Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:new_cipher
(Results
1 - 25
of
33
) sorted by relevance
1
2
/third_party/node/deps/openssl/openssl/ssl/
H
A
D
ktls.c
36
switch (s->s3.tmp.
new_cipher
->algorithm_enc) {
in ktls_check_supported_cipher()
44
switch (s->s3.tmp.
new_cipher
->algorithm_mac) {
in ktls_check_supported_cipher()
65
switch (s->s3.tmp.
new_cipher
->algorithm_enc) {
in ktls_configure_crypto()
79
switch (s->s3.tmp.
new_cipher
->algorithm_mac) {
in ktls_configure_crypto()
H
A
D
t1_enc.c
226
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_STREAM_MAC)
in tls1_change_cipher_state()
231
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_TLSTREE)
in tls1_change_cipher_state()
279
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_STREAM_MAC)
in tls1_change_cipher_state()
284
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_TLSTREE)
in tls1_change_cipher_state()
404
new_cipher
->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8))
in tls1_change_cipher_state()
619
if (s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_kGOST18)
in tls1_final_finish_mac()
H
A
D
s3_msg.c
28
s->session->cipher = s->s3.tmp.
new_cipher
;
in ssl3_do_change_cipher_spec()
H
A
D
t1_lib.c
615
unsigned long cid = s->s3.tmp.
new_cipher
->id;
in tls1_shared_group()
808
if (tls1_suiteb(s) && s->s3.tmp.
new_cipher
!= NULL) {
in tls1_check_group_id()
809
unsigned long cid = s->s3.tmp.
new_cipher
->id;
in tls1_check_group_id()
1299
if (clu->amask & s->s3.tmp.
new_cipher
->algorithm_auth) {
in tls1_get_legacy_sigalg()
1308
if (idx == SSL_PKEY_GOST01 && s->s3.tmp.
new_cipher
->algorithm_auth != SSL_aGOST01) {
in tls1_get_legacy_sigalg()
2925
if (s->s3.tmp.
new_cipher
->algorithm_auth & (SSL_aNULL | SSL_aPSK)) {
in ssl_get_auto_dh()
2926
if (s->s3.tmp.
new_cipher
->strength_bits == 256)
in ssl_get_auto_dh()
3074
|| (clu->amask & s->s3.tmp.
new_cipher
->algorithm_auth) == 0
in tls12_get_cert_sigalg_idx()
3076
&& (s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_kRSA) != 0))
in tls12_get_cert_sigalg_idx()
3258
if (!(s->s3.tmp.
new_cipher
in tls_choose_sigalg()
[all...]
H
A
D
tls13_enc.c
317
s->session->cipher = s->s3.tmp.
new_cipher
;
in tls13_setup_key_block()
364
if (s->s3.tmp.
new_cipher
!= NULL) {
in derive_secret_key_and_iv()
365
algenc = s->s3.tmp.
new_cipher
->algorithm_enc;
in derive_secret_key_and_iv()
H
A
D
s3_lib.c
3588
cipher = s->s3.tmp.
new_cipher
;
in ssl3_ctrl()
4339
alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in ssl3_get_req_cert_type()
4547
if (s->s3.tmp.
new_cipher
== NULL)
in ssl_get_algorithm2()
4549
alg2 = s->s3.tmp.
new_cipher
->algorithm2;
in ssl_get_algorithm2()
4553
} else if (s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_PSK) {
in ssl_get_algorithm2()
4603
unsigned long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in ssl_generate_master_secret()
/third_party/openssl/ssl/
H
A
D
ktls.c
36
switch (s->s3.tmp.
new_cipher
->algorithm_enc) {
in ktls_check_supported_cipher()
44
switch (s->s3.tmp.
new_cipher
->algorithm_mac) {
in ktls_check_supported_cipher()
65
switch (s->s3.tmp.
new_cipher
->algorithm_enc) {
in ktls_configure_crypto()
79
switch (s->s3.tmp.
