Home
last modified time | relevance | path

Searched refs:hs (Results 1 – 25 of 488) sorted by relevance

12345678910>>...20

/external/rust/crates/quiche/deps/boringssl/src/ssl/
Dhandshake_client.cc204 static void ssl_get_client_disabled(SSL_HANDSHAKE *hs, uint32_t *out_mask_a, in ssl_get_client_disabled() argument
210 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
216 static bool ssl_write_client_cipher_list(SSL_HANDSHAKE *hs, CBB *out) { in ssl_write_client_cipher_list() argument
217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
219 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
228 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
234 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
249 if (hs->min_version < TLS1_3_VERSION) { in ssl_write_client_cipher_list()
257 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
258 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc44 static int resolve_ecdhe_secret(SSL_HANDSHAKE *hs, bool *out_need_retry, in resolve_ecdhe_secret() argument
46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
61 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &dhe_secret, in resolve_ecdhe_secret()
72 return tls13_advance_key_schedule(hs, dhe_secret); in resolve_ecdhe_secret()
75 static int ssl_ext_supported_versions_add_serverhello(SSL_HANDSHAKE *hs, in ssl_ext_supported_versions_add_serverhello() argument
80 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello()
99 static bool add_new_session_tickets(SSL_HANDSHAKE *hs, bool *out_sent_tickets) { in add_new_session_tickets() argument
100 SSL *const ssl = hs->ssl; in add_new_session_tickets()
103 !hs->accept_psk_mode || in add_new_session_tickets()
117 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets()
[all …]
Dhandshake_server.cc194 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
196 SSL *const ssl = hs->ssl; in negotiate_version()
244 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
256 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc57 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
58 SSL *const ssl = hs->ssl; in close_early_data()
59 assert(hs->in_early_data); in close_early_data()
63 hs->can_early_write = false; in close_early_data()
92 hs->new_session.get(), in close_early_data()
93 hs->client_handshake_secret())) { in close_early_data()
103 static enum ssl_hs_wait_t do_read_hello_retry_request(SSL_HANDSHAKE *hs) { in do_read_hello_retry_request() argument
104 SSL *const ssl = hs->ssl; in do_read_hello_retry_request()
114 if (!hs->early_data_offered && in do_read_hello_retry_request()
129 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || in do_read_hello_retry_request()
[all …]
Dt1_lib.cc134 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
299 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
300 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
301 return hs->config->supported_group_list; in tls1_get_grouplist()
306 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
307 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
319 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
323 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
325 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
396 bool tls1_check_group_id(const SSL_HANDSHAKE *hs, uint16_t group_id) { in tls1_check_group_id() argument
[all …]
Dtls13_enc.cc36 static bool init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, in init_key_schedule() argument
38 if (!hs->transcript.InitHash(version, cipher)) { in init_key_schedule()
43 hs->ResizeSecrets(hs->transcript.DigestLen()); in init_key_schedule()
44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule()
49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { in hkdf_extract_to_secret() argument
51 if (!HKDF_extract(hs->secret().data(), &len, hs->transcript.Digest(), in hkdf_extract_to_secret()
52 in.data(), in.size(), hs->secret().data(), in hkdf_extract_to_secret()
53 hs->secret().size())) { in hkdf_extract_to_secret()
56 assert(len == hs->secret().size()); in hkdf_extract_to_secret()
60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
[all …]
Dhandshake.cc166 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local
167 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new()
