/external/boringssl/src/ssl/ |
D | t1_lib.cc | 478 bool tls12_check_peer_sigalg(const SSL_HANDSHAKE *hs, uint8_t *out_alert, in tls12_check_peer_sigalg() 519 static bool forbid_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in forbid_parse_serverhello() 531 static bool ignore_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ignore_parse_clienthello() 566 static bool ext_sni_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_sni_parse_serverhello() 573 static bool ext_sni_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_sni_parse_clienthello() 715 static bool ext_ech_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ech_parse_serverhello() 742 static bool ext_ech_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ech_parse_clienthello() 756 uint8_t *out_alert, in ext_ech_is_inner_parse_clienthello() 797 static bool ext_ri_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ri_parse_serverhello() 880 static bool ext_ri_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ri_parse_clienthello() [all …]
|
D | ssl_key_share.cc | 76 bool Finish(Array<uint8_t> *out_secret, uint8_t *out_alert, in Finish() 171 bool Finish(Array<uint8_t> *out_secret, uint8_t *out_alert, in Finish() 239 uint8_t *out_alert, Span<const uint8_t> peer_key) override { in Accept() 273 bool Finish(Array<uint8_t> *out_secret, uint8_t *out_alert, in Finish() 354 uint8_t *out_alert, Span<const uint8_t> peer_key) { in Accept()
|
D | tls_record.cc | 190 static ssl_open_record_t skip_early_data(SSL *ssl, uint8_t *out_alert, in skip_early_data() 208 uint8_t *out_alert, Span<uint8_t> in) { in tls_open_record() 548 enum ssl_open_record_t ssl_process_alert(SSL *ssl, uint8_t *out_alert, in ssl_process_alert() 606 size_t *out_record_len, uint8_t *out_alert, in OpenRecord()
|
D | s3_pkt.cc | 303 size_t *out_consumed, uint8_t *out_alert, in tls_open_app_data() 359 uint8_t *out_alert, in tls_open_change_cipher_spec()
|
D | d1_both.cc | 265 SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) { in dtls1_get_incoming_message() 297 uint8_t *out_alert, Span<uint8_t> in) { in dtls1_open_handshake() 471 uint8_t *out_alert, in dtls1_open_change_cipher_spec()
|
D | d1_pkt.cc | 131 size_t *out_consumed, uint8_t *out_alert, in dtls1_open_app_data()
|
D | s3_both.cc | 513 bool tls_can_accept_handshake_data(const SSL *ssl, uint8_t *out_alert) { in tls_can_accept_handshake_data() 556 uint8_t *out_alert, Span<uint8_t> in) { in tls_open_handshake()
|
D | ssl_cert.cc | 346 bool ssl_parse_cert_chain(uint8_t *out_alert, in ssl_parse_cert_chain() 621 uint8_t *out_alert, in ssl_parse_client_CA_list() 770 UniquePtr<DC> DC::Parse(CRYPTO_BUFFER *in, uint8_t *out_alert) { in Parse()
|
D | dtls_record.cc | 180 uint8_t *out_alert, Span<uint8_t> in) { in dtls_open_record()
|
D | ssl_test.cc | 2244 static int SwitchSessionIDContextSNI(SSL *ssl, int *out_alert, void *arg) { in SwitchSessionIDContextSNI() 2588 static int SwitchContext(SSL *ssl, int *out_alert, void *arg) { in SwitchContext() 3092 server_ctx_.get(), [](SSL *ssl, int *out_alert, void *arg) -> int { in TEST_P() 3307 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3339 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3362 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3374 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3385 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3425 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3430 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() [all …]
|
D | handshake.cc | 240 bool ssl_parse_extensions(const CBS *cbs, uint8_t *out_alert, in ssl_parse_extensions()
|
