Home
last modified time | relevance | path

Searched refs:hs (Results 1 – 25 of 668) sorted by relevance

12345678910>>...27

/external/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(SSL_HANDSHAKE *hs, uint32_t *out_mask_a, in ssl_get_client_disabled() argument
211 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
217 static bool ssl_write_client_cipher_list(SSL_HANDSHAKE *hs, CBB *out) { in ssl_write_client_cipher_list() argument
218 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
220 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
229 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
235 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
250 if (hs->min_version < TLS1_3_VERSION) { in ssl_write_client_cipher_list()
258 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
259 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc62 static int resolve_ecdhe_secret(SSL_HANDSHAKE *hs, bool *out_need_retry, in resolve_ecdhe_secret() argument
64 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
79 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &dhe_secret, in resolve_ecdhe_secret()
90 return tls13_advance_key_schedule(hs, dhe_secret); in resolve_ecdhe_secret()
93 static int ssl_ext_supported_versions_add_serverhello(SSL_HANDSHAKE *hs, in ssl_ext_supported_versions_add_serverhello() argument
98 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello()
117 static bool add_new_session_tickets(SSL_HANDSHAKE *hs, bool *out_sent_tickets) { in add_new_session_tickets() argument
118 SSL *const ssl = hs->ssl; in add_new_session_tickets()
121 !hs->accept_psk_mode || in add_new_session_tickets()
135 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets()
[all …]
Dhandshake_server.cc195 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
197 SSL *const ssl = hs->ssl; in negotiate_version()
245 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
257 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
300 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
306 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
307 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
308 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
315 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
320 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc55 static enum ssl_hs_wait_t do_read_hello_retry_request(SSL_HANDSHAKE *hs) { in do_read_hello_retry_request() argument
56 SSL *const ssl = hs->ssl; in do_read_hello_retry_request()
66 if (!hs->early_data_offered && in do_read_hello_retry_request()
81 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || in do_read_hello_retry_request()
94 hs->tls13_state = state_read_server_hello; in do_read_hello_retry_request()
108 hs->new_cipher = cipher; in do_read_hello_retry_request()
110 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request()
111 !hs->transcript.UpdateForHelloRetryRequest()) { in do_read_hello_retry_request()
148 if (!hs->cookie.CopyFrom(cookie_value)) { in do_read_hello_retry_request()
162 if (!tls1_check_group_id(hs, group_id)) { in do_read_hello_retry_request()
[all …]
Dt1_lib.cc134 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
299 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
300 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
301 return hs->config->supported_group_list; in tls1_get_grouplist()
306 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
307 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
319 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
323 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
325 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
396 bool tls1_check_group_id(const SSL_HANDSHAKE *hs, uint16_t group_id) { in tls1_check_group_id() argument
[all …]
Dtls13_enc.cc36 static bool init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, in init_key_schedule() argument
38 if (!hs->transcript.InitHash(version, cipher)) { in init_key_schedule()
43 hs->ResizeSecrets(hs->transcript.DigestLen()); in init_key_schedule()
44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule()
49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { in hkdf_extract_to_secret() argument
51 if (!HKDF_extract(hs->secret().data(), &len, hs->transcript.Digest(), in hkdf_extract_to_secret()
