/external/boringssl/src/ssl/ |
D | handshake_server.cc | 176 const SSL_CLIENT_HELLO *client_hello, uint16_t id) { in ssl_client_cipher_list_contains_cipher() argument 178 CBS_init(&cipher_suites, client_hello->cipher_suites, in ssl_client_cipher_list_contains_cipher() 179 client_hello->cipher_suites_len); in ssl_client_cipher_list_contains_cipher() 196 const SSL_CLIENT_HELLO *client_hello) { in negotiate_version() argument 200 if (ssl_client_hello_get_extension(client_hello, &supported_versions, in negotiate_version() 225 if (client_hello->version <= DTLS1_2_VERSION) { in negotiate_version() 227 } else if (client_hello->version <= DTLS1_VERSION) { in negotiate_version() 233 if (client_hello->version >= TLS1_2_VERSION) { in negotiate_version() 235 } else if (client_hello->version >= TLS1_1_VERSION) { in negotiate_version() 237 } else if (client_hello->version >= TLS1_VERSION) { in negotiate_version() [all …]
|
D | tls13_server.cc | 63 SSL_CLIENT_HELLO *client_hello) { in resolve_ecdhe_secret() argument 69 if (!ssl_client_hello_get_extension(client_hello, &key_share, in resolve_ecdhe_secret() 107 const SSL *ssl, const SSL_CLIENT_HELLO *client_hello, uint16_t group_id) { in choose_tls13_cipher() argument 109 CBS_init(&cipher_suites, client_hello->cipher_suites, in choose_tls13_cipher() 110 client_hello->cipher_suites_len); in choose_tls13_cipher() 207 SSL_CLIENT_HELLO client_hello; in do_select_parameters() local 208 if (!ssl_client_hello_init(ssl, &client_hello, msg)) { in do_select_parameters() 214 OPENSSL_memcpy(hs->session_id, client_hello.session_id, in do_select_parameters() 215 client_hello.session_id_len); in do_select_parameters() 216 hs->session_id_len = client_hello.session_id_len; in do_select_parameters() [all …]
|
D | tls13_enc.cc | 479 Span<const uint8_t> client_hello, size_t binders_len) { in hash_transcript_and_truncated_client_hello() argument 481 if (binders_len + 2 < binders_len || client_hello.size() < binders_len + 2) { in hash_transcript_and_truncated_client_hello() 484 client_hello = client_hello.subspan(0, client_hello.size() - binders_len - 2); in hash_transcript_and_truncated_client_hello() 489 !EVP_DigestUpdate(ctx.get(), client_hello.data(), client_hello.size()) || in hash_transcript_and_truncated_client_hello()
|
D | t1_lib.cc | 210 out->client_hello = CBS_data(&msg.body); in ssl_client_hello_init() 213 CBS client_hello, random, session_id; in ssl_client_hello_init() local 214 CBS_init(&client_hello, out->client_hello, out->client_hello_len); in ssl_client_hello_init() 215 if (!CBS_get_u16(&client_hello, &out->version) || in ssl_client_hello_init() 216 !CBS_get_bytes(&client_hello, &random, SSL3_RANDOM_SIZE) || in ssl_client_hello_init() 217 !CBS_get_u8_length_prefixed(&client_hello, &session_id) || in ssl_client_hello_init() 230 if (!CBS_get_u8_length_prefixed(&client_hello, &cookie) || in ssl_client_hello_init() 237 if (!CBS_get_u16_length_prefixed(&client_hello, &cipher_suites) || in ssl_client_hello_init() 239 !CBS_get_u8_length_prefixed(&client_hello, &compression_methods) || in ssl_client_hello_init() 251 if (CBS_len(&client_hello) == 0) { in ssl_client_hello_init() [all …]
|
D | s3_both.cc | 420 ScopedCBB client_hello; in read_v2_client_hello() local 427 !CBB_init_fixed(client_hello.get(), (uint8_t *)ssl->s3->hs_buf->data, in read_v2_client_hello() 429 !CBB_add_u8(client_hello.get(), SSL3_MT_CLIENT_HELLO) || in read_v2_client_hello() 430 !CBB_add_u24_length_prefixed(client_hello.get(), &hello_body) || in read_v2_client_hello() 461 !CBB_finish(client_hello.get(), NULL, &ssl->s3->hs_buf->length)) { in read_v2_client_hello()