new_cipher
->algorithm_mac) {
in ktls_configure_crypto()
H
A
D
t1_enc.c
226
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_STREAM_MAC)
in tls1_change_cipher_state()
231
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_TLSTREE)
in tls1_change_cipher_state()
279
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_STREAM_MAC)
in tls1_change_cipher_state()
284
if (s->s3.tmp.
new_cipher
->algorithm2 & TLS1_TLSTREE)
in tls1_change_cipher_state()
404
new_cipher
->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8))
in tls1_change_cipher_state()
614
if (s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_kGOST18)
in tls1_final_finish_mac()
H
A
D
s3_msg.c
28
s->session->cipher = s->s3.tmp.
new_cipher
;
in ssl3_do_change_cipher_spec()
H
A
D
t1_lib.c
613
unsigned long cid = s->s3.tmp.
new_cipher
->id;
in tls1_shared_group()
788
if (tls1_suiteb(s) && s->s3.tmp.
new_cipher
!= NULL) {
in tls1_check_group_id()
789
unsigned long cid = s->s3.tmp.
new_cipher
->id;
in tls1_check_group_id()
1279
if (clu->amask & s->s3.tmp.
new_cipher
->algorithm_auth) {
in tls1_get_legacy_sigalg()
1288
if (idx == SSL_PKEY_GOST01 && s->s3.tmp.
new_cipher
->algorithm_auth != SSL_aGOST01) {
in tls1_get_legacy_sigalg()
2905
if (s->s3.tmp.
new_cipher
->algorithm_auth & (SSL_aNULL | SSL_aPSK)) {
in ssl_get_auto_dh()
2906
if (s->s3.tmp.
new_cipher
->strength_bits == 256)
in ssl_get_auto_dh()
3054
|| (clu->amask & s->s3.tmp.
new_cipher
->algorithm_auth) == 0
in tls12_get_cert_sigalg_idx()
3056
&& (s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_kRSA) != 0))
in tls12_get_cert_sigalg_idx()
3238
if (!(s->s3.tmp.
new_cipher
in tls_choose_sigalg()
[all...]
H
A
D
tls13_enc.c
317
s->session->cipher = s->s3.tmp.
new_cipher
;
in tls13_setup_key_block()
364
if (s->s3.tmp.
new_cipher
!= NULL) {
in derive_secret_key_and_iv()
365
algenc = s->s3.tmp.
new_cipher
->algorithm_enc;
in derive_secret_key_and_iv()
H
A
D
s3_lib.c
3588
cipher = s->s3.tmp.
new_cipher
;
in ssl3_ctrl()
4339
alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in ssl3_get_req_cert_type()
4547
if (s->s3.tmp.
new_cipher
== NULL)
in ssl_get_algorithm2()
4549
alg2 = s->s3.tmp.
new_cipher
->algorithm2;
in ssl_get_algorithm2()
4553
} else if (s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_PSK) {
in ssl_get_algorithm2()
4603
unsigned long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in ssl_generate_master_secret()
/third_party/node/deps/openssl/openssl/ssl/statem/
H
A
D
statem_clnt.c
50
&& (s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aNULL))
in cert_req_allowed()
51
|| (s->s3.tmp.
new_cipher
->algorithm_auth & (SSL_aSRP | SSL_aPSK)))
in cert_req_allowed()
66
long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in key_exchange_expected()
279
} else if (!(s->s3.tmp.
new_cipher
->algorithm_auth
in ossl_statem_client_read_transition()
289
|| ((s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_PSK)
in ossl_statem_client_read_transition()
321
if (ske_expected || ((s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_PSK)
in ossl_statem_client_read_transition()
796
s->session->cipher = s->s3.tmp.
new_cipher
;
in ossl_statem_client_post_work()
1341
if (SSL_IS_TLS13(s) && s->s3.tmp.
new_cipher
!= NULL
in set_client_ciphersuite()
1342
&& s->s3.tmp.
new_cipher
->id != c->id) {
in set_client_ciphersuite()
1379
s->s3.tmp.
new_cipher
in set_client_ciphersuite()
[all...]