52 in.data(), in.size(), hs->secret().data(), in hkdf_extract_to_secret()
53 hs->secret().size())) { in hkdf_extract_to_secret()
56 assert(len == hs->secret().size()); in hkdf_extract_to_secret()
60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
[all …]
Dhandshake.cc168 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local
169 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new()
172 hs->config = ssl->config.get(); in ssl_handshake_new()
173 if (!hs->config) { in ssl_handshake_new()
174 assert(hs->config); in ssl_handshake_new()
177 return hs; in ssl_handshake_new()
231 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument
237 return hs->transcript.Update(msg.raw); in ssl_hash_message()
291 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument
292 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert()
[all …]
Dtls13_both.cc57 SSL_HANDSHAKE *hs, Array<uint8_t> *out, in tls13_get_cert_verify_signature_input() argument
97 if (!hs->transcript.GetHash(context_hash, &context_hash_len) || in tls13_get_cert_verify_signature_input()
107 bool tls13_process_certificate(SSL_HANDSHAKE *hs, const SSLMessage &msg, in tls13_process_certificate() argument
109 SSL *const ssl = hs->ssl; in tls13_process_certificate()
194 ssl->server && hs->config->retain_only_sha256_of_client_certs; in tls13_process_certificate()
224 hs->new_session->peer_sha256); in tls13_process_certificate()
256 if (ssl->server || !hs->config->ocsp_stapling_enabled) { in tls13_process_certificate()
274 hs->new_session->ocsp_response.reset( in tls13_process_certificate()
276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate()
284 if (ssl->server || !hs->config->signed_cert_timestamps_enabled) { in tls13_process_certificate()
[all …]
Dhandoff.cc56 s3->hs == nullptr || in SSL_serialize_handoff()
63 Span<const uint8_t> transcript = s3->hs->transcript.buffer(); in SSL_serialize_handoff()
83 s3->hs == nullptr || in SSL_decline_handoff()
88 s3->hs->config->handoff = false; in SSL_decline_handoff()
157 tls1_get_grouplist(ssl->s3->hs.get()); in apply_remote_features()
217 s3->hs->transcript.Update(transcript); in SSL_apply_handoff()
220 s3->hs->handback = true; in SSL_apply_handoff()
230 switch (ssl->s3->hs->state) { in SSL_serialize_handback()
253 transcript = s3->hs->transcript.buffer(); in SSL_serialize_handback()
276 s3->session_reused ? ssl->session.get() : s3->hs->new_session.get(); in SSL_serialize_handback()
[all …]
Dssl_versions.cc170 bool ssl_get_version_range(const SSL_HANDSHAKE *hs, uint16_t *out_min_version, in ssl_get_version_range() argument
174 uint32_t options = hs->ssl->options; in ssl_get_version_range()
175 if (SSL_is_dtls(hs->ssl)) { in ssl_get_version_range()
184 hs->config->conf_min_version) || in ssl_get_version_range()
186 hs->config->conf_max_version)) { in ssl_get_version_range()
192 if (hs->ssl->quic_method && min_version < TLS1_3_VERSION) { in ssl_get_version_range()
246 return ssl->s3->hs->early_session->ssl_version; in ssl_version()
263 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) { in ssl_supports_version() argument
264 SSL *const ssl = hs->ssl; in ssl_supports_version()
268 hs->min_version > protocol_version || in ssl_supports_version()
[all …]
Dinternal.h475 bool ssl_get_version_range(const SSL_HANDSHAKE *hs, uint16_t *out_min_version,
479 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version);
487 bool ssl_add_supported_versions(SSL_HANDSHAKE *hs, CBB *cbb);
493 bool ssl_negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert,
1017 bool ssl_has_private_key(const SSL_HANDSHAKE *hs);
1026 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out,
1029 enum ssl_private_key_result_t ssl_private_key_decrypt(SSL_HANDSHAKE *hs,
1037 bool ssl_private_key_supports_signature_algorithm(SSL_HANDSHAKE *hs,
1270 bool ssl_has_certificate(const SSL_HANDSHAKE *hs);
1292 bool ssl_add_cert_chain(SSL_HANDSHAKE *hs, CBB *cbb);
[all …]
Dssl_cert.cc341 bool ssl_has_certificate(const SSL_HANDSHAKE *hs) { in ssl_has_certificate() argument
342 return hs->config->cert->chain != nullptr && in ssl_has_certificate()
343 sk_CRYPTO_BUFFER_value(hs->config->cert->chain.get(), 0) != nullptr && in ssl_has_certificate()
344 ssl_has_private_key(hs); in ssl_has_certificate()
411 bool ssl_add_cert_chain(SSL_HANDSHAKE *hs, CBB *cbb) { in ssl_add_cert_chain() argument
