Searched refs:algorithm_mkey (Results 1 - 24 of 24) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s23_lib.c | 113 if (c->algorithm_mkey == SSL_kECDHr || 114 c->algorithm_mkey == SSL_kECDHe || 115 c->algorithm_mkey == SSL_kEECDH ||
|
H A D | ssl_ciph.c | 850 !(c->algorithm_mkey & disabled_mkey) && 862 c->algorithm_mkey, c->algorithm_auth); 930 unsigned long algorithm_mkey = cipher_aliases[i].algorithm_mkey; local 936 if (algorithm_mkey) 937 if ((algorithm_mkey & mask_mkey) == 0) 1024 cp->name, cp->algorithm_mkey, cp->algorithm_auth, 1032 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) 1265 if (ca_list[j]->algorithm_mkey) { 1267 alg_mkey &= ca_list[j]->algorithm_mkey; [all...] |
H A D | d1_srvr.c | 467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | s3_srvr.c | 195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 533 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1626 type = s->s3->tmp.new_cipher->algorithm_mkey; 1868 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 2160 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3325 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5)) {
|
H A D | s3_clnt.c | 344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) { 1063 c->algorithm_mkey & ct->mask_k || c->algorithm_auth & ct->mask_a) { 1252 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1285 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1294 s->s3->tmp.new_cipher->algorithm_mkey, 1402 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2482 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3375 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3500 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; [all...] |
H A D | d1_clnt.c | 414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | t1_trce.c | 771 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | s3_lib.c | 4161 alg_k = c->algorithm_mkey; 4260 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | t1_enc.c | 354 s->s3->tmp.new_cipher->algorithm_mkey,
|
H A D | t1_lib.c | 1244 alg_k = c->algorithm_mkey; 1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | ssl_lib.c | 1466 c->algorithm_mkey & ct->mask_k || c->algorithm_auth & ct->mask_a) 2465 alg_k = cs->algorithm_mkey;
|
H A D | ssl.h | 426 unsigned long algorithm_mkey; /* key exchange algorithm */ member in struct:ssl_cipher_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s23_lib.c | 113 if (c->algorithm_mkey == SSL_kECDHr || 114 c->algorithm_mkey == SSL_kECDHe || 115 c->algorithm_mkey == SSL_kEECDH ||
|
H A D | ssl_ciph.c | 850 !(c->algorithm_mkey & disabled_mkey) && 862 c->algorithm_mkey, c->algorithm_auth); 930 unsigned long algorithm_mkey = cipher_aliases[i].algorithm_mkey; local 936 if (algorithm_mkey) 937 if ((algorithm_mkey & mask_mkey) == 0) 1024 cp->name, cp->algorithm_mkey, cp->algorithm_auth, 1032 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) 1265 if (ca_list[j]->algorithm_mkey) { 1267 alg_mkey &= ca_list[j]->algorithm_mkey; [all...] |
H A D | d1_srvr.c | 467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | s3_srvr.c | 195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 533 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1626 type = s->s3->tmp.new_cipher->algorithm_mkey; 1868 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 2160 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3325 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5)) {
|
H A D | s3_clnt.c | 344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) { 1063 c->algorithm_mkey & ct->mask_k || c->algorithm_auth & ct->mask_a) { 1252 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1285 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1294 s->s3->tmp.new_cipher->algorithm_mkey, 1402 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2482 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3375 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3500 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; [all...] |
H A D | d1_clnt.c | 414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | t1_trce.c | 771 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | s3_lib.c | 4161 alg_k = c->algorithm_mkey; 4260 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | t1_enc.c | 354 s->s3->tmp.new_cipher->algorithm_mkey,
|
H A D | t1_lib.c | 1244 alg_k = c->algorithm_mkey; 1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | ssl_lib.c | 1466 c->algorithm_mkey & ct->mask_k || c->algorithm_auth & ct->mask_a) 2465 alg_k = cs->algorithm_mkey;
|
H A D | ssl.h | 426 unsigned long algorithm_mkey; /* key exchange algorithm */ member in struct:ssl_cipher_st
|
Completed in 248 milliseconds