/netbsd-src/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ktls.c | 36 switch (s->s3.tmp.new_cipher->algorithm_enc) { in ktls_check_supported_cipher() 44 switch (s->s3.tmp.new_cipher->algorithm_mac) { in ktls_check_supported_cipher() 65 switch (s->s3.tmp.new_cipher->algorithm_enc) { in ktls_configure_crypto() 79 switch (s->s3.tmp.new_cipher->algorithm_mac) { in ktls_configure_crypto()
|
H A D | t1_enc.c | 226 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state() 231 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE) in tls1_change_cipher_state() 279 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state() 284 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE) in tls1_change_cipher_state() 404 new_cipher->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8)) in tls1_change_cipher_state() 619 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18) in tls1_final_finish_mac()
|
H A D | s3_msg.c | 28 s->session->cipher = s->s3.tmp.new_cipher; in ssl3_do_change_cipher_spec()
|
H A D | tls13_enc.c | 317 s->session->cipher = s->s3.tmp.new_cipher; in tls13_setup_key_block() 364 if (s->s3.tmp.new_cipher != NULL) { in derive_secret_key_and_iv() 365 algenc = s->s3.tmp.new_cipher->algorithm_enc; in derive_secret_key_and_iv()
|
H A D | s3_lib.c | 3588 cipher = s->s3.tmp.new_cipher; in ssl3_ctrl() 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type() 4547 if (s->s3.tmp.new_cipher == NULL) in ssl_get_algorithm2() 4549 alg2 = s->s3.tmp.new_cipher->algorithm2; in ssl_get_algorithm2() 4553 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) { in ssl_get_algorithm2() 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl_generate_master_secret()
|
H A D | t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_clnt.c | 46 && (s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)) in cert_req_allowed() 47 || (s->s3->tmp.new_cipher->algorithm_auth & (SSL_aSRP | SSL_aPSK))) in cert_req_allowed() 62 long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; in key_exchange_expected() 274 } else if (!(s->s3->tmp.new_cipher->algorithm_auth in ossl_statem_client_read_transition() 284 || ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 316 if (ske_expected || ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 799 s->session->cipher = s->s3->tmp.new_cipher; in ossl_statem_client_post_work() 1357 if (SSL_IS_TLS13(s) && s->s3->tmp.new_cipher != NULL in set_client_ciphersuite() 1358 && s->s3->tmp.new_cipher->id != c->id) { in set_client_ciphersuite() 1395 s->s3->tmp.new_cipher = c; in set_client_ciphersuite() [all …]
|
H A D | extensions_srvr.c | 842 || s->s3->tmp.new_cipher in tls_parse_ctos_cookie() 894 || !s->method->put_cipher_by_char(s->s3->tmp.new_cipher, &hrrpkt, in tls_parse_ctos_cookie() 1238 if (md != ssl_md(s->s3->tmp.new_cipher->algorithm2)) { in tls_parse_ctos_psk() 1386 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats() 1387 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; in tls_construct_stoc_ec_pt_formats() 1622 if (s->s3->tmp.new_cipher->algorithm_mac == SSL_AEAD in tls_construct_stoc_etm() 1623 || s->s3->tmp.new_cipher->algorithm_enc == SSL_RC4 in tls_construct_stoc_etm() 1624 || s->s3->tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT in tls_construct_stoc_etm() 1625 || s->s3->tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT12) { in tls_construct_stoc_etm() 1798 || !s->method->put_cipher_by_char(s->s3->tmp.new_cipher, pkt, in tls_construct_stoc_cookie() [all …]
|
H A D | statem_srvr.c | 326 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; in send_server_key_exchange() 388 && (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) in send_certificate_request() 396 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aSRP) in send_certificate_request() 401 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aPSK)) { in send_certificate_request() 608 if (!(s->s3->tmp.new_cipher->algorithm_auth & in ossl_statem_server_write_transition() 748 s->session->cipher = s->s3->tmp.new_cipher; in ossl_statem_server_pre_work() 749 } else if (s->session->cipher != s->s3->tmp.new_cipher) { in ossl_statem_server_pre_work() 1257 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && in ssl_check_srp_ext_ClientHello() 1785 && (s->s3->tmp.new_cipher == NULL in tls_early_post_process_client_hello() 1786 || s->s3->tmp.new_cipher->id != cipher->id)) { in tls_early_post_process_client_hello() [all …]
|
H A D | extensions_clnt.c | 1756 && s->s3->tmp.new_cipher->algorithm_mac != SSL_AEAD in tls_parse_stoc_etm() 1757 && s->s3->tmp.new_cipher->algorithm_enc != SSL_RC4 in tls_parse_stoc_etm() 1758 && s->s3->tmp.new_cipher->algorithm_enc != SSL_eGOST2814789CNT in tls_parse_stoc_etm() 1759 && s->s3->tmp.new_cipher->algorithm_enc != SSL_eGOST2814789CNT12) in tls_parse_stoc_etm()
|
H A D | extensions.c | 1047 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats() 1048 alg_a = s->s3->tmp.new_cipher->algorithm_auth; in final_ec_pt_formats()
|
