emask_k) && (alg_a & emask_a); 4180 ok, alg_k, alg_a, emask_k, emask_a, (void *)c, c->name); 4183 ok = (alg_k & mask_k) && (alg_a & mask_a); 4185 fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k, 4197 if (alg_k & SSL_kEECDH) 4208 if ((alg_k 4232 unsigned long alg_k; local [all...] |
H A D | ssl_ciph.c | 2030 unsigned long alg_k, alg_a; local 2032 alg_k = c->algorithm_mkey; 2035 if (alg_k & (SSL_kECDHr | SSL_kECDHe)) { 2047 else if (alg_k & SSL_kDHr) 2049 else if (alg_k & SSL_kDHd)
|
H A D | t1_lib.c | 1238 unsigned long alg_k, alg_a; local 1244 alg_k = c->algorithm_mkey; 1246 if ((alg_k & (SSL_kEECDH | SSL_kECDHr | SSL_kECDHe) 1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 1616 int using_ecc = (alg_k & (SSL_kEECDH | SSL_kECDHr | SSL_kECDHe)) 3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 3135 && ((alg_k & (SSL_kEECDH | SSL_kECDHr | SSL_kECDHe))
|
H A D | ssl_lib.c | 2459 unsigned long alg_k, alg_a; local 2465 alg_k = cs->algorithm_mkey; 2485 if (alg_k & SSL_kECDHe || alg_k & SSL_kECDHr) { 2492 if ((alg_k & SSL_kECDHe) && TLS1_get_version(s) < TLS1_2_VERSION) { 2500 if ((alg_k & SSL_kECDHr) && TLS1_get_version(s) < TLS1_2_VERSION) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | t1_trce.c | 771 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey; local 772 if (alg_k & SSL_kRSA) { 776 if (alg_k & SSL_kDHr) { 780 if (alg_k & SSL_kDHd) { 784 if (alg_k & SSL_kKRB5) { 788 if (alg_k & SSL_kEDH) { 792 if (alg_k & SSL_kEECDH) { 796 if (alg_k & SSL_kECDHr) { 800 if (alg_k & SSL_kECDHe) { 804 if (alg_k [all...] |
H A D | s3_clnt.c | 1372 long i, param_len, n, alg_k, alg_a; local 1402 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1409 if (alg_k & (SSL_kDHE | SSL_kECDHE)) { 1420 if (alg_k & SSL_kPSK) { 1463 if (alg_k & SSL_kPSK) { 1501 if (alg_k & SSL_kSRP) { 1607 if (alg_k & SSL_kRSA) { 1682 else if (alg_k & SSL_kEDH) { 1783 } else if ((alg_k & SSL_kDHr) || (alg_k 2462 unsigned long alg_k; local 3362 unsigned long alg_k; local 3488 long alg_k, alg_a; local [all...] |
H A D | d1_srvr.c | 167 unsigned long alg_k; local 492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 510 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 512 || (alg_k & SSL_kDHE) 513 || (alg_k & SSL_kEECDH) 514 || ((alg_k & SSL_kRSA)
|
H A D | s3_srvr.c | 215 unsigned long alg_k, Time = (unsigned long)time(NULL); local 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 473 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 477 || (alg_k & SSL_kSRP) 479 || (alg_k & SSL_kEDH) 480 || (alg_k & SSL_kEECDH) 481 || ((alg_k & SSL_kRSA) 2130 unsigned long alg_k; local 2160 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2163 if (alg_k [all...] |
H A D | s3_lib.c | 4092 unsigned long alg_k, alg_a, mask_k, mask_a, emask_k, emask_a; local 4161 alg_k = c->algorithm_mkey; 4165 if (alg_k & SSL_kKRB5) { 4172 if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL) 4177 ok = (alg_k & emask_k) && (alg_a & emask_a); 4180 ok, alg_k, alg_a, emask_k, emask_a, (void *)c, c->name); 4183 ok = (alg_k & mask_k) && (alg_a & mask_a); 4185 fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k, 4197 if (alg_k & SSL_kEECDH) 4208 if ((alg_k 4232 unsigned long alg_k; local [all...] |
H A D | ssl_ciph.c | 2030 unsigned long alg_k, alg_a; local 2032 alg_k = c->algorithm_mkey; 2035 if (alg_k & (SSL_kECDHr | SSL_kECDHe)) { 2047 else if (alg_k & SSL_kDHr) 2049 else if (alg_k & SSL_kDHd)
|
H A D | t1_lib.c | 1238 unsigned long alg_k, alg_a; local 1244 alg_k = c->algorithm_mkey; 1246 if ((alg_k & (SSL_kEECDH | SSL_kECDHr | SSL_kECDHe) 1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 1616 int using_ecc = (alg_k & (SSL_kEECDH | SSL_kECDHr | SSL_kECDHe)) 3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; local 3135 && ((alg_k & (SSL_kEECDH | SSL_kECDHr | SSL_kECDHe))
|
H A D | ssl_lib.c | 2459 unsigned long alg_k, alg_a; local 2465 alg_k = cs->algorithm_mkey; 2485 if (alg_k & SSL_kECDHe || alg_k & SSL_kECDHr) { 2492 if ((alg_k & SSL_kECDHe) && TLS1_get_version(s) < TLS1_2_VERSION) { 2500 if ((alg_k & SSL_kECDHr) && TLS1_get_version(s) < TLS1_2_VERSION) {
|