Searched refs:new_cipher (Results 1 - 25 of 37) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dd1_srvr.c305 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL))
318 l=s->s3->tmp.new_cipher->algorithms;
341 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
342 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
369 ((s->s3->tmp.new_cipher->algorithms & SSL_aNULL) &&
374 (s->s3->tmp.new_cipher->algorithms & SSL_aKRB5))
481 s->session->cipher=s->s3->tmp.new_cipher;
704 i=ssl3_put_cipher_by_char(s->s3->tmp.new_cipher,p);
786 type=s->s3->tmp.new_cipher->algorithms & SSL_MKEY_MASK;
800 SSL_C_IS_EXPORT(s->s3->tmp.new_cipher),
[all...]
H A Ds3_srvr.c304 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)
305 && !(s->s3->tmp.new_cipher->algorithms & SSL_aKRB5))
318 l=s->s3->tmp.new_cipher->algorithms;
350 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
351 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
378 ((s->s3->tmp.new_cipher->algorithms & SSL_aNULL) &&
383 (s->s3->tmp.new_cipher->algorithms & SSL_aKRB5))
505 s->session->cipher=s->s3->tmp.new_cipher;
977 s->s3->tmp.new_cipher=c;
999 s->s3->tmp.new_cipher
[all...]
H A Ds3_clnt.c268 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL))
329 l=s->s3->tmp.new_cipher->algorithms;
371 s->session->cipher=s->s3->tmp.new_cipher;
758 s->s3->tmp.new_cipher=c;
888 && (s->s3->tmp.new_cipher->algorithms & (SSL_MKEY_MASK|SSL_AUTH_MASK))
915 need_cert = ((s->s3->tmp.new_cipher->algorithms
922 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name,
923 s->s3->tmp.new_cipher->algorithms, need_cert);
1060 alg=s->s3->tmp.new_cipher->algorithms;
1241 if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
[all...]
H A Ds3_enc.c207 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
292 j=is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
293 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
H A Dd1_clnt.c277 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL))
338 l=s->s3->tmp.new_cipher->algorithms;
373 s->session->cipher=s->s3->tmp.new_cipher;
701 l=s->s3->tmp.new_cipher->algorithms;
H A Dt1_enc.c241 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
251 printf("\talg= %ld, comp= %p\n", s->s3->tmp.new_cipher->algorithms,
340 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
341 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
H A Dssl3.h408 SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon7235
H A Ds3_pkt.c1090 if (s->s3->tmp.new_cipher == NULL)
1228 s->session->cipher=s->s3->tmp.new_cipher;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dd1_srvr.c466 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
516 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
519 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
550 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
560 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)
565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
787 s->session->cipher = s->s3->tmp.new_cipher;
H A Ds3_srvr.c195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) &&
425 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aKRB5 |
427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
483 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
486 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
516 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
526 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) ||
528 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aSRP)
533 || (s->s3->tmp.new_cipher
[all...]
H A Ds3_clnt.c343 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) {
485 s->session->cipher = s->s3->tmp.new_cipher;
1098 s->s3->tmp.new_cipher = c;
1194 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) &&
1252 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1253 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
1285 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1286 (s->s3->tmp.new_cipher
[all...]
H A Dt1_enc.c343 is_export = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
354 s->s3->tmp.new_cipher->algorithm_mkey,
355 s->s3->tmp.new_cipher->algorithm_auth, comp);
370 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
416 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
465 j = is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
466 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
H A Dd1_clnt.c413 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
575 s->session->cipher = s->s3->tmp.new_cipher;
H A Ds3_enc.c231 is_exp = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
325 j = is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
326 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
H A Dssl3.h564 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon5002
H A Dt1_lib.c531 unsigned long cid = s->s3->tmp.new_cipher->id;
572 unsigned long cid = s->s3->tmp.new_cipher->id;
1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
1615 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
1743 if (((s->s3->tmp.new_cipher->id & 0xFFFF) == 0x80
1744 || (s->s3->tmp.new_cipher->id & 0xFFFF) == 0x81)
3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
3130 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dd1_srvr.c466 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
516 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
519 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
550 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
560 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)
565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
787 s->session->cipher = s->s3->tmp.new_cipher;
H A Ds3_srvr.c195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) &&
425 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aKRB5 |
427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
483 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
486 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
516 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
526 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) ||
528 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aSRP)
533 || (s->s3->tmp.new_cipher
[all...]
H A Ds3_clnt.c343 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) {
485 s->session->cipher = s->s3->tmp.new_cipher;
1098 s->s3->tmp.new_cipher = c;
1194 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) &&
1252 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1253 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
1285 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) &&
1286 (s->s3->tmp.new_cipher
[all...]
H A Dt1_enc.c343 is_export = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
354 s->s3->tmp.new_cipher->algorithm_mkey,
355 s->s3->tmp.new_cipher->algorithm_auth, comp);
370 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
416 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)
465 j = is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
466 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
H A Dd1_clnt.c413 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
575 s->session->cipher = s->s3->tmp.new_cipher;
H A Ds3_enc.c231 is_exp = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
325 j = is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ?
326 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
H A Dssl3.h564 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon4653
H A Dt1_lib.c531 unsigned long cid = s->s3->tmp.new_cipher->id;
572 unsigned long cid = s->s3->tmp.new_cipher->id;
1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
1615 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
1743 if (((s->s3->tmp.new_cipher->id & 0xFFFF) == 0x80
1744 || (s->s3->tmp.new_cipher->id & 0xFFFF) == 0x81)
3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
3130 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl3.h408 SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon7221

Completed in 233 milliseconds

12