Lines Matching defs:tmp
240 TLS_GROUP_INFO *tmp = NULL;
243 tmp = OPENSSL_malloc(sizeof(TLS_GROUP_INFO)
246 tmp = OPENSSL_realloc(ctx->group_list,
250 if (tmp == NULL) {
254 ctx->group_list = tmp;
255 memset(tmp + ctx->group_list_max_len,
596 * a tmp key, or 0 if there is no match.
613 unsigned long cid = s->s3.tmp.new_cipher->id;
715 uint16_t *tmp =
718 if (tmp == NULL)
721 garg->gid_arr = tmp;
788 if (tls1_suiteb(s) && s->s3.tmp.new_cipher != NULL) {
789 unsigned long cid = s->s3.tmp.new_cipher->id;
1279 if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) {
1288 if (idx == SSL_PKEY_GOST01 && s->s3.tmp.new_cipher->algorithm_auth != SSL_aGOST01) {
1346 s->s3.tmp.peer_sigalg = lu;
1578 s->s3.tmp.peer_sigalg = lu;
1584 if (s->s3.tmp.peer_sigalg == NULL)
1586 *pnid = s->s3.tmp.peer_sigalg->sig;
1592 if (s->s3.tmp.sigalg == NULL)
1594 *pnid = s->s3.tmp.sigalg->sig;
1610 s->s3.tmp.mask_a = 0;
1611 s->s3.tmp.mask_k = 0;
1612 ssl_set_sig_mask(&s->s3.tmp.mask_a, s, SSL_SECOP_SIGALG_MASK);
1613 if (ssl_get_min_max_version(s, &s->s3.tmp.min_ver,
1614 &s->s3.tmp.max_ver, NULL) != 0)
1619 s->s3.tmp.mask_a |= SSL_aPSK;
1620 s->s3.tmp.mask_k |= SSL_PSK;
1625 s->s3.tmp.mask_a |= SSL_aSRP;
1626 s->s3.tmp.mask_k |= SSL_kSRP;
1643 if (c->algorithm_mkey & s->s3.tmp.mask_k
1644 || c->algorithm_auth & s->s3.tmp.mask_a)
1646 if (s->s3.tmp.max_ver == 0)
1659 if ((min_tls > s->s3.tmp.max_ver) || (c->max_tls < s->s3.tmp.min_ver))
1662 if (SSL_IS_DTLS(s) && (DTLS_VERSION_GT(c->min_dtls, s->s3.tmp.max_ver)
1663 || DTLS_VERSION_LT(c->max_dtls, s->s3.tmp.min_ver)))
1686 s->s3.tmp.valid_flags[i] = 0;
1691 if (s->s3.tmp.peer_cert_sigalgs == NULL
1692 && s->s3.tmp.peer_sigalgs == NULL) {
1705 s->s3.tmp.valid_flags[i] = CERT_PKEY_SIGN;
2064 if (!s->server && !SSL_IS_DTLS(s) && s->s3.tmp.min_ver >= TLS1_3_VERSION
2082 && s->s3.tmp.max_ver >= TLS1_3_VERSION) {
2092 if (s->s3.tmp.min_ver >= TLS1_3_VERSION)
2235 allow = s->s3.tmp.peer_sigalgs;
2236 allowlen = s->s3.tmp.peer_sigalgslen;
2240 pref = s->s3.tmp.peer_sigalgs;
2241 preflen = s->s3.tmp.peer_sigalgslen;
2301 return tls1_save_u16(pkt, &s->s3.tmp.peer_cert_sigalgs,
2302 &s->s3.tmp.peer_cert_sigalgslen);
2304 return tls1_save_u16(pkt, &s->s3.tmp.peer_sigalgs,
2305 &s->s3.tmp.peer_sigalgslen);
2314 uint32_t *pvalid = s->s3.tmp.valid_flags;
2340 uint16_t *psig = s->s3.tmp.peer_sigalgs;
2341 size_t numsigalgs = s->s3.tmp.peer_sigalgslen;
2579 if (SSL_IS_TLS13(s) && s->s3.tmp.peer_cert_sigalgs != NULL) {
2585 sigalgslen = s->s3.tmp.peer_cert_sigalgslen;
2592 ? tls1_lookup_sigalg(s, s->s3.tmp.peer_cert_sigalgs[i])
2647 pvalid = s->s3.tmp.valid_flags + idx;
2664 pvalid = s->s3.tmp.valid_flags + idx;
2691 if (s->s3.tmp.peer_cert_sigalgs != NULL
2692 || s->s3.tmp.peer_sigalgs != NULL) {
2813 const uint8_t *ctypes = s->s3.tmp.ctype;
2816 for (j = 0; j < s->s3.tmp.ctype_len; j++, ctypes++) {
2828 ca_dn = s->s3.tmp.peer_ca_names;
2905 if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aPSK)) {
2906 if (s->s3.tmp.new_cipher->strength_bits == 256)
2911 if (s->s3.tmp.cert == NULL)
2913 dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey);
3054 || (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0
3056 && (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0))
3059 return s->s3.tmp.valid_flags[sig_idx] & CERT_PKEY_VALID ? sig_idx : -1;
3092 if (s->s3.tmp.peer_cert_sigalgs != NULL) {
3095 for (i = 0; i < s->s3.tmp.peer_cert_sigalgslen; i++) {
3096 lu = tls1_lookup_sigalg(s, s->s3.tmp.peer_cert_sigalgs[i]);
3224 s->s3.tmp.cert = NULL;
3225 s->s3.tmp.sigalg = NULL;
3238 if (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aCERT))
3245 if (s->s3.tmp.peer_sigalgs != NULL) {
3289 if (i == s->shared_sigalgslen && s->s3.tmp.new_cipher->algorithm_auth & (SSL_aGOST01 | SSL_aGOST12)) {
3351 s->s3.tmp.cert = &s->cert->pkeys[sig_idx];
3352 s->cert->key = s->s3.tmp.cert;
3353 s->s3.tmp.sigalg = lu;