/external/cronet/tot/third_party/boringssl/src/ssl/ |
D | ssl_cipher.cc | 502 uint32_t algorithm_auth = ~0u; member 791 (alias->algorithm_mkey == 0 || alias->algorithm_auth == 0 || in ssl_cipher_apply_rule() 839 !(alias->algorithm_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1059 alias.algorithm_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1282 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1415 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1457 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1471 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1502 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1515 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() [all …]
|
D | handshake_client.cc | 284 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 824 (cipher->algorithm_auth & mask_a) || // in do_read_server_hello() 1106 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1472 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
D | handshake_server.cc | 324 (c->algorithm_auth & mask_a) && // in choose_cipher() 1141 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1425 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
D | ssl_cert.cc | 582 if (!(hs->new_cipher->algorithm_auth & in ssl_check_leaf_certificate()
|
D | internal.h | 859 uint32_t algorithm_auth;
|
D | extensions.cc | 1870 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/external/cronet/stable/third_party/boringssl/src/ssl/ |
D | ssl_cipher.cc | 502 uint32_t algorithm_auth = ~0u; member 791 (alias->algorithm_mkey == 0 || alias->algorithm_auth == 0 || in ssl_cipher_apply_rule() 839 !(alias->algorithm_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1059 alias.algorithm_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1282 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1415 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1457 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1471 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1502 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1515 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() [all …]
|
D | handshake_client.cc | 284 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 824 (cipher->algorithm_auth & mask_a) || // in do_read_server_hello() 1106 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1472 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
D | handshake_server.cc | 324 (c->algorithm_auth & mask_a) && // in choose_cipher() 1141 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1425 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
D | ssl_cert.cc | 582 if (!(hs->new_cipher->algorithm_auth & in ssl_check_leaf_certificate()
|
D | internal.h | 859 uint32_t algorithm_auth;
|
D | extensions.cc | 1870 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/external/boringssl/src/ssl/ |
D | ssl_cipher.cc | 371 uint32_t algorithm_auth = ~0u; member 660 (alias->algorithm_mkey == 0 || alias->algorithm_auth == 0 || in ssl_cipher_apply_rule() 708 !(alias->algorithm_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 928 alias.algorithm_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1151 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1284 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1326 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1340 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1371 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1384 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() [all …]
|
D | handshake_client.cc | 146 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 701 (cipher->algorithm_auth & mask_a) || // in do_read_server_hello() 983 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1350 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
D | handshake_server.cc | 187 (c->algorithm_auth & mask_a) && // in choose_cipher() 1005 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1289 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
D | ssl_cert.cc | 478 if (!(hs->new_cipher->algorithm_auth & in ssl_check_leaf_certificate()
|
D | internal.h | 685 uint32_t algorithm_auth;
|
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_cipher.cc | 491 uint32_t algorithm_auth; member 866 !(alg_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1093 alg_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1296 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1434 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1468 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1482 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1511 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1524 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() 1528 assert(cipher->algorithm_auth == SSL_aGENERIC); in SSL_CIPHER_get_kx_name() [all …]
|
D | handshake_client.cc | 257 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 775 (cipher->algorithm_auth & mask_a) || in do_read_server_hello() 1058 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1370 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
D | handshake_server.cc | 372 (c->algorithm_auth & mask_a) && in choose_cipher() 1091 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1351 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
D | ssl_cert.cc | 705 if (!(hs->new_cipher->algorithm_auth & ssl_cipher_auth_mask_for_key(pkey))) { in ssl_check_leaf_certificate()
|
D | internal.h | 530 uint32_t algorithm_auth;
|
D | extensions.cc | 1921 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/external/cronet/stable/third_party/netty-tcnative/src/c/ |
D | sslutils.c | 92 switch (cipher->algorithm_auth) in SSL_cipher_authentication_method() 110 switch (cipher->algorithm_auth) in SSL_cipher_authentication_method()
|
/external/cronet/tot/third_party/netty-tcnative/src/c/ |
D | sslutils.c | 92 switch (cipher->algorithm_auth) in SSL_cipher_authentication_method() 110 switch (cipher->algorithm_auth) in SSL_cipher_authentication_method()
|