412 if (!ssl_has_certificate(hs)) { in ssl_add_cert_chain()
422 STACK_OF(CRYPTO_BUFFER) *chain = hs->config->cert->chain.get(); in ssl_add_cert_chain()
678 bool ssl_add_client_CA_list(SSL_HANDSHAKE *hs, CBB *cbb) { in ssl_add_client_CA_list() argument
684 const STACK_OF(CRYPTO_BUFFER) *names = hs->config->client_CA.get(); in ssl_add_client_CA_list()
686 names = hs->ssl->ctx->client_CA.get(); in ssl_add_client_CA_list()
[all …]
Dssl_session.cc345 int ssl_get_new_session(SSL_HANDSHAKE *hs, int is_server) { in ssl_get_new_session() argument
346 SSL *const ssl = hs->ssl; in ssl_get_new_session()
379 if (hs->ticket_expected || version >= TLS1_3_VERSION) { in ssl_get_new_session()
393 if (hs->config->cert->sid_ctx_length > sizeof(session->sid_ctx)) { in ssl_get_new_session()
397 OPENSSL_memcpy(session->sid_ctx, hs->config->cert->sid_ctx, in ssl_get_new_session()
398 hs->config->cert->sid_ctx_length); in ssl_get_new_session()
399 session->sid_ctx_length = hs->config->cert->sid_ctx_length; in ssl_get_new_session()
405 hs->new_session = std::move(session); in ssl_get_new_session()
460 static int ssl_encrypt_ticket_with_cipher_ctx(SSL_HANDSHAKE *hs, CBB *out, in ssl_encrypt_ticket_with_cipher_ctx() argument
478 SSL_CTX *tctx = hs->ssl->session_ctx.get(); in ssl_encrypt_ticket_with_cipher_ctx()
[all …]
Dssl_privkey.cc136 bool ssl_has_private_key(const SSL_HANDSHAKE *hs) { in ssl_has_private_key() argument
137 if (hs->config->cert->privatekey != nullptr || in ssl_has_private_key()
138 hs->config->cert->key_method != nullptr || in ssl_has_private_key()
139 ssl_signing_with_dc(hs)) { in ssl_has_private_key()
201 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, in ssl_private_key_sign() argument
203 SSL *const ssl = hs->ssl; in ssl_private_key_sign()
204 const SSL_PRIVATE_KEY_METHOD *key_method = hs->config->cert->key_method; in ssl_private_key_sign()
205 EVP_PKEY *privatekey = hs->config->cert->privatekey.get(); in ssl_private_key_sign()
206 if (ssl_signing_with_dc(hs)) { in ssl_private_key_sign()
207 key_method = hs->config->cert->dc_key_method; in ssl_private_key_sign()
[all …]
/external/boringssl/src/ssl/test/runner/
Dhandshake_server.go51 hs := serverHandshakeState{
54 if err := hs.readClientHello(); err != nil {
59 if err := hs.doTLS13Handshake(); err != nil {
63 isResume, err := hs.processClientHello()
71 if err := hs.doResumeHandshake(); err != nil {
74 if err := hs.establishKeys(); err != nil {
78 if err := hs.sendSessionTicket(); err != nil {
82 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
90 c.writeRecord(recordTypeHandshake, hs.finishedBytes)
95 if err := hs.readFinished(nil, isResume); err != nil {
[all …]
Dhandshake_client.go690 hs := &clientHandshakeState{
700 hs.writeHash(helloBytes, hs.c.sendHandshakeSeq-1)
702 err = hs.finishedHash.UpdateForHelloRetryRequest()
706 hs.writeServerHash(helloRetryRequest.marshal())
707 hs.writeClientHash(secondHelloBytes)
709 hs.writeServerHash(hs.serverHello.marshal())
712 if err := hs.doTLS13Handshake(); err != nil {
717 hs.establishKeys()
721 if hs.serverHello.compressionMethod != compressionNone {
726 err = hs.processServerExtensions(&serverHello.extensions)
[all …]
/external/skqp/src/compute/hs/vk/
Dhs_vk.c247 hs_transpose(struct hs_vk const * const hs, in hs_transpose() argument
254 hs->pipelines.transpose[0]); in hs_transpose()
265 hs_bc(struct hs_vk const * const hs, in hs_bc() argument
278 hs->pipelines.bc[clean_slabs_log2]); in hs_bc()
289 hs_hm(struct hs_vk const * const hs, in hs_hm() argument
301 uint32_t const log2_rem = clean_slabs_log2 - hs->bc_slabs_log2_max; in hs_hm()
302 uint32_t const scale_log2 = MIN_MACRO(hs->config.merge.hm.scale_max,log2_rem); in hs_hm()
306 uint32_t const slab_span = hs->config.slab.height << log2_out; in hs_hm()
310 hs->pipelines.hm[scale_log2][0]); in hs_hm()
323 hs_fm(struct hs_vk const * const hs, in hs_fm() argument
[all …]
/external/skqp/src/compute/hs/cl/
Dhs_cl.c233 hs_transpose(struct hs_cl const * const hs, in hs_transpose() argument
236 size_t const size[1] = { state->bx_ru << hs->config.slab.threads_log2 }; in hs_transpose()
237 cl_kernel kernel = hs->kernels.transpose[0]; in hs_transpose()
273 hs_hm_enqueue(struct hs_cl const * const hs, in hs_hm_enqueue() argument
283 cl_kernel kernel = hs->kernels.hm[scale_log2][0]; in hs_hm_enqueue()
