Lines Matching +full:128 +full:a

7  * this file except in compliance with the License.  You can obtain a copy
51 128,
52 128,
98 128,
99 128,
113 128,
114 128,
240 128,
241 128,
256 128,
257 128,
272 128,
273 128,
288 128,
289 128,
384 128,
385 128,
416 128,
417 128,
432 128,
433 128,
480 128,
481 128,
512 128,
513 128,
544 128,
545 128,
576 128,
577 128,
608 128,
609 128,
640 128,
641 128,
672 128,
673 128,
704 128,
705 128,
736 128,
737 128,
768 128,
769 128,
800 128,
801 128,
832 128,
833 128,
864 128,
865 128,
896 128,
897 128,
928 128,
929 128,
994 128,
995 128,
1060 128,
1061 128,
1126 128,
1127 128,
1158 128,
1159 128,
1190 128,
1191 128,
1222 128,
1223 128,
1254 128,
1255 128,
1352 128,
1353 128,
1402 128,
1403 128,
1452 128,
1453 128,
1484 128,
1485 128,
1516 128,
1517 128,
1548 128,
1549 128,
1580 128,
1581 128,
1644 128,
1645 128,
1708 128,
1709 128,
1790 128,
1791 128,
1822 128,
1823 128,
1953 128,
1954 128,
1969 128,
1970 128,
1985 128,
1986 128,
2163 128,
2164 128,
2179 128,
2180 128,
2195 128,
2196 128,
2211 128,
2212 128,
2355 128,
2356 128,
2371 128,
2372 128,
2387 128,
2388 128,
2403 128,
2404 128,
2419 128,
2420 128,
2451 128,
2452 128,
2483 128,
2484 128,
2515 128,
2516 128,
2547 128,
2548 128,
2579 128,
2580 128,
2727 128,
2728 128,
2744 128,
2745 128,
2760 128,
2761 128,
2776 128,
2777 128,
2792 128,
2793 128,
2810 128,
2811 128,
2826 128,
2827 128,
2842 128,
2843 128,
2858 128,
2859 128,
2874 128,
2875 128,
2890 128,
2891 128,
2906 128,
2907 128,
2922 128,
2923 128,
2938 128,
2939 128,
2954 128,
2955 128,
2972 128,
2973 128,
3004 128,
3005 128,
3036 128,
3037 128,
3068 128,
3069 128,
3100 128,
3101 128,
3132 128,
3133 128,
3164 128,
3165 128,
3196 128,
3197 128,
3239 static int cipher_compare(const void *a, const void *b) in cipher_compare() argument
3241 const SSL_CIPHER *ap = (const SSL_CIPHER *)a; in cipher_compare()
3313 /* No header in the event of a CCS */ in ssl3_set_handshake_header()
3485 * This API is only used for a client to set what SNI it will request in ssl3_ctrl()
3487 * as well, which is a programming error. Currently we just clear in ssl3_ctrl()
3950 /* A Thawte special :-) */ in ssl3_ctx_ctrl()
4127 * ssl3_choose_cipher - choose a cipher from those offered by the client
4146 * Do not set the compare functions, because this may lead to a in ssl3_choose_cipher()
4148 * a price in performance during sk_SSL_CIPHER_find(), but would have to in ssl3_choose_cipher()
4193 /* if reserve fails, then there's likely a memory issue */ in ssl3_choose_cipher()
4224 * we're not going to succeed without a PSK anyway), and we're in in ssl3_choose_cipher()
4225 * TLSv1.3 then the default hash for a PSK is SHA-256 (as per the in ssl3_choose_cipher()
4424 * have already signalled return 0 upon a previous invocation, in ssl3_shutdown()
4432 * If we are waiting for a close from our peer, we are closed in ssl3_shutdown()
4508 * Check if we are waiting to do a renegotiation and if so whether now is a
4511 * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we
4512 * should do a renegotiation now and sets up the state machine for it. Otherwise
4524 * if we are the server, and we have sent a 'RENEGOTIATE' in ssl3_renegotiate_check()
4561 * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on
4671 /* Generate a private key from parameters */
4694 /* Generate a private key from a group ID */
4733 * Generate parameters from a group ID