D | tls_method.cc | 186 uint8_t *out_alert) { in ssl_noop_x509_session_verify_cert_chain()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | t1_lib.cc | 473 bool tls12_check_peer_sigalg(const SSL_HANDSHAKE *hs, uint8_t *out_alert, in tls12_check_peer_sigalg() 514 static bool forbid_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in forbid_parse_serverhello() 526 static bool ignore_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ignore_parse_clienthello() 561 static bool ext_sni_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_sni_parse_serverhello() 568 static bool ext_sni_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_sni_parse_clienthello() 616 static bool ext_ri_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ri_parse_serverhello() 699 static bool ext_ri_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ri_parse_clienthello() 772 static bool ext_ems_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ems_parse_serverhello() 797 static bool ext_ems_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ems_parse_clienthello() 866 static bool ext_ticket_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, in ext_ticket_parse_serverhello() [all …]
|
D | ssl_key_share.cc | 76 bool Finish(Array<uint8_t> *out_secret, uint8_t *out_alert, in Finish() 171 bool Finish(Array<uint8_t> *out_secret, uint8_t *out_alert, in Finish() 239 uint8_t *out_alert, Span<const uint8_t> peer_key) override { in Accept() 273 bool Finish(Array<uint8_t> *out_secret, uint8_t *out_alert, in Finish() 354 uint8_t *out_alert, Span<const uint8_t> peer_key) { in Accept()
|
D | tls_record.cc | 190 static ssl_open_record_t skip_early_data(SSL *ssl, uint8_t *out_alert, in skip_early_data() 208 uint8_t *out_alert, Span<uint8_t> in) { in tls_open_record() 546 enum ssl_open_record_t ssl_process_alert(SSL *ssl, uint8_t *out_alert, in ssl_process_alert() 604 size_t *out_record_len, uint8_t *out_alert, in OpenRecord()
|
D | s3_pkt.cc | 303 size_t *out_consumed, uint8_t *out_alert, in tls_open_app_data() 359 uint8_t *out_alert, in tls_open_change_cipher_spec()
|
D | d1_both.cc | 265 SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) { in dtls1_get_incoming_message() 297 uint8_t *out_alert, Span<uint8_t> in) { in dtls1_open_handshake() 471 uint8_t *out_alert, in dtls1_open_change_cipher_spec()
|
D | d1_pkt.cc | 131 size_t *out_consumed, uint8_t *out_alert, in dtls1_open_app_data()
|
D | s3_both.cc | 513 bool tls_can_accept_handshake_data(const SSL *ssl, uint8_t *out_alert) { in tls_can_accept_handshake_data() 556 uint8_t *out_alert, Span<uint8_t> in) { in tls_open_handshake()
|
D | ssl_cert.cc | 346 bool ssl_parse_cert_chain(uint8_t *out_alert, in ssl_parse_cert_chain() 621 uint8_t *out_alert, in ssl_parse_client_CA_list() 770 UniquePtr<DC> DC::Parse(CRYPTO_BUFFER *in, uint8_t *out_alert) { in Parse()
|
D | dtls_record.cc | 180 uint8_t *out_alert, Span<uint8_t> in) { in dtls_open_record()
|
D | ssl_test.cc | 2244 static int SwitchSessionIDContextSNI(SSL *ssl, int *out_alert, void *arg) { in SwitchSessionIDContextSNI() 2588 static int SwitchContext(SSL *ssl, int *out_alert, void *arg) { in SwitchContext() 3092 server_ctx_.get(), [](SSL *ssl, int *out_alert, void *arg) -> int { in TEST_P() 3307 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3339 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3362 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3374 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3385 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3425 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() 3430 [](SSL *ssl, uint8_t *out_alert) -> ssl_verify_result_t { in TEST() [all …]
|
D | handshake.cc | 238 int ssl_parse_extensions(const CBS *cbs, uint8_t *out_alert, in ssl_parse_extensions()
|
D | tls_method.cc | 186 uint8_t *out_alert) { in ssl_noop_x509_session_verify_cert_chain()
|
D | handshake_server.cc | 194 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() 505 static bool extract_sni(SSL_HANDSHAKE *hs, uint8_t *out_alert, in extract_sni()
|