313 hs_hm(struct hs_cl const * const hs, in hs_hm() argument
323 uint32_t const log2_rem = clean_slabs_log2 - hs->bc_slabs_log2_max; in hs_hm()
324 uint32_t const scale_log2 = MIN_MACRO(hs->config.merge.hm.scale_max,log2_rem); in hs_hm()
328 uint32_t const span_threads = hs->slab_keys << log2_out; in hs_hm()
331 hs_hm_enqueue(hs, in hs_hm()
[all …]
/external/lzma/Java/SevenZip/Compression/LZ/
DBinTree.java97 int hs = kBT2HashSize; in Create() local
101 hs = historySize - 1; in Create()
102 hs |= (hs >> 1); in Create()
103 hs |= (hs >> 2); in Create()
104 hs |= (hs >> 4); in Create()
105 hs |= (hs >> 8); in Create()
106 hs >>= 1; in Create()
107 hs |= 0xFFFF; in Create()
108 if (hs > (1 << 24)) in Create()
109 hs >>= 1; in Create()
[all …]
/external/icu/icu4j/perf-tests/src/com/ibm/icu/dev/test/perf/
DUnicodeSetPerf.java28 HashSet hs; field in UnicodeSetPerf
44 hs = new HashSet(); in setup()
70 hs.clear();
75 hs.add(new Integer(cp));
108 hs.clear();
111 hs.add(new Integer(it.codepoint));
117 if (hs.contains(new Integer(cp))) {
146 hs.clear();
149 hs.add(new Integer(it.codepoint));
154 Iterator itr = hs.iterator();
/external/lzma/CS/7zip/Compress/LZ/
DLzBinTree.cs97 UInt32 hs = kBT2HashSize; in Create()
101 hs = historySize - 1; in Create()
102 hs |= (hs >> 1); in Create()
103 hs |= (hs >> 2); in Create()
104 hs |= (hs >> 4); in Create()
105 hs |= (hs >> 8); in Create()
106 hs >>= 1; in Create()
107 hs |= 0xFFFF; in Create()
108 if (hs > (1 << 24)) in Create()
109 hs >>= 1; in Create()
[all …]
/external/aac/libSBRenc/src/
Dmh_det.cpp1120 HANDLE_SBR_MISSING_HARMONICS_DETECTOR hs = hSbrMHDet; in FDKsbrEnc_CreateSbrMissingHarmonicsDetector() local
1128 FDKmemclear(hs, sizeof(SBR_MISSING_HARMONICS_DETECTOR)); in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1130 hs->prevEnvelopeCompensation = GetRam_Sbr_prevEnvelopeCompensation(chan); in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1131 hs->guideScfb = GetRam_Sbr_guideScfb(chan); in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1135 (NULL == hs->prevEnvelopeCompensation) || (NULL == hs->guideScfb)) { in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1140 hs->guideVectors[i].guideVectorDiff = in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1142 hs->guideVectors[i].guideVectorOrig = in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1144 hs->detectionVectors[i] = detectionVectors + (i * MAX_FREQ_COEFFS); in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1145 hs->guideVectors[i].guideVectorDetected = in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
1152 hs->guideVectors[0].guideVectorDiff = guideVectorDiff; in FDKsbrEnc_CreateSbrMissingHarmonicsDetector()
[all …]
/external/apache-commons-bcel/src/main/java/org/apache/bcel/verifier/structurals/
DExceptionHandlers.java51 Set<ExceptionHandler> hs; in ExceptionHandlers() local
52 hs = exceptionhandlers.get(ih); in ExceptionHandlers()
53 if (hs == null) { in ExceptionHandlers()
54 hs = new HashSet<>(); in ExceptionHandlers()
55 exceptionhandlers.put(ih, hs); in ExceptionHandlers()
57 hs.add(eh); in ExceptionHandlers()
/external/skqp/src/compute/hs/
DREADME.md77 32‑bit | ```hs/vk/<vendor>/<arch>/u32/hs_<vendor>_<arch>_u32.c``` | ```hs/vk/<vendor>/<arch>/u32/…
78 64‑bit | ```hs/vk/<vendor>/<arch>/u64/hs_<vendor>_<arch>_u64.c``` | ```hs/vk/<vendor>/<arch>/u64/…
83 #include "hs/vk/intel/gen8/u32/hs_target.h"
88 struct hs_vk * hs = hs_vk_create(<address of target>,...);
91 VkDescriptorSet hs_ds = hs_vk_ds_alloc(hs,descriptor_pool);
100 hs_vk_ds_bind(hs,hs_ds,cb,vin,vout); // or (...,vin,VK_NULL_HANDLE) for in-place sorting
103 hs_vk_pad(hs,count,&count_padded_in,&count_padded_out);
106 hs_vk_sort(hs,cb,...,vin,...,vout,...); // hs_vk_sort() and hs_vk_ds_bind() must have matching vin/…
115 hs_vk_release(hs,...);
136 32‑bit | ```hs/cuda/sm_35/u32/hs_cuda_u32.cu``` | ```hs/cuda/sm_35/u32/hs_cuda.h```
[all …]
/external/apache-harmony/support/src/test/java/tests/support/
DSupport_UnmodifiableMapTest.java113 HashSet<String> hs = new HashSet<String>(); in t_KeySet() local
114 hs.add("0"); in t_KeySet()
115 hs.add("25"); in t_KeySet()
116 hs.add("99"); in t_KeySet()
119 keySet.containsAll(hs)); in t_KeySet()
120 hs.add("100"); in t_KeySet()
123 !keySet.containsAll(hs)); in t_KeySet()

12345678910>>...27