/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected() local 72 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK in key_exchange_expected() 2189 long alg_k; in tls_process_key_exchange() local 2195 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_key_exchange() 2202 if (alg_k & SSL_PSK) { in tls_process_key_exchange() 2210 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { in tls_process_key_exchange() 2211 } else if (alg_k & SSL_kSRP) { in tls_process_key_exchange() 2216 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { in tls_process_key_exchange() 2221 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { in tls_process_key_exchange() 2226 } else if (alg_k) { in tls_process_key_exchange() 3292 unsigned long alg_k; tls_construct_client_key_exchange() local 3550 long alg_k, alg_a; ssl3_check_cert_and_algorithm() local [all...] |
H A D | statem_srvr.c | 326 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange() local 336 if (alg_k & (SSL_kDHE | SSL_kECDHE) in send_server_key_exchange() 343 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) in send_server_key_exchange() 346 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) in send_server_key_exchange() 350 || (alg_k & SSL_kSRP) in send_server_key_exchange() 3304 unsigned long alg_k; in tls_process_client_key_exchange() local 3306 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_client_key_exchange() 3309 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { in tls_process_client_key_exchange() 3314 if (alg_k & SSL_kPSK) { in tls_process_client_key_exchange() 3325 } else if (alg_k in tls_process_client_key_exchange() [all...] |
H A D | extensions.c | 1063 unsigned long alg_k, alg_a; in final_ec_pt_formats() local 1068 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats() 1080 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) { in final_ec_pt_formats()
|
H A D | extensions_clnt.c | 114 unsigned long alg_k, alg_a; in use_ecc() local 128 alg_k = c->algorithm_mkey; in use_ecc() 130 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) in use_ecc()
|
H A D | extensions_srvr.c | 1346 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats() local 1348 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA)) in tls_construct_stoc_ec_pt_formats()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected() local 72 if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK in key_exchange_expected() 2181 long alg_k; in tls_process_key_exchange() local 2187 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_key_exchange() 2194 if (alg_k & SSL_PSK) { in tls_process_key_exchange() 2202 if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { in tls_process_key_exchange() 2203 } else if (alg_k & SSL_kSRP) { in tls_process_key_exchange() 2208 } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { in tls_process_key_exchange() 2213 } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { in tls_process_key_exchange() 2218 } else if (alg_k) { in tls_process_key_exchange() 3284 unsigned long alg_k; tls_construct_client_key_exchange() local 3542 long alg_k, alg_a; ssl3_check_cert_and_algorithm() local [all...] |
H A D | statem_srvr.c | 325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange() local 335 if (alg_k & (SSL_kDHE | SSL_kECDHE) in send_server_key_exchange() 342 || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) in send_server_key_exchange() 345 || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) in send_server_key_exchange() 349 || (alg_k & SSL_kSRP) in send_server_key_exchange() 3283 unsigned long alg_k; in tls_process_client_key_exchange() local 3285 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_client_key_exchange() 3288 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { in tls_process_client_key_exchange() 3293 if (alg_k & SSL_kPSK) { in tls_process_client_key_exchange() 3304 } else if (alg_k in tls_process_client_key_exchange() [all...] |
H A D | extensions.c | 1035 unsigned long alg_k, alg_a; in final_ec_pt_formats() local 1040 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats() 1052 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) { in final_ec_pt_formats()
|
H A D | extensions_clnt.c | 114 unsigned long alg_k, alg_a; in use_ecc() local 128 alg_k = c->algorithm_mkey; in use_ecc() 130 if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) in use_ecc()
|
H A D | extensions_srvr.c | 1312 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats() local 1314 int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA)) in tls_construct_stoc_ec_pt_formats()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex() local 1055 if (alg_k & SSL_kRSA) { in ssl_get_keyex() 1059 if (alg_k & SSL_kDHE) { in ssl_get_keyex() 1063 if (alg_k & SSL_kECDHE) { in ssl_get_keyex() 1067 if (alg_k & SSL_kPSK) { in ssl_get_keyex() 1071 if (alg_k & SSL_kRSAPSK) { in ssl_get_keyex() 1075 if (alg_k & SSL_kDHEPSK) { in ssl_get_keyex() 1079 if (alg_k & SSL_kECDHEPSK) { in ssl_get_keyex() 1083 if (alg_k & SSL_kSRP) { in ssl_get_keyex() 1087 if (alg_k in ssl_get_keyex() [all...] |
H A D | s3_lib.c | 4140 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; in ssl3_choose_cipher() local 4268 alg_k = c->algorithm_mkey; in ssl3_choose_cipher() 4273 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) in ssl3_choose_cipher() 4277 ok = (alg_k & mask_k) && (alg_a & mask_a); in ssl3_choose_cipher() 4280 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name); in ssl3_choose_cipher() 4286 if (alg_k & SSL_kECDHE) in ssl3_choose_cipher() 4299 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) in ssl3_choose_cipher() 4331 uint32_t alg_k, alg_a = 0; in ssl3_get_req_cert_type() local 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type() 4342 if (s->version >= TLS1_VERSION && (alg_k in ssl3_get_req_cert_type() 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; ssl_generate_master_secret() local [all...] |
/third_party/openssl/ssl/ |
H A D | t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex() local 1055 if (alg_k & SSL_kRSA) { in ssl_get_keyex() 1059 if (alg_k & SSL_kDHE) { in ssl_get_keyex() 1063 if (alg_k & SSL_kECDHE) { in ssl_get_keyex() 1067 if (alg_k & SSL_kPSK) { in ssl_get_keyex() 1071 if (alg_k & SSL_kRSAPSK) { in ssl_get_keyex() 1075 if (alg_k & SSL_kDHEPSK) { in ssl_get_keyex() 1079 if (alg_k & SSL_kECDHEPSK) { in ssl_get_keyex() 1083 if (alg_k & SSL_kSRP) { in ssl_get_keyex() 1087 if (alg_k in ssl_get_keyex() [all...] |
H A D | s3_lib.c | 4140 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; in ssl3_choose_cipher() local 4268 alg_k = c->algorithm_mkey; in ssl3_choose_cipher() 4273 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) in ssl3_choose_cipher() 4277 ok = (alg_k & mask_k) && (alg_a & mask_a); in ssl3_choose_cipher() 4280 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name); in ssl3_choose_cipher() 4286 if (alg_k & SSL_kECDHE) in ssl3_choose_cipher() 4299 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) in ssl3_choose_cipher() 4331 uint32_t alg_k, alg_a = 0; in ssl3_get_req_cert_type() local 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type() 4342 if (s->version >= TLS1_VERSION && (alg_k in ssl3_get_req_cert_type() 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; ssl_generate_master_secret() local [all...] |