170 hs->config = ssl->config.get(); in ssl_handshake_new()
171 if (!hs->config) { in ssl_handshake_new()
172 assert(hs->config); in ssl_handshake_new()
175 return hs; in ssl_handshake_new()
229 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument
235 return hs->transcript.Update(msg.raw); in ssl_hash_message()
289 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument
290 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert()
[all …]
Dhandoff.cc67 s3->hs == nullptr || in SSL_serialize_handoff()
74 Span<const uint8_t> transcript = s3->hs->transcript.buffer(); in SSL_serialize_handoff()
94 s3->hs == nullptr || in SSL_decline_handoff()
99 s3->hs->config->handoff = false; in SSL_decline_handoff()
168 tls1_get_grouplist(ssl->s3->hs.get()); in apply_remote_features()
235 s3->hs->transcript.Update(transcript); in SSL_apply_handoff()
238 s3->hs->handback = true; in SSL_apply_handoff()
248 SSL_HANDSHAKE *const hs = s3->hs.get(); in SSL_serialize_handback() local
250 switch (hs->state) { in SSL_serialize_handback()
261 if (hs->tls13_state != state13_send_half_rtt_ticket) { in SSL_serialize_handback()
[all …]
Dtls13_both.cc57 SSL_HANDSHAKE *hs, Array<uint8_t> *out, in tls13_get_cert_verify_signature_input() argument
97 if (!hs->transcript.GetHash(context_hash, &context_hash_len) || in tls13_get_cert_verify_signature_input()
107 bool tls13_process_certificate(SSL_HANDSHAKE *hs, const SSLMessage &msg, in tls13_process_certificate() argument
109 SSL *const ssl = hs->ssl; in tls13_process_certificate()
194 ssl->server && hs->config->retain_only_sha256_of_client_certs; in tls13_process_certificate()
224 hs->new_session->peer_sha256); in tls13_process_certificate()
256 if (ssl->server || !hs->config->ocsp_stapling_enabled) { in tls13_process_certificate()
274 hs->new_session->ocsp_response.reset( in tls13_process_certificate()
276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate()
284 if (ssl->server || !hs->config->signed_cert_timestamps_enabled) { in tls13_process_certificate()
[all …]
Dssl_versions.cc170 bool ssl_get_version_range(const SSL_HANDSHAKE *hs, uint16_t *out_min_version, in ssl_get_version_range() argument
174 uint32_t options = hs->ssl->options; in ssl_get_version_range()
175 if (SSL_is_dtls(hs->ssl)) { in ssl_get_version_range()
184 hs->config->conf_min_version) || in ssl_get_version_range()
186 hs->config->conf_max_version)) { in ssl_get_version_range()
192 if (hs->ssl->quic_method && min_version < TLS1_3_VERSION) { in ssl_get_version_range()
246 return ssl->s3->hs->early_session->ssl_version; in ssl_version()
263 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) { in ssl_supports_version() argument
264 SSL *const ssl = hs->ssl; in ssl_supports_version()
268 hs->min_version > protocol_version || in ssl_supports_version()
[all …]
/external/boringssl/src/ssl/
Dhandshake_client.cc204 static void ssl_get_client_disabled(SSL_HANDSHAKE *hs, uint32_t *out_mask_a, in ssl_get_client_disabled() argument
210 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
216 static bool ssl_write_client_cipher_list(SSL_HANDSHAKE *hs, CBB *out) { in ssl_write_client_cipher_list() argument
217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
219 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
228 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
234 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
249 if (hs->min_version < TLS1_3_VERSION) { in ssl_write_client_cipher_list()
257 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
258 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc44 static int resolve_ecdhe_secret(SSL_HANDSHAKE *hs, bool *out_need_retry, in resolve_ecdhe_secret() argument
46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
61 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &dhe_secret, in resolve_ecdhe_secret()
72 return tls13_advance_key_schedule(hs, dhe_secret); in resolve_ecdhe_secret()
75 static int ssl_ext_supported_versions_add_serverhello(SSL_HANDSHAKE *hs, in ssl_ext_supported_versions_add_serverhello() argument
80 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello()
99 static bool add_new_session_tickets(SSL_HANDSHAKE *hs, bool *out_sent_tickets) { in add_new_session_tickets() argument
100 SSL *const ssl = hs->ssl; in add_new_session_tickets()
