/aosp_15_r20/external/cronet/third_party/boringssl/src/ssl/ |
H A D | ssl_cipher.cc | 502 uint32_t algorithm_auth = ~0u; member 798 (alias->algorithm_mkey == 0 || alias->algorithm_auth == 0 || in ssl_cipher_apply_rule() 846 !(alias->algorithm_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1067 alias.algorithm_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1292 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1425 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1467 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1481 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1512 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1525 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() [all …]
|
H A D | handshake_client.cc | 272 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 792 (cipher->algorithm_auth & mask_a) || in do_read_server_hello() 1082 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1447 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
H A D | handshake_server.cc | 331 (c->algorithm_auth & mask_a) && in choose_cipher() 1133 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1417 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
H A D | ssl_cert.cc | 530 if (!(hs->new_cipher->algorithm_auth & in ssl_check_leaf_certificate()
|
H A D | internal.h | 573 uint32_t algorithm_auth;
|
H A D | extensions.cc | 1880 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/aosp_15_r20/external/boringssl/src/ssl/ |
H A D | ssl_cipher.cc | 502 uint32_t algorithm_auth = ~0u; member 798 (alias->algorithm_mkey == 0 || alias->algorithm_auth == 0 || in ssl_cipher_apply_rule() 846 !(alias->algorithm_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1067 alias.algorithm_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1292 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1425 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1467 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1481 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1512 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1525 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() [all …]
|
H A D | handshake_client.cc | 272 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 792 (cipher->algorithm_auth & mask_a) || in do_read_server_hello() 1082 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1448 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
H A D | handshake_server.cc | 329 (c->algorithm_auth & mask_a) && in choose_cipher() 1142 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1426 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
H A D | ssl_cert.cc | 530 if (!(hs->new_cipher->algorithm_auth & in ssl_check_leaf_certificate()
|
H A D | internal.h | 568 uint32_t algorithm_auth;
|
H A D | extensions.cc | 1885 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_cipher.cc | 491 uint32_t algorithm_auth; member 866 !(alg_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1093 alg_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1296 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1434 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1468 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1482 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1511 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1524 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() 1528 assert(cipher->algorithm_auth == SSL_aGENERIC); in SSL_CIPHER_get_kx_name() [all …]
|
D | handshake_client.cc | 257 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 775 (cipher->algorithm_auth & mask_a) || in do_read_server_hello() 1058 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1370 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
D | handshake_server.cc | 372 (c->algorithm_auth & mask_a) && in choose_cipher() 1091 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1351 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
D | ssl_cert.cc | 705 if (!(hs->new_cipher->algorithm_auth & ssl_cipher_auth_mask_for_key(pkey))) { in ssl_check_leaf_certificate()
|
D | internal.h | 530 uint32_t algorithm_auth;
|
D | extensions.cc | 1921 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_cipher.cc | 491 uint32_t algorithm_auth; member 866 !(alg_auth & cp->algorithm_auth) || in ssl_cipher_apply_rule() 1093 alg_auth &= kCipherAliases[j].algorithm_auth; in ssl_cipher_process_rulestr() 1296 return (cipher->algorithm_auth & SSL_aCERT) != 0; in ssl_cipher_uses_certificate_auth() 1434 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_auth_nid() 1468 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_min_version() 1482 cipher->algorithm_auth == SSL_aGENERIC) { in SSL_CIPHER_get_max_version() 1511 switch (cipher->algorithm_auth) { in SSL_CIPHER_get_kx_name() 1524 assert(cipher->algorithm_auth == SSL_aPSK); in SSL_CIPHER_get_kx_name() 1528 assert(cipher->algorithm_auth == SSL_aGENERIC); in SSL_CIPHER_get_kx_name() [all …]
|
D | handshake_client.cc | 257 (cipher->algorithm_auth & mask_a)) { in ssl_write_client_cipher_list() 775 (cipher->algorithm_auth & mask_a) || in do_read_server_hello() 1058 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_server_key_exchange() 1370 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_client_key_exchange()
|
D | handshake_server.cc | 372 (c->algorithm_auth & mask_a) && in choose_cipher() 1091 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_send_server_certificate() 1351 uint32_t alg_a = hs->new_cipher->algorithm_auth; in do_read_client_key_exchange()
|
D | ssl_cert.cc | 705 if (!(hs->new_cipher->algorithm_auth & ssl_cipher_auth_mask_for_key(pkey))) { in ssl_check_leaf_certificate()
|
D | internal.h | 530 uint32_t algorithm_auth;
|
D | extensions.cc | 1921 const uint32_t alg_a = hs->new_cipher->algorithm_auth; in ext_ec_point_add_serverhello()
|
/aosp_15_r20/external/cronet/third_party/netty-tcnative/src/c/ |
H A D | sslutils.c | 92 switch (cipher->algorithm_auth) in SSL_cipher_authentication_method() 110 switch (cipher->algorithm_auth) in SSL_cipher_authentication_method()
|