| /third_party/node/deps/openssl/openssl/ssl/ |
| D | ssl_ciph.c | 704 if ((c->algorithm_mkey & disabled_mkey) || in ssl_cipher_collect_ciphers() 781 uint32_t algorithm_mkey = cipher_aliases[i].algorithm_mkey; in ssl_cipher_collect_aliases() local 786 if (algorithm_mkey) in ssl_cipher_collect_aliases() 787 if ((algorithm_mkey & mask_mkey) == 0) in ssl_cipher_collect_aliases() 868 cp->name, cp->algorithm_mkey, cp->algorithm_auth, in ssl_cipher_apply_rule() 874 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) in ssl_cipher_apply_rule() 1108 if (ca_list[j]->algorithm_mkey) { in ssl_cipher_process_rulestr() 1110 alg_mkey &= ca_list[j]->algorithm_mkey; in ssl_cipher_process_rulestr() 1116 alg_mkey = ca_list[j]->algorithm_mkey; in ssl_cipher_process_rulestr() 1708 alg_mkey = cipher->algorithm_mkey; in SSL_CIPHER_description() [all …]
|
| D | t1_lib.c | 1663 if (c->algorithm_mkey & s->s3.tmp.mask_k in ssl_cipher_disabled() 1676 && (c->algorithm_mkey & (SSL_kECDHE | SSL_kECDHEPSK)) != 0) in ssl_cipher_disabled() 2125 if ((c->algorithm_mkey & (SSL_kGOST | SSL_kGOST18)) != 0) in tls12_sigalg_allowed() 3076 && (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0)) in tls12_get_cert_sigalg_idx()
|
| D | s3_lib.c | 4268 alg_k = c->algorithm_mkey; in ssl3_choose_cipher() 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type() 4553 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) { in ssl_get_algorithm2() 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl_generate_master_secret()
|
| D | t1_enc.c | 619 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18) in tls1_final_finish_mac()
|
| D | t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex()
|
| D | ssl_cert.c | 1069 !(c->algorithm_mkey & pfs_mask)) in ssl_security_default_callback()
|
| D | ssl_local.h | 478 uint32_t algorithm_mkey; /* key exchange algorithm */ member
|
| /third_party/openssl/ssl/ |
| D | ssl_ciph.c | 703 if ((c->algorithm_mkey & disabled_mkey) || in ssl_cipher_collect_ciphers() 780 uint32_t algorithm_mkey = cipher_aliases[i].algorithm_mkey; in ssl_cipher_collect_aliases() local 785 if (algorithm_mkey) in ssl_cipher_collect_aliases() 786 if ((algorithm_mkey & mask_mkey) == 0) in ssl_cipher_collect_aliases() 867 cp->name, cp->algorithm_mkey, cp->algorithm_auth, in ssl_cipher_apply_rule() 873 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) in ssl_cipher_apply_rule() 1107 if (ca_list[j]->algorithm_mkey) { in ssl_cipher_process_rulestr() 1109 alg_mkey &= ca_list[j]->algorithm_mkey; in ssl_cipher_process_rulestr() 1115 alg_mkey = ca_list[j]->algorithm_mkey; in ssl_cipher_process_rulestr() 1707 alg_mkey = cipher->algorithm_mkey; in SSL_CIPHER_description() [all …]
|
| D | t1_lib.c | 1643 if (c->algorithm_mkey & s->s3.tmp.mask_k in ssl_cipher_disabled() 1656 && (c->algorithm_mkey & (SSL_kECDHE | SSL_kECDHEPSK)) != 0) in ssl_cipher_disabled() 2105 if ((c->algorithm_mkey & (SSL_kGOST | SSL_kGOST18)) != 0) in tls12_sigalg_allowed() 3056 && (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0)) in tls12_get_cert_sigalg_idx()
|
| D | s3_lib.c | 4268 alg_k = c->algorithm_mkey; in ssl3_choose_cipher() 4339 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_get_req_cert_type() 4553 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) { in ssl_get_algorithm2() 4603 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl_generate_master_secret()
|
| D | t1_enc.c | 614 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18) in tls1_final_finish_mac()
|
| D | t1_trce.c | 1053 unsigned long alg_k = ssl->s3.tmp.new_cipher->algorithm_mkey; in ssl_get_keyex()
|
| D | ssl_cert.c | 1069 !(c->algorithm_mkey & pfs_mask)) in ssl_security_default_callback()
|
| D | ssl_local.h | 471 uint32_t algorithm_mkey; /* key exchange algorithm */ member
|
| /third_party/node/deps/openssl/openssl/ssl/statem/ |
| D | statem_clnt.c | 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected() 289 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 321 if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 2195 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_key_exchange() 2740 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { in tls_process_server_done() 3294 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_client_key_exchange() 3350 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { in tls_client_key_exchange_post_work() 3359 if (pms == NULL && !(s->s3.tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { in tls_client_key_exchange_post_work() 3552 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_check_cert_and_algorithm()
|
| D | statem_srvr.c | 326 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange() 1261 if ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) && in ssl_check_srp_ext_ClientHello() 2255 ((s->s3.tmp.new_cipher->algorithm_mkey in tls_post_process_client_hello() 2466 type = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_server_key_exchange() 2592 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK)) != 0) { in tls_construct_server_key_exchange() 3306 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_client_key_exchange()
|
| D | extensions.c | 1068 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats()
|
| D | extensions_srvr.c | 1346 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats()
|
| D | extensions_clnt.c | 128 alg_k = c->algorithm_mkey; in use_ecc()
|
| /third_party/openssl/ssl/statem/ |
| D | statem_clnt.c | 66 long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in key_exchange_expected() 289 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 321 if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) in ossl_statem_client_read_transition() 2187 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_key_exchange() 2732 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { in tls_process_server_done() 3286 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_client_key_exchange() 3342 if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { in tls_client_key_exchange_post_work() 3351 if (pms == NULL && !(s->s3.tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { in tls_client_key_exchange_post_work() 3544 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in ssl3_check_cert_and_algorithm()
|
| D | statem_srvr.c | 325 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in send_server_key_exchange() 1250 if ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) && in ssl_check_srp_ext_ClientHello() 2235 ((s->s3.tmp.new_cipher->algorithm_mkey in tls_post_process_client_hello() 2445 type = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_server_key_exchange() 2571 || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK)) != 0) { in tls_construct_server_key_exchange() 3285 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_process_client_key_exchange()
|
| D | extensions.c | 1040 alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in final_ec_pt_formats()
|
| D | extensions_srvr.c | 1312 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats()
|
| D | extensions_clnt.c | 128 alg_k = c->algorithm_mkey; in use_ecc()
|