Home
last modified time | relevance | path

Searched refs:algorithm_mkey (Results 1 – 12 of 12) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dssl_ciph.c704 if ((c->algorithm_mkey & disabled_mkey) || in ssl_cipher_collect_ciphers()
781 uint32_t algorithm_mkey = cipher_aliases[i].algorithm_mkey; in ssl_cipher_collect_aliases() local
786 if (algorithm_mkey) in ssl_cipher_collect_aliases()
787 if ((algorithm_mkey & mask_mkey) == 0) in ssl_cipher_collect_aliases()
868 cp->name, cp->algorithm_mkey, cp->algorithm_auth, in ssl_cipher_apply_rule()
874 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) in ssl_cipher_apply_rule()
1108 if (ca_list[j]->algorithm_mkey) { in ssl_cipher_process_rulestr()
1110 alg_mkey &= ca_list[j]->algorithm_mkey; in ssl_cipher_process_rulestr()
1116 alg_mkey = ca_list[j]->algorithm_mkey; in ssl_cipher_process_rulestr()
1708 alg_mkey = cipher->algorithm_mkey; in SSL_CIPHER_description()
[all …]
H A Dt1_lib.c1663 if (c->algorithm_mkey & s->s3.tmp.mask_k in ssl_cipher_disabled()
1676 && (c->algorithm_mkey & (SSL_kECDHE | SSL_kECDHEPSK)) != 0) in ssl_cipher_disabled()
2125 if ((c->algorithm_mkey & (SSL_kGOST | SSL_kGOST18)) != 0) in tls12_sigalg_allowed()
3076 && (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0)) in tls12_get_cert_sigalg_idx()
H A Ds3_lib.c4268 alg_k = c->algorithm_mkey; in ssl3_choose_cipher()
4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type()
4553 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) { in ssl_get_algorithm2()
4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl_generate_master_secret()
H A Dt1_enc.c559 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18) in tls1_final_finish_mac()
H A Dt1_trce.c1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex()
H A Dssl_cert.c1069 !(c->algorithm_mkey & pfs_mask)) in ssl_security_default_callback()
H A Dssl_local.h471 uint32_t algorithm_mkey; /* key exchange algorithm */ member
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected()
289 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition()
321 if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition()
2187 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_key_exchange()
2732 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { in tls_process_server_done()
3286 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_client_key_exchange()
3342 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { in tls_client_key_exchange_post_work()
3351 if (pms == NULL && !(s->s3.tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { in tls_client_key_exchange_post_work()
3544 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_check_cert_and_algorithm()
H A Dstatem_srvr.c325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange()
1250 if ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) && in ssl_check_srp_ext_ClientHello()
2235 ((s->s3.tmp.new_cipher->algorithm_mkey in tls_post_process_client_hello()
2446 type = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_server_key_exchange()
2572 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK)) != 0) { in tls_construct_server_key_exchange()
3286 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_client_key_exchange()
H A Dextensions.c1040 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats()
H A Dextensions_srvr.c1312 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats()
H A Dextensions_clnt.c128 alg_k = c->algorithm_mkey; in use_ecc()