Searched refs:SSL_kPSK (Results 1 - 20 of 20) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | d1_srvr.c | 467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 510 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | ssl_ciph.c | 265 {0, SSL_TXT_kPSK, 0, SSL_kPSK, 0, 0, 0, 0, 0, 0, 0, 0}, 296 {0, SSL_TXT_PSK, 0, SSL_kPSK, SSL_aPSK, 0, 0, 0, 0, 0, 0, 0}, 759 *mkey |= SSL_kPSK; 1558 ssl_cipher_apply_rule(0, SSL_kPSK, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, 1731 case SSL_kPSK:
|
H A D | s3_srvr.c | 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 473 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 533 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1829 if (type & SSL_kPSK) { 1868 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1923 if (type & SSL_kPSK) { 2725 if (alg_k & SSL_kPSK) {
|
H A D | t1_trce.c | 804 if (alg_k & SSL_kPSK) { 806 return SSL_kPSK;
|
H A D | s3_lib.c | 1710 SSL_kPSK, 1726 SSL_kPSK, 1742 SSL_kPSK, 1758 SSL_kPSK, 4172 if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL)
|
H A D | d1_clnt.c | 414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | s3_clnt.c | 344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1420 if (alg_k & SSL_kPSK) { 1463 if (alg_k & SSL_kPSK) { 2010 if (!(alg_a & (SSL_aNULL | SSL_aSRP)) && !(alg_k & SSL_kPSK)) { 3109 else if (alg_k & SSL_kPSK) { 3504 if ((alg_a & (SSL_aNULL | SSL_aKRB5)) || (alg_k & SSL_kPSK))
|
H A D | ssl_locl.h | 312 # define SSL_kPSK 0x00000100L macro
|
H A D | ssl_lib.c | 2438 mask_k |= SSL_kPSK; 2440 emask_k |= SSL_kPSK;
|
H A D | t1_lib.c | 1215 c->mask_k |= SSL_kPSK;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | d1_srvr.c | 467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 510 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | ssl_ciph.c | 265 {0, SSL_TXT_kPSK, 0, SSL_kPSK, 0, 0, 0, 0, 0, 0, 0, 0}, 296 {0, SSL_TXT_PSK, 0, SSL_kPSK, SSL_aPSK, 0, 0, 0, 0, 0, 0, 0}, 759 *mkey |= SSL_kPSK; 1558 ssl_cipher_apply_rule(0, SSL_kPSK, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, 1731 case SSL_kPSK:
|
H A D | s3_srvr.c | 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 473 || ((alg_k & SSL_kPSK) && s->ctx->psk_identity_hint) 533 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1829 if (type & SSL_kPSK) { 1868 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1923 if (type & SSL_kPSK) { 2725 if (alg_k & SSL_kPSK) {
|
H A D | t1_trce.c | 804 if (alg_k & SSL_kPSK) { 806 return SSL_kPSK;
|
H A D | s3_lib.c | 1710 SSL_kPSK, 1726 SSL_kPSK, 1742 SSL_kPSK, 1758 SSL_kPSK, 4172 if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL)
|
H A D | d1_clnt.c | 414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) {
|
H A D | s3_clnt.c | 344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 1420 if (alg_k & SSL_kPSK) { 1463 if (alg_k & SSL_kPSK) { 2010 if (!(alg_a & (SSL_aNULL | SSL_aSRP)) && !(alg_k & SSL_kPSK)) { 3109 else if (alg_k & SSL_kPSK) { 3504 if ((alg_a & (SSL_aNULL | SSL_aKRB5)) || (alg_k & SSL_kPSK))
|
H A D | ssl_locl.h | 312 # define SSL_kPSK 0x00000100L macro
|
H A D | ssl_lib.c | 2438 mask_k |= SSL_kPSK; 2440 emask_k |= SSL_kPSK;
|
H A D | t1_lib.c | 1215 c->mask_k |= SSL_kPSK;
|
Completed in 238 milliseconds