H
A
D
extensions_srvr.c
790
|| s->s3.tmp.
new_cipher
in tls_parse_ctos_cookie()
838
|| !s->method->put_cipher_by_char(s->s3.tmp.
new_cipher
, &hrrpkt,
in tls_parse_ctos_cookie()
1169
s->s3.tmp.
new_cipher
->algorithm2)))) {
in tls_parse_ctos_psk()
1346
unsigned long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in tls_construct_stoc_ec_pt_formats()
1347
unsigned long alg_a = s->s3.tmp.
new_cipher
->algorithm_auth;
in tls_construct_stoc_ec_pt_formats()
1567
if (s->s3.tmp.
new_cipher
->algorithm_mac == SSL_AEAD
in tls_construct_stoc_etm()
1568
|| s->s3.tmp.
new_cipher
->algorithm_enc == SSL_RC4
in tls_construct_stoc_etm()
1569
|| s->s3.tmp.
new_cipher
->algorithm_enc == SSL_eGOST2814789CNT
in tls_construct_stoc_etm()
1570
|| s->s3.tmp.
new_cipher
->algorithm_enc == SSL_eGOST2814789CNT12
in tls_construct_stoc_etm()
1571
|| s->s3.tmp.
new_cipher
in tls_construct_stoc_etm()
[all...]
H
A
D
statem_srvr.c
326
unsigned long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in send_server_key_exchange()
388
&& (!(s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aNULL)
in send_certificate_request()
396
&& !(s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aSRP)
in send_certificate_request()
401
&& !(s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aPSK)) {
in send_certificate_request()
610
if (!(s->s3.tmp.
new_cipher
->algorithm_auth &
in ossl_statem_server_write_transition()
752
s->session->cipher = s->s3.tmp.
new_cipher
;
in ossl_statem_server_pre_work()
753
} else if (s->session->cipher != s->s3.tmp.
new_cipher
) {
in ossl_statem_server_pre_work()
1261
if ((s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_kSRP) &&
in ssl_check_srp_ext_ClientHello()
1766
&& (s->s3.tmp.
new_cipher
== NULL
in tls_early_post_process_client_hello()
1767
|| s->s3.tmp.
new_cipher
in tls_early_post_process_client_hello()
[all...]
H
A
D
extensions_clnt.c
1723
&& s->s3.tmp.
new_cipher
->algorithm_mac != SSL_AEAD
in tls_parse_stoc_etm()
1724
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_RC4
in tls_parse_stoc_etm()
1725
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_eGOST2814789CNT
in tls_parse_stoc_etm()
1726
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_eGOST2814789CNT12
in tls_parse_stoc_etm()
1727
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_MAGMA
in tls_parse_stoc_etm()
1728
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_KUZNYECHIK)
in tls_parse_stoc_etm()
H
A
D
extensions.c
1068
alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in final_ec_pt_formats()
1069
alg_a = s->s3.tmp.
new_cipher
->algorithm_auth;
in final_ec_pt_formats()
/third_party/openssl/ssl/statem/
H
A
D
statem_clnt.c
50
&& (s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aNULL))
in cert_req_allowed()
51
|| (s->s3.tmp.
new_cipher
->algorithm_auth & (SSL_aSRP | SSL_aPSK)))
in cert_req_allowed()
66
long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in key_exchange_expected()
279
} else if (!(s->s3.tmp.
new_cipher
->algorithm_auth
in ossl_statem_client_read_transition()
289
|| ((s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_PSK)
in ossl_statem_client_read_transition()
321
if (ske_expected || ((s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_PSK)
in ossl_statem_client_read_transition()
796
s->session->cipher = s->s3.tmp.
new_cipher
;
in ossl_statem_client_post_work()
1333
if (SSL_IS_TLS13(s) && s->s3.tmp.
new_cipher
!= NULL
in set_client_ciphersuite()
1334
&& s->s3.tmp.
new_cipher
->id != c->id) {
in set_client_ciphersuite()
1371
s->s3.tmp.
new_cipher
in set_client_ciphersuite()
[all...]
