/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | handshake_client.cc | 784 hs->new_cipher = cipher; in do_read_server_hello() 806 if (ssl->session->cipher != hs->new_cipher) { in do_read_server_hello() 833 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 838 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_server_hello() 848 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 879 ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 904 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_certificate() 998 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_verify_server_certificate() 1043 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher)) { in do_read_server_key_exchange() 1057 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_read_server_key_exchange() [all …]
|
D | handshake_server.cc | 830 hs->new_cipher = choose_cipher(hs, &client_hello, prefs); in do_select_certificate() 831 if (hs->new_cipher == NULL) { in do_select_certificate() 926 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 936 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_select_parameters() 957 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_select_parameters() 986 (hs->new_cipher->algorithm_mkey & SSL_kECDHE) == 0) { in do_send_server_hello() 1042 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello() 1062 if (ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_send_server_certificate() 1090 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_send_server_certificate() 1091 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() [all …]
|
D | tls13_server.cc | 234 hs->new_cipher = choose_tls13_cipher(ssl, &client_hello, group_id); in do_select_parameters() 235 if (hs->new_cipher == NULL) { in do_select_parameters() 250 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 420 hs->new_session->cipher = hs->new_cipher; in do_select_session() 468 assert(hs->new_cipher == session->cipher); in do_select_session() 511 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_select_session() 564 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_hello_retry_request() 773 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello()
|
D | tls13_client.cc | 205 hs->new_cipher = cipher; in do_read_hello_retry_request() 208 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request() 214 hs->new_cipher) || in do_read_hello_retry_request() 375 if (SSL_CIPHER_get_value(hs->new_cipher) != server_hello.cipher_suite) { in do_read_server_hello() 444 if (ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in do_read_server_hello() 477 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 481 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_read_server_hello()
|
D | handoff.cc | 375 !CBB_add_asn1_uint64(&seq, SSL_CIPHER_get_id(s3->hs->new_cipher)) || in SSL_serialize_handback() 512 if ((hs->new_cipher = in SSL_apply_handback() 587 session->cipher != hs->new_cipher || in SSL_apply_handback() 642 !hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in SSL_apply_handback()
|
D | extensions.cc | 1145 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in ext_ocsp_parse_serverhello() 1180 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in ext_ocsp_add_serverhello() 1920 const uint32_t alg_k = hs->new_cipher->algorithm_mkey; in ext_ec_point_add_serverhello() 1921 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello() 1953 ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in should_offer_psk()
|
/external/cronet/stable/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 833 hs->new_cipher = cipher; in do_read_server_hello() 854 if (ssl->session->cipher != hs->new_cipher) { in do_read_server_hello() 881 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 886 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_server_hello() 896 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 927 ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 952 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_certificate() 1046 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_verify_server_certificate() 1091 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher)) { in do_read_server_key_exchange() 1105 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_read_server_key_exchange() [all …]
|
D | handshake_server.cc | 895 hs->new_cipher = params.cipher; in do_select_parameters() 961 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 975 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_select_parameters() 996 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 1029 (hs->new_cipher->algorithm_mkey & SSL_kECDHE) == 0) { in do_send_server_hello() 1092 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello() 1116 if (ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_send_server_certificate() 1140 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_send_server_certificate() 1141 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1142 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher) || in do_send_server_certificate() [all …]
|
D | tls13_client.cc | 221 hs->new_cipher = cipher; in do_read_hello_retry_request() 224 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request() 230 hs->new_cipher) || in do_read_hello_retry_request() 388 if (SSL_CIPHER_get_protocol_id(hs->new_cipher) != server_hello.cipher_suite) { in do_read_server_hello() 460 if (ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in do_read_server_hello() 493 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 497 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_read_server_hello()
|
D | tls13_server.cc | 301 hs->new_cipher = choose_tls13_cipher(ssl, &client_hello); in do_select_parameters() 302 if (hs->new_cipher == NULL) { in do_select_parameters() 317 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 486 hs->new_session->cipher = hs->new_cipher; in do_select_session() 534 assert(hs->new_cipher == session->cipher); in do_select_session() 577 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_select_session() 628 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_hello_retry_request() 830 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello()
|
D | handoff.cc | 387 !CBB_add_asn1_uint64(&seq, SSL_CIPHER_get_id(s3->hs->new_cipher)) || in SSL_serialize_handback() 543 if ((hs->new_cipher = in SSL_apply_handback() 639 session->cipher != hs->new_cipher || in SSL_apply_handback() 693 !hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in SSL_apply_handback()
|
D | extensions.cc | 1086 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in ext_ocsp_parse_serverhello() 1120 !ssl_cipher_uses_certificate_auth(hs->new_cipher) || in ext_ocsp_add_serverhello() 1339 !ssl_cipher_uses_certificate_auth(hs->new_cipher) || in ext_sct_add_serverhello() 1869 const uint32_t alg_k = hs->new_cipher->algorithm_mkey; in ext_ec_point_add_serverhello() 1870 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello() 1903 ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in should_offer_psk()
|
