Searched refs:decrypt_good (Results 1 - 4 of 4) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s2_srvr.c | 383 unsigned char decrypt_good; local 546 decrypt_good = constant_time_eq_int_8(i, (int)num_encrypted_key_bytes); 549 constant_time_select_8(decrypt_good, p[s->s2->tmp.clear + j],
|
H A D | s3_srvr.c | 2166 unsigned char decrypt_good, version_good; local 2243 * decrypt_len should be SSL_MAX_MASTER_KEY_LENGTH. decrypt_good will 2246 decrypt_good = 2281 * Both decryption and version must be good for decrypt_good to 2284 decrypt_good &= version_good; 2293 p[j] = constant_time_select_8(decrypt_good, p[j],
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s2_srvr.c | 383 unsigned char decrypt_good; local 546 decrypt_good = constant_time_eq_int_8(i, (int)num_encrypted_key_bytes); 549 constant_time_select_8(decrypt_good, p[s->s2->tmp.clear + j],
|
H A D | s3_srvr.c | 2166 unsigned char decrypt_good, version_good; local 2243 * decrypt_len should be SSL_MAX_MASTER_KEY_LENGTH. decrypt_good will 2246 decrypt_good = 2281 * Both decryption and version must be good for decrypt_good to 2284 decrypt_good &= version_good; 2293 p[j] = constant_time_select_8(decrypt_good, p[j],
|
Completed in 113 milliseconds