Searched refs:SSL_aRSA (Results 1 – 8 of 8) sorted by relevance
/third_party/openssl/ssl/ |
D | s3_lib.c | 134 SSL_aRSA, 150 SSL_aRSA, 167 SSL_aRSA, 199 SSL_aRSA, 232 SSL_aRSA, 264 SSL_aRSA, 296 SSL_aRSA, 328 SSL_aRSA, 360 SSL_aRSA, 376 SSL_aRSA, [all …]
|
D | ssl_cert_table.h | 14 {EVP_PKEY_RSA, SSL_aRSA}, /* SSL_PKEY_RSA */ 15 {EVP_PKEY_RSA_PSS, SSL_aRSA}, /* SSL_PKEY_RSA_PSS_SIGN */
|
D | ssl_ciph.c | 135 {SSL_aRSA, NID_auth_rsa}, 233 {0, SSL_TXT_aRSA, NULL, 0, 0, SSL_aRSA}, 251 {0, SSL_TXT_RSA, NULL, 0, SSL_kRSA, SSL_aRSA}, 311 SSL_kDHE, SSL_aRSA, SSL_3DES, SSL_SHA1, 0, 0, 0, 0, SSL_HIGH | SSL_FIPS}, 398 disabled_auth_mask |= SSL_aRSA; in ssl_load_ciphers() 1698 case SSL_aRSA: in SSL_CIPHER_description()
|
D | ssl_local.h | 189 # define SSL_aRSA 0x00000001U macro 208 (SSL_aRSA | SSL_aDSS | SSL_aECDSA | SSL_aGOST01 | SSL_aGOST12)
|
D | t1_lib.c | 1671 uint32_t disabled_mask = SSL_aRSA | SSL_aDSS | SSL_aECDSA; in ssl_set_sig_mask()
|
D | ssl_lib.c | 3412 mask_a |= SSL_aRSA; in ssl_set_masks()
|
/third_party/openssl/test/ |
D | ssl_cert_table_internal_test.c | 57 if (!test_cert_table(EVP_PKEY_RSA, SSL_aRSA, SSL_PKEY_RSA)) in test_ssl_cert_table()
|
/third_party/openssl/ssl/statem/ |
D | statem_clnt.c | 2070 if (s->s3->tmp.new_cipher->algorithm_auth & (SSL_aRSA | SSL_aDSS)) in tls_process_ske_srp() 2168 if (s->s3->tmp.new_cipher->algorithm_auth & (SSL_aRSA | SSL_aDSS)) in tls_process_ske_dhe() 2243 else if (s->s3->tmp.new_cipher->algorithm_auth & SSL_aRSA) in tls_process_ske_ecdhe()
|