|
D | ssl_session.cc | 714 const SSL_CLIENT_HELLO *client_hello) { in ssl_get_prev_session() argument 724 ssl_client_hello_get_extension(client_hello, &ticket, in ssl_get_prev_session() 728 MakeConstSpan(client_hello->session_id, in ssl_get_prev_session() 729 client_hello->session_id_len))) { in ssl_get_prev_session() 744 MakeConstSpan(client_hello->session_id, client_hello->session_id_len)); in ssl_get_prev_session()
|
D | ssl_test.cc | 1095 const uint8_t *client_hello; in GetClientHello() local 1097 if (!BIO_mem_contents(bio.get(), &client_hello, &client_hello_len)) { in GetClientHello() 1100 *out = std::vector<uint8_t>(client_hello, client_hello + client_hello_len); in GetClientHello() 1124 std::vector<uint8_t> client_hello; in GetClientHelloLen() local 1125 if (!GetClientHello(ssl.get(), &client_hello) || in GetClientHelloLen() 1126 client_hello.size() <= SSL3_RT_HEADER_LENGTH) { in GetClientHelloLen() 1130 return client_hello.size() - SSL3_RT_HEADER_LENGTH; in GetClientHelloLen() 2114 std::vector<uint8_t> client_hello; in TEST() local 2115 ASSERT_TRUE(GetClientHello(ssl.get(), &client_hello)); in TEST() 2121 ASSERT_GE(client_hello.size(), kRandomOffset + SSL3_RANDOM_SIZE); in TEST() [all …]
|
D | internal.h | 1864 const SSL_CLIENT_HELLO *client_hello, CBS *contents); 1896 const SSL_CLIENT_HELLO *client_hello); 1936 bool ssl_client_hello_get_extension(const SSL_CLIENT_HELLO *client_hello, 1940 const SSL_CLIENT_HELLO *client_hello, uint16_t id); 2794 const SSL_CLIENT_HELLO *client_hello); 2940 const SSL_CLIENT_HELLO *client_hello);
|
/external/scapy/scapy/layers/tls/ |
D | automaton_cli.py | 63 client_hello=None, version=None, argument 91 self.client_hello = client_hello 171 self.add_msg(self.client_hello or TLSClientHello()) 529 p = self.client_hello or SSLv2ClientHello(challenge=randstring(16)) 820 if self.client_hello: 821 p = self.client_hello
|
/external/scapy/test/tls/ |
D | example_client.py | 29 t = TLSClientAutomaton(client_hello=ch,
|
D | travis_test_client.py | 32 t = TLSClientAutomaton(client_hello=ch, data=[send_data, b"stop_server", b"quit"], debug=1)
|
/external/boringssl/src/ssl/test/ |
D | test_config.cc | 1099 const SSL_CLIENT_HELLO *client_hello) { in SelectCertificateCallback() argument 1100 const TestConfig *config = GetTestConfig(client_hello->ssl); in SelectCertificateCallback() 1101 GetTestState(client_hello->ssl)->early_callback_called = true; in SelectCertificateCallback() 1105 SSL_get_servername(client_hello->ssl, TLSEXT_NAMETYPE_host_name); in SelectCertificateCallback() 1122 GetTestState(client_hello->ssl)->early_callback_ready; in SelectCertificateCallback() 1127 if (!InstallCertificate(client_hello->ssl)) { in SelectCertificateCallback() 1336 static int DDoSCallback(const SSL_CLIENT_HELLO *client_hello) { in DDoSCallback() argument 1337 const TestConfig *config = GetTestConfig(client_hello->ssl); in DDoSCallback()
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 3716 const uint8_t *client_hello; member 3751 const SSL_CLIENT_HELLO *client_hello, uint16_t extension_type,
|
/external/scapy/test/ |
D | sslv2.uts | 256 ch_pkt.msgtype = 'client_hello'
|
D | tls.uts | 1030 ch.msgtype = 'client_hello'
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 6302 static enum ssl_select_cert_result_t select_certificate_cb(const SSL_CLIENT_HELLO* client_hello) { in select_certificate_cb() argument 6303 SSL* ssl = client_hello->ssl; in select_certificate_cb()
|