Home
last modified time | relevance | path

Searched refs:new_cipher (Results 1 – 17 of 17) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dktls.c97 switch (s->s3.tmp.new_cipher->algorithm_enc) { in ktls_check_supported_cipher()
109 switch (s->s3.tmp.new_cipher->algorithm_mac) { in ktls_check_supported_cipher()
130 switch (s->s3.tmp.new_cipher->algorithm_enc) { in ktls_configure_crypto()
150 switch (s->s3.tmp.new_cipher->algorithm_mac) { in ktls_configure_crypto()
H A Dt1_enc.c185 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state()
190 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE) in tls1_change_cipher_state()
238 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) in tls1_change_cipher_state()
243 if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE) in tls1_change_cipher_state()
363 new_cipher->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8)) in tls1_change_cipher_state()
559 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18) in tls1_final_finish_mac()
H A Ds3_msg.c28 s->session->cipher = s->s3.tmp.new_cipher; in ssl3_do_change_cipher_spec()
H A Dt1_lib.c615 unsigned long cid = s->s3.tmp.new_cipher->id; in tls1_shared_group()
809 if (tls1_suiteb(s) && s->s3.tmp.new_cipher != NULL) { in tls1_check_group_id()
810 unsigned long cid = s->s3.tmp.new_cipher->id; in tls1_check_group_id()
1300 if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) { in tls1_get_legacy_sigalg()
1309 if (idx == SSL_PKEY_GOST01 && s->s3.tmp.new_cipher->algorithm_auth != SSL_aGOST01) { in tls1_get_legacy_sigalg()
2926 if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aPSK)) { in ssl_get_auto_dh()
2927 if (s->s3.tmp.new_cipher->strength_bits == 256) in ssl_get_auto_dh()
3075 || (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0 in tls12_get_cert_sigalg_idx()
3077 && (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0)) in tls12_get_cert_sigalg_idx()
3259 if (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aCERT)) in tls_choose_sigalg()
[all …]
H A Dtls13_enc.c317 s->session->cipher = s->s3.tmp.new_cipher; in tls13_setup_key_block()
364 if (s->s3.tmp.new_cipher != NULL) { in derive_secret_key_and_iv()
365 algenc = s->s3.tmp.new_cipher->algorithm_enc; in derive_secret_key_and_iv()
H A Ds3_lib.c3588 cipher = s->s3.tmp.new_cipher; in ssl3_ctrl()
4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type()
4547 if (s->s3.tmp.new_cipher == NULL) in ssl_get_algorithm2()
4549 alg2 = s->s3.tmp.new_cipher->algorithm2; in ssl_get_algorithm2()
4553 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) { in ssl_get_algorithm2()
4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl_generate_master_secret()
H A Dt1_trce.c1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex()
H A Dssl_local.h1315 const SSL_CIPHER *new_cipher; member
H A Dssl_lib.c3726 if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aECDSA) { in ssl_check_srvr_ecc_cert_and_alg()
4252 return s->s3.tmp.new_cipher; in SSL_get_pending_cipher()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c50 && (s->s3.tmp.new_cipher->algorithm_auth & SSL_aNULL)) in cert_req_allowed()
51 || (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aSRP | SSL_aPSK))) in cert_req_allowed()
66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected()
279 } else if (!(s->s3.tmp.new_cipher->algorithm_auth in ossl_statem_client_read_transition()
289 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition()
321 if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition()
796 s->session->cipher = s->s3.tmp.new_cipher; in ossl_statem_client_post_work()
1333 if (SSL_IS_TLS13(s) && s->s3.tmp.new_cipher != NULL in set_client_ciphersuite()
1334 && s->s3.tmp.new_cipher->id != c->id) { in set_client_ciphersuite()
1371 s->s3.tmp.new_cipher = c; in set_client_ciphersuite()
[all …]
H A Dextensions_srvr.c795 || s->s3.tmp.new_cipher in tls_parse_ctos_cookie()
843 || !s->method->put_cipher_by_char(s->s3.tmp.new_cipher, &hrrpkt, in tls_parse_ctos_cookie()
1174 s->s3.tmp.new_cipher->algorithm2)))) { in tls_parse_ctos_psk()
1317 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats()
1318 unsigned long alg_a = s->s3.tmp.new_cipher->algorithm_auth; in tls_construct_stoc_ec_pt_formats()
1539 if (s->s3.tmp.new_cipher->algorithm_mac == SSL_AEAD in tls_construct_stoc_etm()
1540 || s->s3.tmp.new_cipher->algorithm_enc == SSL_RC4 in tls_construct_stoc_etm()
1541 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT in tls_construct_stoc_etm()
1542 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT12 in tls_construct_stoc_etm()
1543 || s->s3.tmp.new_cipher->algorithm_enc == SSL_MAGMA in tls_construct_stoc_etm()
[all …]
H A Dstatem_srvr.c325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange()
387 && (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aNULL) in send_certificate_request()
395 && !(s->s3.tmp.new_cipher->algorithm_auth & SSL_aSRP) in send_certificate_request()
400 && !(s->s3.tmp.new_cipher->algorithm_auth & SSL_aPSK)) { in send_certificate_request()
609 if (!(s->s3.tmp.new_cipher->algorithm_auth & in ossl_statem_server_write_transition()
751 s->session->cipher = s->s3.tmp.new_cipher; in ossl_statem_server_pre_work()
752 } else if (s->session->cipher != s->s3.tmp.new_cipher) { in ossl_statem_server_pre_work()
1250 if ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) && in ssl_check_srp_ext_ClientHello()
1746 && (s->s3.tmp.new_cipher == NULL in tls_early_post_process_client_hello()
1747 || s->s3.tmp.new_cipher->id != cipher->id)) { in tls_early_post_process_client_hello()
[all …]
H A Dextensions_clnt.c1708 && s->s3.tmp.new_cipher->algorithm_mac != SSL_AEAD in tls_parse_stoc_etm()
1709 && s->s3.tmp.new_cipher->algorithm_enc != SSL_RC4 in tls_parse_stoc_etm()
1710 && s->s3.tmp.new_cipher->algorithm_enc != SSL_eGOST2814789CNT in tls_parse_stoc_etm()
1711 && s->s3.tmp.new_cipher->algorithm_enc != SSL_eGOST2814789CNT12 in tls_parse_stoc_etm()
1712 && s->s3.tmp.new_cipher->algorithm_enc != SSL_MAGMA in tls_parse_stoc_etm()
1713 && s->s3.tmp.new_cipher->algorithm_enc != SSL_KUZNYECHIK) in tls_parse_stoc_etm()
H A Dextensions.c1040 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats()
1041 alg_a = s->s3.tmp.new_cipher->algorithm_auth; in final_ec_pt_formats()
H A Dstatem_lib.c757 if (s->s3.tmp.new_cipher == NULL) { in tls_process_change_cipher_spec()
/freebsd/crypto/openssl/ssl/record/
H A Dssl3_record_tls13.c88 if (!ossl_assert(s->s3.tmp.new_cipher != NULL)) { in tls13_enc()
92 alg_enc = s->s3.tmp.new_cipher->algorithm_enc; in tls13_enc()
/freebsd/crypto/openssl/test/
H A Dtls13encryptiontest.c342 s->s3.tmp.new_cipher = SSL_CIPHER_find(s, TLS13_AES_128_GCM_SHA256_BYTES); in test_tls13_encryption()
343 if (!TEST_ptr(s->s3.tmp.new_cipher)) { in test_tls13_encryption()