H
A
D
extensions_srvr.c
790
|| s->s3.tmp.
new_cipher
in tls_parse_ctos_cookie()
838
|| !s->method->put_cipher_by_char(s->s3.tmp.
new_cipher
, &hrrpkt,
in tls_parse_ctos_cookie()
1169
s->s3.tmp.
new_cipher
->algorithm2)))) {
in tls_parse_ctos_psk()
1312
unsigned long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in tls_construct_stoc_ec_pt_formats()
1313
unsigned long alg_a = s->s3.tmp.
new_cipher
->algorithm_auth;
in tls_construct_stoc_ec_pt_formats()
1534
if (s->s3.tmp.
new_cipher
->algorithm_mac == SSL_AEAD
in tls_construct_stoc_etm()
1535
|| s->s3.tmp.
new_cipher
->algorithm_enc == SSL_RC4
in tls_construct_stoc_etm()
1536
|| s->s3.tmp.
new_cipher
->algorithm_enc == SSL_eGOST2814789CNT
in tls_construct_stoc_etm()
1537
|| s->s3.tmp.
new_cipher
->algorithm_enc == SSL_eGOST2814789CNT12
in tls_construct_stoc_etm()
1538
|| s->s3.tmp.
new_cipher
in tls_construct_stoc_etm()
[all...]
H
A
D
statem_srvr.c
325
unsigned long alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in send_server_key_exchange()
387
&& (!(s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aNULL)
in send_certificate_request()
395
&& !(s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aSRP)
in send_certificate_request()
400
&& !(s->s3.tmp.
new_cipher
->algorithm_auth & SSL_aPSK)) {
in send_certificate_request()
609
if (!(s->s3.tmp.
new_cipher
->algorithm_auth &
in ossl_statem_server_write_transition()
751
s->session->cipher = s->s3.tmp.
new_cipher
;
in ossl_statem_server_pre_work()
752
} else if (s->session->cipher != s->s3.tmp.
new_cipher
) {
in ossl_statem_server_pre_work()
1250
if ((s->s3.tmp.
new_cipher
->algorithm_mkey & SSL_kSRP) &&
in ssl_check_srp_ext_ClientHello()
1746
&& (s->s3.tmp.
new_cipher
== NULL
in tls_early_post_process_client_hello()
1747
|| s->s3.tmp.
new_cipher
in tls_early_post_process_client_hello()
[all...]
H
A
D
extensions_clnt.c
1708
&& s->s3.tmp.
new_cipher
->algorithm_mac != SSL_AEAD
in tls_parse_stoc_etm()
1709
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_RC4
in tls_parse_stoc_etm()
1710
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_eGOST2814789CNT
in tls_parse_stoc_etm()
1711
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_eGOST2814789CNT12
in tls_parse_stoc_etm()
1712
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_MAGMA
in tls_parse_stoc_etm()
1713
&& s->s3.tmp.
new_cipher
->algorithm_enc != SSL_KUZNYECHIK)
in tls_parse_stoc_etm()
H
A
D
extensions.c
1040
alg_k = s->s3.tmp.
new_cipher
->algorithm_mkey;
in final_ec_pt_formats()
1041
alg_a = s->s3.tmp.
new_cipher
->algorithm_auth;
in final_ec_pt_formats()
/third_party/node/deps/openssl/openssl/ssl/record/
H
A
D
ssl3_record_tls13.c
88
if (!ossl_assert(s->s3.tmp.
new_cipher
!= NULL)) {
in tls13_enc()
92
alg_enc = s->s3.tmp.
new_cipher
->algorithm_enc;
in tls13_enc()
/third_party/openssl/ssl/record/
H
A
D
ssl3_record_tls13.c
88
if (!ossl_assert(s->s3.tmp.
new_cipher
!= NULL)) {
in tls13_enc()
92
alg_enc = s->s3.tmp.
new_cipher
->algorithm_enc;
in tls13_enc()
/third_party/openssl/test/
H
A
D
tls13encryptiontest.c
342
s->s3.tmp.
new_cipher
= SSL_CIPHER_find(s, TLS13_AES_128_GCM_SHA256_BYTES);
in test_tls13_encryption()
343
if (!TEST_ptr(s->s3.tmp.
new_cipher
)) {
in test_tls13_encryption()
Completed in 46 milliseconds
1
2