/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument 37 cipher_suite); in tlsv1_record_set_cipher_suite() 38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite() 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher() 79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher() 112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher() 113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
|
H A D | tlsv1_record.h | 51 u16 cipher_suite; member 61 u16 cipher_suite);
|
H A D | tlsv1_server_read.c | 126 u16 cipher_suite; in tls_process_client_hello() local 251 cipher_suite = 0; in tls_process_client_hello() 252 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello() 259 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello() 260 cipher_suite = tmp; in tls_process_client_hello() 266 if (!cipher_suite) { in tls_process_client_hello() 273 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello() 281 conn->cipher_suite = cipher_suite; in tls_process_client_hello() 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
|
H A D | tlsv1_client_read.c | 83 u16 cipher_suite; in tls_process_server_hello() local 172 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello() 175 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello() 180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello() 189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello() 195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello() 203 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello() 1077 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange() 1086 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
|
H A D | tlsv1_server_i.h | 43 u16 cipher_suite; member
|
H A D | tlsv1_server_write.c | 98 WPA_PUT_BE16(pos, conn->cipher_suite); in tls_write_server_hello() 197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 386 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_write_server_key_exchange()
|
H A D | tlsv1_server.c | 533 switch (conn->rl.cipher_suite) { in tlsv1_server_get_cipher()
|
H A D | tlsv1_client.c | 585 switch (conn->rl.cipher_suite) { in tlsv1_client_get_cipher()
|
H A D | tlsv1_client_write.c | 526 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
|
/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_asn1.c | 50 CBB cbb, session, cipher_suite, session_id, master_key, time, timeout; in SSL_SESSION_encode() local 77 if (!CBB_add_asn1(&session, &cipher_suite, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode() 79 if (!CBB_add_u16(&cipher_suite, cid)) in SSL_SESSION_encode() 245 CBS cbs, session, cipher_suite, session_id, master_key, peer_cert; in d2i_SSL_SESSION() local 283 if (!CBS_get_asn1(&session, &cipher_suite, CBS_ASN1_OCTETSTRING)) in d2i_SSL_SESSION() 285 if (!CBS_get_u16(&cipher_suite, &cipher_value)) in d2i_SSL_SESSION() 287 if (CBS_len(&cipher_suite) != 0) in d2i_SSL_SESSION()
|
H A D | tls13_client.c | 213 uint16_t cipher_suite, legacy_version; in tls13_server_hello_process() local 225 if (!CBS_get_u16(cbs, &cipher_suite)) in tls13_server_hello_process() 297 cipher = ssl3_get_cipher_by_value(cipher_suite); in tls13_server_hello_process()
|
H A D | ssl_clnt.c | 820 uint16_t server_version, cipher_suite; in ssl3_get_server_hello() local 924 if (!CBS_get_u16(&cbs, &cipher_suite)) in ssl3_get_server_hello() 949 ssl3_get_cipher_by_value(cipher_suite); in ssl3_get_server_hello() 991 if ((cipher = ssl3_get_cipher_by_value(cipher_suite)) == NULL) { in ssl3_get_server_hello()
|
/dragonfly/contrib/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_cp.c | 46 u64 cipher_suite; member 98 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher() 196 sm->current_cipher_suite = sm->cipher_suite; in SM_STATE() 466 sm->cipher_suite = default_cs_id; in ieee802_1x_cp_sm_init() 600 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 272 u16 cipher_suite; member 1437 conn->cipher_suite = WPA_GET_BE16(pos); in check_server_hello() 1439 conn->cipher_suite); in check_server_hello() 1455 if (conn->cipher_suite != 0x9f) in check_server_key_exchange() 2895 if (conn->cipher_suite != 0x9f) in suiteb_cert_cb()
|