/external/boringssl/src/ssl/test/ |
handshaker.cc | 55 CBS cbs, handoff; local 57 if (!CBS_get_asn1_element(&cbs, &handoff, CBS_ASN1_SEQUENCE) || 61 !SSL_apply_handoff(ssl.get(), handoff)) { 62 fprintf(stderr, "Handoff application failed.\n"); 160 Span<uint8_t> handoff(buf.get(), len); 161 if (!Handshaker(config, kFdProxyToHandshaker, kFdHandshakerToProxy, handoff,
|
fuzzer.h | 326 // fuzzing, use the serialized handoff that's getting fuzzed. 329 fprintf(stderr, "Handoff failed.\n"); 500 CBS handoff; local 501 if (!CBS_get_u24_length_prefixed(cbs, &handoff)) { 504 handoff_.CopyFrom(handoff);
|
test_config.h | 160 bool handoff = false; member in struct:TestConfig
|
/external/boringssl/src/ssl/ |
ssl_test.cc | 4052 Array<uint8_t> handoff; local 4296 uint8_t handoff[] = { local 4329 uint8_t handoff[] = { local [all...] |
internal.h | 2561 bool handoff : 1; member in struct:SSL_CONFIG 3168 bool handoff : 1; member in struct:ssl_ctx_st [all...] |