/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | d1_srvr.c | 305 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) 318 l=s->s3->tmp.new_cipher->algorithms; 341 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 342 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 369 ((s->s3->tmp.new_cipher->algorithms & SSL_aNULL) && 374 (s->s3->tmp.new_cipher->algorithms & SSL_aKRB5)) 481 s->session->cipher=s->s3->tmp.new_cipher; 704 i=ssl3_put_cipher_by_char(s->s3->tmp.new_cipher,p); 786 type=s->s3->tmp.new_cipher->algorithms & SSL_MKEY_MASK; 800 SSL_C_IS_EXPORT(s->s3->tmp.new_cipher), [all...] |
H A D | s3_srvr.c | 304 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL) 305 && !(s->s3->tmp.new_cipher->algorithms & SSL_aKRB5)) 318 l=s->s3->tmp.new_cipher->algorithms; 350 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 351 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 378 ((s->s3->tmp.new_cipher->algorithms & SSL_aNULL) && 383 (s->s3->tmp.new_cipher->algorithms & SSL_aKRB5)) 505 s->session->cipher=s->s3->tmp.new_cipher; 977 s->s3->tmp.new_cipher=c; 999 s->s3->tmp.new_cipher [all...] |
H A D | s3_clnt.c | 268 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) 329 l=s->s3->tmp.new_cipher->algorithms; 371 s->session->cipher=s->s3->tmp.new_cipher; 758 s->s3->tmp.new_cipher=c; 888 && (s->s3->tmp.new_cipher->algorithms & (SSL_MKEY_MASK|SSL_AUTH_MASK)) 915 need_cert = ((s->s3->tmp.new_cipher->algorithms 922 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 923 s->s3->tmp.new_cipher->algorithms, need_cert); 1060 alg=s->s3->tmp.new_cipher->algorithms; 1241 if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) [all...] |
H A D | s3_enc.c | 207 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 292 j=is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 293 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
|
H A D | d1_clnt.c | 277 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) 338 l=s->s3->tmp.new_cipher->algorithms; 373 s->session->cipher=s->s3->tmp.new_cipher; 701 l=s->s3->tmp.new_cipher->algorithms;
|
H A D | t1_enc.c | 241 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 251 printf("\talg= %ld, comp= %p\n", s->s3->tmp.new_cipher->algorithms, 340 j=is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 341 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
|
H A D | ssl3.h | 408 SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon7235
|
H A D | s3_pkt.c | 1090 if (s->s3->tmp.new_cipher == NULL) 1228 s->session->cipher=s->s3->tmp.new_cipher;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | d1_srvr.c | 466 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 516 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 519 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 550 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 560 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) 565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 787 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | s3_srvr.c | 195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 425 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aKRB5 | 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 483 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 486 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 516 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 526 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) || 528 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aSRP) 533 || (s->s3->tmp.new_cipher [all...] |
H A D | s3_clnt.c | 343 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) 344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) { 485 s->session->cipher = s->s3->tmp.new_cipher; 1098 s->s3->tmp.new_cipher = c; 1194 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) && 1252 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1253 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 1285 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1286 (s->s3->tmp.new_cipher [all...] |
H A D | t1_enc.c | 343 is_export = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 354 s->s3->tmp.new_cipher->algorithm_mkey, 355 s->s3->tmp.new_cipher->algorithm_auth, comp); 370 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) 416 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) 465 j = is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 466 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
|
H A D | d1_clnt.c | 413 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 575 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | s3_enc.c | 231 is_exp = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 325 j = is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 326 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
|
H A D | ssl3.h | 564 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon5002
|
H A D | t1_lib.c | 531 unsigned long cid = s->s3->tmp.new_cipher->id; 572 unsigned long cid = s->s3->tmp.new_cipher->id; 1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1615 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; 1743 if (((s->s3->tmp.new_cipher->id & 0xFFFF) == 0x80 1744 || (s->s3->tmp.new_cipher->id & 0xFFFF) == 0x81) 3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3130 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | d1_srvr.c | 466 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 467 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 492 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 516 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 519 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 550 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 560 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) 565 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 787 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | s3_srvr.c | 195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 425 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aKRB5 | 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 483 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 486 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 516 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 526 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) || 528 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aSRP) 533 || (s->s3->tmp.new_cipher [all...] |
H A D | s3_clnt.c | 343 new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) 344 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 400 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) { 485 s->session->cipher = s->s3->tmp.new_cipher; 1098 s->s3->tmp.new_cipher = c; 1194 ((s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5) && 1252 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1253 (s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 1285 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1286 (s->s3->tmp.new_cipher [all...] |
H A D | t1_enc.c | 343 is_export = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 354 s->s3->tmp.new_cipher->algorithm_mkey, 355 s->s3->tmp.new_cipher->algorithm_auth, comp); 370 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) 416 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) 465 j = is_export ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 466 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
|
H A D | d1_clnt.c | 413 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 414 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 575 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | s3_enc.c | 231 is_exp = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 325 j = is_exp ? (cl < SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher) ? 326 cl : SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) : cl;
|
H A D | ssl3.h | 564 const SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon4653
|
H A D | t1_lib.c | 531 unsigned long cid = s->s3->tmp.new_cipher->id; 572 unsigned long cid = s->s3->tmp.new_cipher->id; 1614 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1615 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; 1743 if (((s->s3->tmp.new_cipher->id & 0xFFFF) == 0x80 1744 || (s->s3->tmp.new_cipher->id & 0xFFFF) == 0x81) 3129 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3130 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl3.h | 408 SSL_CIPHER *new_cipher; member in struct:ssl3_state_st::__anon7221
|