/third_party/mbedtls/include/psa/ |
D | crypto_extra.h | 1177 const psa_pake_cipher_suite_t *cipher_suite); 1191 static void psa_pake_cs_set_algorithm(psa_pake_cipher_suite_t *cipher_suite, 1201 const psa_pake_cipher_suite_t *cipher_suite); 1212 static void psa_pake_cs_set_primitive(psa_pake_cipher_suite_t *cipher_suite, 1222 const psa_pake_cipher_suite_t *cipher_suite); 1231 const psa_pake_cipher_suite_t *cipher_suite); 1242 const psa_pake_cipher_suite_t *cipher_suite); 1260 static void psa_pake_cs_set_hash(psa_pake_cipher_suite_t *cipher_suite, 1423 psa_pake_cipher_suite_t *cipher_suite); 1496 const psa_pake_cipher_suite_t *cipher_suite); [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_psa_crypto_pake.function | 552 psa_pake_cipher_suite_t cipher_suite = psa_pake_cipher_suite_init(); 587 psa_pake_cs_set_algorithm(&cipher_suite, alg); 588 psa_pake_cs_set_primitive(&cipher_suite, primitive); 589 psa_pake_cs_set_hash(&cipher_suite, hash_alg); 613 SETUP_ALWAYS_CHECK_STEP(psa_pake_setup(&operation, &cipher_suite), 616 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_setup(&operation, &cipher_suite), 732 psa_pake_cipher_suite_t cipher_suite = psa_pake_cipher_suite_init(); 750 psa_pake_cs_set_algorithm(&cipher_suite, alg); 751 psa_pake_cs_set_primitive(&cipher_suite, primitive_arg); 752 psa_pake_cs_set_hash(&cipher_suite, hash_alg); [all …]
|
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
D | tls_test_common.h | 54 const char *cipher_suite; member 84 const char *cipher_suite, int proto_version, 113 send_curl_req (char *url, struct CBC *cbc, const char *cipher_suite, 117 test_https_transfer (void *cls, const char *cipher_suite, int proto_version); 138 (*test_function) (void * cls, const char *cipher_suite, 140 int daemon_flags, const char *cipher_suite, int proto_version, ...);
|
D | test_https_get_parallel.c | 64 cargs->cipher_suite, cargs->proto_version); in https_transfer_thread_adapter() 79 test_single_client (void *cls, const char *cipher_suite, in test_single_client() argument 84 { NULL, cipher_suite, curl_proto_version }; in test_single_client() 101 test_parallel_clients (void * cls, const char *cipher_suite, in test_parallel_clients() argument 109 { NULL, cipher_suite, curl_proto_version }; in test_parallel_clients()
|
D | test_https_get_parallel_threads.c | 65 cargs->cipher_suite, cargs->proto_version); in https_transfer_thread_adapter() 79 test_single_client (void *cls, const char *cipher_suite, in test_single_client() argument 84 { NULL, cipher_suite, curl_proto_version }; in test_single_client() 101 test_parallel_clients (void *cls, const char *cipher_suite, in test_parallel_clients() argument 109 { NULL, cipher_suite, curl_proto_version }; in test_parallel_clients()
|
D | test_https_get.c | 43 const char *cipher_suite, in test_cipher_option() argument 62 ret = test_https_transfer (test_fd, cipher_suite, proto_version); in test_cipher_option() 72 const char *cipher_suite, in test_secure_get() argument 91 ret = test_https_transfer (test_fd, cipher_suite, proto_version); in test_secure_get()
|
D | tls_test_common.c | 67 const char *cipher_suite, int proto_version, in test_daemon_get() argument 102 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); in test_daemon_get() 210 send_curl_req (char *url, struct CBC * cbc, const char *cipher_suite, in send_curl_req() argument 232 curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, cipher_suite); in send_curl_req() 316 test_https_transfer (void *cls, const char *cipher_suite, int proto_version) in test_https_transfer() argument 338 if (CURLE_OK != send_curl_req (url, &cbc, cipher_suite, proto_version)) in test_https_transfer() 452 (*test_function) (void * cls, const char *cipher_suite, in test_wrap() argument 454 int daemon_flags, const char *cipher_suite, int proto_version, ...) in test_wrap() 470 ret = test_function (NULL, cipher_suite, proto_version); in test_wrap()
|
D | test_https_multi_daemon.c | 45 const char *cipher_suite, in test_concurent_daemon_pair() argument 81 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_concurent_daemon_pair() 83 test_daemon_get (NULL, cipher_suite, proto_version, in test_concurent_daemon_pair() 88 test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_concurent_daemon_pair()
|
D | test_tls_authentication.c | 47 test_secure_get (void * cls, char *cipher_suite, int proto_version) in test_secure_get() argument 65 ret = test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0); in test_secure_get()
|
D | test_tls_options.c | 44 test_unmatching_ssl_version (void * cls, const char *cipher_suite, in test_unmatching_ssl_version() argument 67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version)) in test_unmatching_ssl_version()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_record.c | 31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument 37 cipher_suite); in tlsv1_record_set_cipher_suite() 38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite() 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher() 79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher() 112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher() 113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
|
D | tlsv1_record.h | 51 u16 cipher_suite; member 61 u16 cipher_suite);
|
