Searched refs:SSL_kGOST (Results 1 – 8 of 8) sorted by relevance
/third_party/openssl/ssl/ |
D | ssl_ciph.c | 130 {SSL_kGOST, NID_kx_gost}, 230 {0, SSL_TXT_kGOST, NULL, 0, SSL_kGOST}, 446 disabled_mkey_mask |= SSL_kGOST; in ssl_load_ciphers() 1687 case SSL_kGOST: in SSL_CIPHER_description()
|
D | t1_trce.c | 1076 if (alg_k & SSL_kGOST) { in ssl_get_keyex() 1078 return SSL_kGOST; in ssl_get_keyex()
|
D | s3_lib.c | 2609 SSL_kGOST, 2625 SSL_kGOST, 2641 SSL_kGOST, 2657 SSL_kGOST, 4339 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST)) in ssl3_get_req_cert_type()
|
D | ssl_lib.c | 3385 mask_k |= SSL_kGOST; in ssl_set_masks() 3389 mask_k |= SSL_kGOST; in ssl_set_masks() 3393 mask_k |= SSL_kGOST; in ssl_set_masks()
|
D | ssl_local.h | 172 # define SSL_kGOST 0x00000010U macro
|
D | t1_lib.c | 1646 if ((c->algorithm_mkey & SSL_kGOST) != 0) in tls12_sigalg_allowed()
|
/third_party/openssl/ssl/statem/ |
D | statem_clnt.c | 3341 } else if (alg_k & SSL_kGOST) { in tls_construct_client_key_exchange()
|
D | statem_srvr.c | 3503 } else if (alg_k & SSL_kGOST) { in tls_process_client_key_exchange()
|