103 !hs->accept_psk_mode || in add_new_session_tickets()
117 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets()
[all …]
Dhandshake_server.cc194 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
196 SSL *const ssl = hs->ssl; in negotiate_version()
244 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
256 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
93 hs->new_session.get(), in close_early_data()
94 hs->client_handshake_secret())) { in close_early_data()
104 static enum ssl_hs_wait_t do_read_hello_retry_request(SSL_HANDSHAKE *hs) { in do_read_hello_retry_request() argument
105 SSL *const ssl = hs->ssl; in do_read_hello_retry_request()
115 if (!hs->early_data_offered && in do_read_hello_retry_request()
130 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || in do_read_hello_retry_request()
[all …]
Dt1_lib.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
304 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
305 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
306 return hs->config->supported_group_list; in tls1_get_grouplist()
311 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
312 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
324 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
328 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
330 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
Dhandshake.cc168 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local
169 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new()
172 hs->config = ssl->config.get(); in ssl_handshake_new()
173 if (!hs->config) { in ssl_handshake_new()
174 assert(hs->config); in ssl_handshake_new()
177 return hs; in ssl_handshake_new()
231 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument
237 return hs->transcript.Update(msg.raw); in ssl_hash_message()
291 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument
292 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert()
[all …]
Dtls13_enc.cc36 static bool init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, in init_key_schedule() argument
38 if (!hs->transcript.InitHash(version, cipher)) { in init_key_schedule()
43 hs->ResizeSecrets(hs->transcript.DigestLen()); in init_key_schedule()
44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule()
49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { in hkdf_extract_to_secret() argument
51 if (!HKDF_extract(hs->secret().data(), &len, hs->transcript.Digest(), in hkdf_extract_to_secret()
52 in.data(), in.size(), hs->secret().data(), in hkdf_extract_to_secret()
53 hs->secret().size())) { in hkdf_extract_to_secret()
56 assert(len == hs->secret().size()); in hkdf_extract_to_secret()
60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
[all …]
Dhandoff.cc79 s3->hs == nullptr || in SSL_serialize_handoff()
86 Span<const uint8_t> transcript = s3->hs->transcript.buffer(); in SSL_serialize_handoff()
106 s3->hs == nullptr || in SSL_decline_handoff()
111 s3->hs->config->handoff = false; in SSL_decline_handoff()
180 tls1_get_grouplist(ssl->s3->hs.get()); in apply_remote_features()
270 s3->hs->transcript.Update(transcript); in SSL_apply_handoff()
273 s3->hs->handback = true; in SSL_apply_handoff()
283 SSL_HANDSHAKE *const hs = s3->hs.get(); in SSL_serialize_handback() local
285 switch (hs->state) { in SSL_serialize_handback()
296 if (hs->tls13_state != state13_send_half_rtt_ticket) { in SSL_serialize_handback()
[all …]
Dtls13_both.cc57 SSL_HANDSHAKE *hs, Array<uint8_t> *out, in tls13_get_cert_verify_signature_input() argument
97 if (!hs->transcript.GetHash(context_hash, &context_hash_len) || in tls13_get_cert_verify_signature_input()
107 bool tls13_process_certificate(SSL_HANDSHAKE *hs, const SSLMessage &msg, in tls13_process_certificate() argument
109 SSL *const ssl = hs->ssl; in tls13_process_certificate()
194 ssl->server && hs->config->retain_only_sha256_of_client_certs; in tls13_process_certificate()
224 hs->new_session->peer_sha256); in tls13_process_certificate()
255 if (ssl->server || !hs->config->ocsp_stapling_enabled) { in tls13_process_certificate()
273 hs->new_session->ocsp_response.reset( in tls13_process_certificate()
275 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate()
