/external/openssl/ssl/ |
H A D | s23_lib.c | 111 if (c->algorithm_mkey == SSL_kECDHr || 112 c->algorithm_mkey == SSL_kECDHe || 113 c->algorithm_mkey == SSL_kEECDH ||
|
H A D | ssl_ciph.c | 805 !(c->algorithm_mkey & disabled_mkey) && 817 printf("\t%d: %s %lx %lx %lx\n",i,c->name,c->id,c->algorithm_mkey,c->algorithm_auth); 888 unsigned long algorithm_mkey = cipher_aliases[i].algorithm_mkey; local 894 if (algorithm_mkey) 895 if ((algorithm_mkey & mask_mkey) == 0) 980 printf("\nName: %s:\nAlgo = %08lx/%08lx/%08lx/%08lx/%08lx Algo_strength = %08lx\n", cp->name, cp->algorithm_mkey, cp->algorithm_auth, cp->algorithm_enc, cp->algorithm_mac, cp->algorithm_ssl, cp->algo_strength); 983 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) 1225 if (ca_list[j]->algorithm_mkey) 1229 alg_mkey &= ca_list[j]->algorithm_mkey; [all...] |
H A D | d1_srvr.c | 423 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 517 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 1072 type=s->s3->tmp.new_cipher->algorithm_mkey; 1313 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 1598 if ((s->s3->tmp.new_cipher->algorithm_mkey != SSL_kKRB5) ||
|
H A D | ssl_lib.c | 1455 if (((c->algorithm_mkey & SSL_kKRB5) || (c->algorithm_auth & SSL_aKRB5)) && 1466 if (((c->algorithm_mkey & SSL_kSRP) || (c->algorithm_auth & SSL_aSRP)) && 2406 alg_k = cs->algorithm_mkey; 2479 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 3493 if (!c || (c->algorithm_mkey != SSL_kEDH && 3494 c->algorithm_mkey != SSL_kEECDH))
|
H A D | s3_clnt.c | 339 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kRSA))) 393 if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) 1038 if (((c->algorithm_mkey & SSL_kSRP) || (c->algorithm_auth & SSL_aSRP)) && 1254 && !((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1281 need_cert = ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5) && 1289 s->s3->tmp.new_cipher->algorithm_mkey, s->s3->tmp.new_cipher->algorithm_auth, need_cert); 1442 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 2467 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 3482 alg_k=s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | s3_srvr.c | 193 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 421 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kRSA))) 448 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 532 || (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 1486 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kEECDH) == 0) 1647 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 2237 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 3441 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kKRB5))
|
H A D | d1_clnt.c | 389 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 995 alg_k=s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | t1_lib.c | 1994 alg_k = c->algorithm_mkey; 2079 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2272 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | s3_lib.c | 3968 alg_k=c->algorithm_mkey; 4178 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | t1_enc.c | 354 s->s3->tmp.new_cipher->algorithm_mkey,
|
H A D | ssl.h | 396 unsigned long algorithm_mkey; /* key exchange algorithm */ member in struct:ssl_cipher_st
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_ciph.c | 451 printf("\t%d: %s %lx %lx %lx\n",i,c->name,c->id,c->algorithm_mkey,c->algorithm_auth); 580 printf("\nName: %s:\nAlgo = %08lx/%08lx/%08lx/%08lx/%08lx Algo_strength = %08lx\n", cp->name, cp->algorithm_mkey, cp->algorithm_auth, cp->algorithm_enc, cp->algorithm_mac, cp->algorithm_ssl, cp->algo_strength); 586 if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) 877 if (ca_list[j]->algorithm_mkey) 881 alg_mkey &= ca_list[j]->algorithm_mkey; 885 alg_mkey = ca_list[j]->algorithm_mkey; 1222 alg_mkey = cipher->algorithm_mkey; 1387 switch (cipher->algorithm_mkey) { 1469 !(cipher->algorithm_mkey & SSL_kRSA)) 1493 if (cipher->algorithm_mkey [all...] |
H A D | d1_srvr.c | 357 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 419 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
|
H A D | s3_clnt.c | 927 c->algorithm_mkey & ct->mask_k || 1228 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 1891 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 2474 alg_k=s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | s3_srvr.c | 414 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 1167 (s->s3->tmp.new_cipher->algorithm_mkey & SSL_kEECDH) == 0) 1296 alg_k=s->s3->tmp.new_cipher->algorithm_mkey; 1778 alg_k=s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | ssl_lib.c | 1513 c->algorithm_mkey & ct->mask_k || 3252 if (!c || (c->algorithm_mkey != SSL_kEDH && 3253 c->algorithm_mkey != SSL_kEECDH))
|
H A D | t1_lib.c | 903 alg_k = c->algorithm_mkey; 1204 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2175 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
|
H A D | s3_lib.c | 1858 alg_k=c->algorithm_mkey;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | SSLParametersImpl.java | 940 int algorithm_mkey = NativeCrypto.get_SSL_CIPHER_algorithm_mkey(sslCipherNative); 942 switch (algorithm_mkey) { 976 + "mkey: 0x" + Long.toHexString(algorithm_mkey & 0xffffffffL)
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 314 unsigned long algorithm_mkey; /* key exchange algorithm */ member in struct:ssl_cipher_st
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 396 unsigned long algorithm_mkey; /* key exchange algorithm */ member in struct:ssl_cipher_st
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 7778 JNI_TRACE("cipher=%p get_SSL_CIPHER_algorithm_mkey => %ld", cipher, cipher->algorithm_mkey); 7779 return cipher->algorithm_mkey;
|