H A D | statem_lib.c | 730 if (s->s3->tmp.new_cipher == NULL) { in tls_process_change_cipher_spec()
|
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_clnt.c | 50 && (s->s3.tmp.new_cipher->algorithm_auth & SSL_aNULL)) in cert_req_allowed() 51 || (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aSRP | SSL_aPSK))) in cert_req_allowed() 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected() 279 } else if (!(s->s3.tmp.new_cipher->algorithm_auth in ossl_statem_client_read_transition() 289 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 321 if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 796 s->session->cipher = s->s3.tmp.new_cipher; in ossl_statem_client_post_work() 1333 if (SSL_IS_TLS13(s) && s->s3.tmp.new_cipher != NULL in set_client_ciphersuite() 1334 && s->s3.tmp.new_cipher->id != c->id) { in set_client_ciphersuite() 1371 s->s3.tmp.new_cipher = c; in set_client_ciphersuite() [all …]
|
H A D | statem_srvr.c | 325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange() 387 && (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aNULL) in send_certificate_request() 395 && !(s->s3.tmp.new_cipher->algorithm_auth & SSL_aSRP) in send_certificate_request() 400 && !(s->s3.tmp.new_cipher->algorithm_auth & SSL_aPSK)) { in send_certificate_request() 609 if (!(s->s3.tmp.new_cipher->algorithm_auth & in ossl_statem_server_write_transition() 751 s->session->cipher = s->s3.tmp.new_cipher; in ossl_statem_server_pre_work() 752 } else if (s->session->cipher != s->s3.tmp.new_cipher) { in ossl_statem_server_pre_work() 1250 if ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) && in ssl_check_srp_ext_ClientHello() 1746 && (s->s3.tmp.new_cipher == NULL in tls_early_post_process_client_hello() 1747 || s->s3.tmp.new_cipher->id != cipher->id)) { in tls_early_post_process_client_hello() [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
H A D | ssl3_record_tls13.c | 87 if (!ossl_assert(s->s3->tmp.new_cipher != NULL)) { in tls13_enc() 92 alg_enc = s->s3->tmp.new_cipher->algorithm_enc; in tls13_enc()
|
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/record/ |
H A D | ssl3_record_tls13.c | 88 if (!ossl_assert(s->s3.tmp.new_cipher != NULL)) { in tls13_enc() 92 alg_enc = s->s3.tmp.new_cipher->algorithm_enc; in tls13_enc()
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | tls13encryptiontest.c | 342 s->s3.tmp.new_cipher = SSL_CIPHER_find(s, TLS13_AES_128_GCM_SHA256_BYTES); in test_tls13_encryption() 343 if (!TEST_ptr(s->s3.tmp.new_cipher)) { in test_tls13_encryption()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | tls13encryptiontest.c | 353 s->s3->tmp.new_cipher = SSL_CIPHER_find(s, TLS13_AES_128_GCM_SHA256_BYTES); in test_tls13_encryption() 354 if (!TEST_ptr(s->s3->tmp.new_cipher)) { in test_tls13_encryption()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | t1_lib.c | 298 unsigned long cid = s->s3->tmp.new_cipher->id; in tls1_shared_group() 491 if (tls1_suiteb(s) && s->s3->tmp.new_cipher != NULL) { in tls1_check_group_id() 492 unsigned long cid = s->s3->tmp.new_cipher->id; in tls1_check_group_id() 869 if (clu->amask & s->s3->tmp.new_cipher->algorithm_auth) { in tls1_get_legacy_sigalg() 878 if (idx == SSL_PKEY_GOST01 && s->s3->tmp.new_cipher->algorithm_auth != SSL_aGOST01) { in tls1_get_legacy_sigalg() 2445 if (s->s3->tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aPSK)) { in ssl_get_auto_dh() 2446 if (s->s3->tmp.new_cipher->strength_bits == 256) in ssl_get_auto_dh() 2587 || (clu->amask & s->s3->tmp.new_cipher->algorithm_auth) == 0 in tls12_get_cert_sigalg_idx() 2589 && (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0)) in tls12_get_cert_sigalg_idx() 2765 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aCERT)) in tls_choose_sigalg() [all …]
|
H A D | t1_enc.c | 111 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state() 159 if (s->s3->tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state() 287 new_cipher->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8)) in tls1_change_cipher_state()
|
H A D | s3_msg.c | 28 s->session->cipher = s->s3->tmp.new_cipher; in ssl3_do_change_cipher_spec()
|
H A D | tls13_enc.c | 348 s->session->cipher = s->s3->tmp.new_cipher; in tls13_setup_key_block() 394 if (s->s3->tmp.new_cipher != NULL) { in derive_secret_key_and_iv() 395 algenc = s->s3->tmp.new_cipher->algorithm_enc; in derive_secret_key_and_iv()
|
H A D | s3_lib.c | 3581 cipher = s->s3->tmp.new_cipher; in ssl3_ctrl() 4348 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type() 4557 if (s->s3 == NULL || s->s3->tmp.new_cipher == NULL) in ssl_get_algorithm2() 4559 alg2 = s->s3->tmp.new_cipher->algorithm2; in ssl_get_algorithm2() 4563 } else if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_PSK) { in ssl_get_algorithm2() 4613 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; in ssl_generate_master_secret()
|
H A D | t1_trce.c | 1042 unsigned long alg_k = ssl->s3->tmp.new_cipher->algorithm_mkey; in ssl_get_keyex()
|
H A D | ssl_local.h | 1579 const SSL_CIPHER *new_cipher; member
|