D | tlsv1_server_read.c | 126 u16 cipher_suite; in tls_process_client_hello() local 251 cipher_suite = 0; in tls_process_client_hello() 252 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello() 259 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello() 260 cipher_suite = tmp; in tls_process_client_hello() 266 if (!cipher_suite) { in tls_process_client_hello() 273 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello() 281 conn->cipher_suite = cipher_suite; in tls_process_client_hello() 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
|
D | tlsv1_client_read.c | 83 u16 cipher_suite; in tls_process_server_hello() local 172 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello() 175 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello() 180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello() 189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello() 195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello() 203 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello() 1085 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange() 1094 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
|
D | tlsv1_server_i.h | 43 u16 cipher_suite; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_record.c | 31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument 37 cipher_suite); in tlsv1_record_set_cipher_suite() 38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite() 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher() 79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher() 112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher() 113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
|
D | tlsv1_record.h | 51 u16 cipher_suite; member 61 u16 cipher_suite);
|
D | tlsv1_server_read.c | 126 u16 cipher_suite; in tls_process_client_hello() local 251 cipher_suite = 0; in tls_process_client_hello() 252 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello() 259 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello() 260 cipher_suite = tmp; in tls_process_client_hello() 266 if (!cipher_suite) { in tls_process_client_hello() 273 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello() 281 conn->cipher_suite = cipher_suite; in tls_process_client_hello() 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
|
D | tlsv1_client_read.c | 83 u16 cipher_suite; in tls_process_server_hello() local 172 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello() 175 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello() 180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello() 189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello() 195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello() 203 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello() 1077 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange() 1086 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
|
D | tlsv1_server_i.h | 43 u16 cipher_suite; member
|
/third_party/mbedtls/library/ |
D | psa_crypto_pake.c | 199 psa_pake_cipher_suite_t cipher_suite = psa_pake_cipher_suite_init(); in mbedtls_psa_pake_setup() local 212 status = psa_crypto_driver_pake_get_cipher_suite(inputs, &cipher_suite); in mbedtls_psa_pake_setup() 229 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup() 232 if (cipher_suite.algorithm == PSA_ALG_JPAKE) { in mbedtls_psa_pake_setup() 233 if (cipher_suite.type != PSA_PAKE_PRIMITIVE_TYPE_ECC || in mbedtls_psa_pake_setup() 234 cipher_suite.family != PSA_ECC_FAMILY_SECP_R1 || in mbedtls_psa_pake_setup() 235 cipher_suite.bits != 256 || in mbedtls_psa_pake_setup() 236 cipher_suite.hash != PSA_ALG_SHA_256) { in mbedtls_psa_pake_setup()
|
D | ssl_tls13_server.c | 36 unsigned int cipher_suite) in ssl_tls13_validate_peer_ciphersuite() argument 39 if (!mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, cipher_suite)) { in ssl_tls13_validate_peer_ciphersuite() 43 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(cipher_suite); in ssl_tls13_validate_peer_ciphersuite() 397 uint16_t cipher_suite; in ssl_tls13_select_ciphersuite_for_psk() local 400 cipher_suite = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_select_ciphersuite_for_psk() 402 cipher_suite); in ssl_tls13_select_ciphersuite_for_psk() 411 *selected_ciphersuite = cipher_suite; in ssl_tls13_select_ciphersuite_for_psk() 434 uint16_t cipher_suite = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_select_ciphersuite_for_resumption() local 437 if (cipher_suite != session->ciphersuite) { in ssl_tls13_select_ciphersuite_for_resumption() 442 cipher_suite); in ssl_tls13_select_ciphersuite_for_resumption() [all …]
|
D | ssl_client.c | 346 int cipher_suite = ciphersuite_list[i]; in ssl_write_client_hello_cipher_suites() local 349 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(cipher_suite); in ssl_write_client_hello_cipher_suites() 364 (unsigned int) cipher_suite, in ssl_write_client_hello_cipher_suites() 369 MBEDTLS_PUT_UINT16_BE(cipher_suite, p, 0); in ssl_write_client_hello_cipher_suites()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
D | ieee802_1x_cp.c | 46 u64 cipher_suite; member 98 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher() 214 sm->current_cipher_suite = sm->cipher_suite; in SM_STATE() 477 sm->cipher_suite = default_cs_id; in ieee802_1x_cp_sm_init() 611 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
D | ieee802_1x_cp.c | 46 u64 cipher_suite; member 98 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher() 196 sm->current_cipher_suite = sm->cipher_suite; in SM_STATE() 466 sm->cipher_suite = default_cs_id; in ieee802_1x_cp_sm_init() 600 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
|