283 if (ssl->server || !hs->config->signed_cert_timestamps_enabled) { in tls13_process_certificate()
[all …]
Dssl_versions.cc170 bool ssl_get_version_range(const SSL_HANDSHAKE *hs, uint16_t *out_min_version, in ssl_get_version_range() argument
174 uint32_t options = hs->ssl->options; in ssl_get_version_range()
175 if (SSL_is_dtls(hs->ssl)) { in ssl_get_version_range()
184 hs->config->conf_min_version) || in ssl_get_version_range()
186 hs->config->conf_max_version)) { in ssl_get_version_range()
192 if (hs->ssl->quic_method && min_version < TLS1_3_VERSION) { in ssl_get_version_range()
246 return ssl->s3->hs->early_session->ssl_version; in ssl_version()
263 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) { in ssl_supports_version() argument
264 SSL *const ssl = hs->ssl; in ssl_supports_version()
268 hs->min_version > protocol_version || in ssl_supports_version()
[all …]
/external/boringssl/src/ssl/test/runner/
Dhandshake_server.go51 hs := serverHandshakeState{
54 if err := hs.readClientHello(); err != nil {
59 if err := hs.doTLS13Handshake(); err != nil {
63 isResume, err := hs.processClientHello()
71 if err := hs.doResumeHandshake(); err != nil {
74 if err := hs.establishKeys(); err != nil {
78 if err := hs.sendSessionTicket(); err != nil {
82 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
90 c.writeRecord(recordTypeHandshake, hs.finishedBytes)
95 if err := hs.readFinished(nil, isResume); err != nil {
[all …]
Dhandshake_client.go747 hs := &clientHandshakeState{
757 hs.writeHash(helloBytes, hs.c.sendHandshakeSeq-1)
759 err = hs.finishedHash.UpdateForHelloRetryRequest()
763 hs.writeServerHash(helloRetryRequest.marshal())
764 hs.writeClientHash(secondHelloBytes)
768 if err := hs.doTLS13Handshake(); err != nil {
772 hs.writeServerHash(hs.serverHello.marshal())
774 hs.establishKeys()
778 if hs.serverHello.compressionMethod != compressionNone {
783 err = hs.processServerExtensions(&serverHello.extensions)
[all …]
/external/skqp/src/compute/hs/vk/
Dhs_vk.c247 hs_transpose(struct hs_vk const * const hs, in hs_transpose() argument
254 hs->pipelines.transpose[0]); in hs_transpose()
265 hs_bc(struct hs_vk const * const hs, in hs_bc() argument
278 hs->pipelines.bc[clean_slabs_log2]); in hs_bc()
289 hs_hm(struct hs_vk const * const hs, in hs_hm() argument
301 uint32_t const log2_rem = clean_slabs_log2 - hs->bc_slabs_log2_max; in hs_hm()
302 uint32_t const scale_log2 = MIN_MACRO(hs->config.merge.hm.scale_max,log2_rem); in hs_hm()
306 uint32_t const slab_span = hs->config.slab.height << log2_out; in hs_hm()
310 hs->pipelines.hm[scale_log2][0]); in hs_hm()
323 hs_fm(struct hs_vk const * const hs, in hs_fm() argument
[all …]
/external/skqp/src/compute/hs/cl/
Dhs_cl.c233 hs_transpose(struct hs_cl const * const hs, in hs_transpose() argument
236 size_t const size[1] = { state->bx_ru << hs->config.slab.threads_log2 }; in hs_transpose()
237 cl_kernel kernel = hs->kernels.transpose[0]; in hs_transpose()
273 hs_hm_enqueue(struct hs_cl const * const hs, in hs_hm_enqueue() argument
283 cl_kernel kernel = hs->kernels.hm[scale_log2][0]; in hs_hm_enqueue()
313 hs_hm(struct hs_cl const * const hs, in hs_hm() argument
323 uint32_t const log2_rem = clean_slabs_log2 - hs->bc_slabs_log2_max; in hs_hm()
324 uint32_t const scale_log2 = MIN_MACRO(hs->config.merge.hm.scale_max,log2_rem); in hs_hm()
328 uint32_t const span_threads = hs->slab_keys << log2_out; in hs_hm()
331 hs_hm_enqueue(hs, in hs_hm()
[all …]
/external/llvm-project/clang/test/Analysis/
Dfuchsia_handle.cpp236 void close_handle_struct(HandleStruct hs ZX_HANDLE_RELEASE);
238 void use_handle_struct(HandleStruct hs ZX_HANDLE_USE);
243 HandleStruct hs; in checkHandleInStructureUseAfterFree() local
244 hs.h = sb; in checkHandleInStructureUseAfterFree()
245 use_handle_struct(hs); in checkHandleInStructureUseAfterFree()
246 close_handle_struct(hs); // expected-note {{Handle released through 1st parameter}} in checkHandleInStructureUseAfterFree()
256 HandleStruct hs; in checkHandleInStructureUseAfterFree2() local
257 hs.h = sb; in checkHandleInStructureUseAfterFree2()
258 use_handle_struct(hs); in checkHandleInStructureUseAfterFree2()
262 use_handle_struct(hs); // expected-warning {{Using a previously released handle}} in checkHandleInStructureUseAfterFree2()
[all …]

12345678910>>...20