Searched refs:isPSK (Results 1 – 11 of 11) sorted by relevance
31 isPSK() bool methodSpec129 if excludePSK && c.isPSK() || excludeNonPSK && !c.isPSK() {
19 func (c *cipherSuiteTLSPskWithAes128GcmSha256) isPSK() bool { func
31 func (c *cipherSuiteTLSEcdheEcdsaWithAes128GcmSha256) isPSK() bool { func
31 func (c *cipherSuiteTLSPskWithAes128Ccm8) isPSK() bool { func
31 func (c *cipherSuiteTLSEcdheEcdsaWithAes256CbcSha) isPSK() bool { func
571 const BOOLEAN isKeyex, const BOOLEAN isPSK ) in processClientKeyex() argument588 if( isPSK ) in processClientKeyex()688 INOUT STREAM *stream, const BOOLEAN isPSK ) in createServerKeyex() argument711 if( isPSK ) in createServerKeyex()748 if( isPSK ) in createServerKeyex()
400 const BOOLEAN isPSK = ( handshakeInfo->authAlgo == CRYPT_ALGO_NONE ) ? \ in processServerKeyex() local439 if( isPSK ) in processServerKeyex()484 if( !isPSK ) in processServerKeyex()596 const BOOLEAN isPSK ) in createClientKeyex() argument614 if( isPSK ) in createClientKeyex()632 if( isPSK ) in createClientKeyex()687 if( isPSK ) in createClientKeyex()
518 isPSK := hs.suite.flags&suitePSK != 0519 if !isPSK && hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 {549 if !isPSK {
1574 isPSK := hs.suite.flags&suitePSK != 01575 …if !isPSK && hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 && !c.config.Bugs.NoOCSPSt…1616 if !isPSK {
1635 isPSK := hs.suite.flags&suitePSK != 01636 …if !isPSK && hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 && !c.config.Bugs.NoOCSPSt…1677 if !isPSK {
1652 isPSK := hs.suite.flags&suitePSK != 01653 …if !isPSK && hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 && !c.config.Bugs.NoOCSPSt…1694 if !isPSK {