/external/cronet/tot/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 833 hs->new_cipher = cipher; in do_read_server_hello() 854 if (ssl->session->cipher != hs->new_cipher) { in do_read_server_hello() 881 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 886 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_server_hello() 896 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 927 ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 952 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_certificate() 1046 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_verify_server_certificate() 1091 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher)) { in do_read_server_key_exchange() 1105 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_read_server_key_exchange() [all …]
|
D | handshake_server.cc | 895 hs->new_cipher = params.cipher; in do_select_parameters() 961 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 975 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_select_parameters() 996 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 1029 (hs->new_cipher->algorithm_mkey & SSL_kECDHE) == 0) { in do_send_server_hello() 1092 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello() 1116 if (ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_send_server_certificate() 1140 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_send_server_certificate() 1141 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1142 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher) || in do_send_server_certificate() [all …]
|
D | tls13_client.cc | 221 hs->new_cipher = cipher; in do_read_hello_retry_request() 224 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request() 230 hs->new_cipher) || in do_read_hello_retry_request() 388 if (SSL_CIPHER_get_protocol_id(hs->new_cipher) != server_hello.cipher_suite) { in do_read_server_hello() 460 if (ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in do_read_server_hello() 493 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 497 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_read_server_hello()
|
D | tls13_server.cc | 301 hs->new_cipher = choose_tls13_cipher(ssl, &client_hello); in do_select_parameters() 302 if (hs->new_cipher == NULL) { in do_select_parameters() 317 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 486 hs->new_session->cipher = hs->new_cipher; in do_select_session() 534 assert(hs->new_cipher == session->cipher); in do_select_session() 577 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_select_session() 628 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_hello_retry_request() 830 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello()
|
D | handoff.cc | 387 !CBB_add_asn1_uint64(&seq, SSL_CIPHER_get_id(s3->hs->new_cipher)) || in SSL_serialize_handback() 543 if ((hs->new_cipher = in SSL_apply_handback() 639 session->cipher != hs->new_cipher || in SSL_apply_handback() 693 !hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in SSL_apply_handback()
|
D | extensions.cc | 1086 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in ext_ocsp_parse_serverhello() 1120 !ssl_cipher_uses_certificate_auth(hs->new_cipher) || in ext_ocsp_add_serverhello() 1339 !ssl_cipher_uses_certificate_auth(hs->new_cipher) || in ext_sct_add_serverhello() 1869 const uint32_t alg_k = hs->new_cipher->algorithm_mkey; in ext_ec_point_add_serverhello() 1870 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello() 1903 ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in should_offer_psk()
|
/external/boringssl/src/ssl/ |
D | handshake_client.cc | 710 hs->new_cipher = cipher; in do_read_server_hello() 731 if (ssl->session->cipher != hs->new_cipher) { in do_read_server_hello() 758 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 763 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_server_hello() 773 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 804 ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_hello() 829 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_read_server_certificate() 923 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_verify_server_certificate() 968 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher)) { in do_read_server_key_exchange() 982 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_read_server_key_exchange() [all …]
|
D | handshake_server.cc | 759 hs->new_cipher = params.cipher; in do_select_parameters() 825 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 839 if (!ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_select_parameters() 860 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 893 (hs->new_cipher->algorithm_mkey & SSL_kECDHE) == 0) { in do_send_server_hello() 956 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello() 980 if (ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in do_send_server_certificate() 1004 uint32_t alg_k = hs->new_cipher->algorithm_mkey; in do_send_server_certificate() 1005 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1006 if (ssl_cipher_requires_server_key_exchange(hs->new_cipher) || in do_send_server_certificate() [all …]
|
D | tls13_client.cc | 220 hs->new_cipher = cipher; in do_read_hello_retry_request() 223 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request() 229 hs->new_cipher) || in do_read_hello_retry_request() 392 if (SSL_CIPHER_get_protocol_id(hs->new_cipher) != server_hello.cipher_suite) { in do_read_server_hello() 499 if (ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in do_read_server_hello() 532 hs->new_session->cipher = hs->new_cipher; in do_read_server_hello() 536 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_read_server_hello()
|
D | tls13_server.cc | 364 hs->new_cipher = choose_tls13_cipher(ssl, &client_hello); in do_select_parameters() 365 if (hs->new_cipher == NULL) { in do_select_parameters() 380 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher)) { in do_select_parameters() 555 hs->new_session->cipher = hs->new_cipher; in do_select_session() 608 assert(hs->new_cipher == session->cipher); in do_select_session() 651 ssl_get_handshake_digest(ssl_protocol_version(ssl), hs->new_cipher)); in do_select_session() 719 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_hello_retry_request() 924 !CBB_add_u16(&body, SSL_CIPHER_get_protocol_id(hs->new_cipher)) || in do_send_server_hello()
|
D | handoff.cc | 387 !CBB_add_asn1_uint64(&seq, SSL_CIPHER_get_id(s3->hs->new_cipher)) || in SSL_serialize_handback() 543 if ((hs->new_cipher = in SSL_apply_handback() 639 session->cipher != hs->new_cipher || in SSL_apply_handback() 695 !hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in SSL_apply_handback()
|
D | extensions.cc | 994 !ssl_cipher_uses_certificate_auth(hs->new_cipher)) { in ext_ocsp_parse_serverhello() 1028 !ssl_cipher_uses_certificate_auth(hs->new_cipher) || in ext_ocsp_add_serverhello() 1246 !ssl_cipher_uses_certificate_auth(hs->new_cipher) || in ext_sct_add_serverhello() 1775 const uint32_t alg_k = hs->new_cipher->algorithm_mkey; in ext_ec_point_add_serverhello() 1776 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello() 1809 ssl->session->cipher->algorithm_prf != hs->new_cipher->algorithm_prf) { in should_offer_psk()
|
/external/scapy/scapy/layers/ |
D | ipsec.py | 330 def new_cipher(self, key, mode_iv, digest=None): member in CryptAlgo 428 cipher = self.new_cipher(key, mode_iv) 486 cipher = self.new_cipher(key, mode_iv, icv)
|