/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | handshake_client.cc | 204 static void ssl_get_client_disabled(SSL_HANDSHAKE *hs, uint32_t *out_mask_a, in ssl_get_client_disabled() argument 210 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 216 static bool ssl_write_client_cipher_list(SSL_HANDSHAKE *hs, CBB *out) { in ssl_write_client_cipher_list() argument 217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 219 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 228 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 234 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 249 if (hs->min_version < TLS1_3_VERSION) { in ssl_write_client_cipher_list() 257 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 258 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | tls13_server.cc | 44 static int resolve_ecdhe_secret(SSL_HANDSHAKE *hs, bool *out_need_retry, in resolve_ecdhe_secret() argument 46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 61 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &dhe_secret, in resolve_ecdhe_secret() 72 return tls13_advance_key_schedule(hs, dhe_secret); in resolve_ecdhe_secret() 75 static int ssl_ext_supported_versions_add_serverhello(SSL_HANDSHAKE *hs, in ssl_ext_supported_versions_add_serverhello() argument 80 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello() 99 static bool add_new_session_tickets(SSL_HANDSHAKE *hs, bool *out_sent_tickets) { in add_new_session_tickets() argument 100 SSL *const ssl = hs->ssl; in add_new_session_tickets() 103 !hs->accept_psk_mode || in add_new_session_tickets() 117 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() [all …]
|
D | handshake_server.cc | 194 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 196 SSL *const ssl = hs->ssl; in negotiate_version() 244 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 256 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument 305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers() 306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers() 307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers() 314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers() 319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers() [all …]
|
D | tls13_client.cc | 57 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 58 SSL *const ssl = hs->ssl; in close_early_data() 59 assert(hs->in_early_data); in close_early_data() 63 hs->can_early_write = false; in close_early_data() 92 hs->new_session.get(), in close_early_data() 93 hs->client_handshake_secret())) { in close_early_data() 103 static enum ssl_hs_wait_t do_read_hello_retry_request(SSL_HANDSHAKE *hs) { in do_read_hello_retry_request() argument 104 SSL *const ssl = hs->ssl; in do_read_hello_retry_request() 114 if (!hs->early_data_offered && in do_read_hello_retry_request() 129 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || in do_read_hello_retry_request() [all …]
|
D | t1_lib.cc | 134 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 299 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 300 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 301 return hs->config->supported_group_list; in tls1_get_grouplist() 306 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 307 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 319 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 323 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 325 pref = hs->peer_supported_group_list; in tls1_get_shared_group() 396 bool tls1_check_group_id(const SSL_HANDSHAKE *hs, uint16_t group_id) { in tls1_check_group_id() argument [all …]
|
D | tls13_enc.cc | 36 static bool init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, in init_key_schedule() argument 38 if (!hs->transcript.InitHash(version, cipher)) { in init_key_schedule() 43 hs->ResizeSecrets(hs->transcript.DigestLen()); in init_key_schedule() 44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule() 49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { in hkdf_extract_to_secret() argument 51 if (!HKDF_extract(hs->secret().data(), &len, hs->transcript.Digest(), in hkdf_extract_to_secret() 52 in.data(), in.size(), hs->secret().data(), in hkdf_extract_to_secret() 53 hs->secret().size())) { in hkdf_extract_to_secret() 56 assert(len == hs->secret().size()); in hkdf_extract_to_secret() 60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument [all …]
|
D | handshake.cc | 166 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local 167 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new() 170 hs->config = ssl->config.get(); in ssl_handshake_new() 171 if (!hs->config) { in ssl_handshake_new() 172 assert(hs->config); in ssl_handshake_new() 175 return hs; in ssl_handshake_new() 229 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument 235 return hs->transcript.Update(msg.raw); in ssl_hash_message() 289 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument 290 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert() [all …]
|
D | handoff.cc | 67 s3->hs == nullptr || in SSL_serialize_handoff() 74 Span<const uint8_t> transcript = s3->hs->transcript.buffer(); in SSL_serialize_handoff() 94 s3->hs == nullptr || in SSL_decline_handoff() 99 s3->hs->config->handoff = false; in SSL_decline_handoff() 168 tls1_get_grouplist(ssl->s3->hs.get()); in apply_remote_features() 235 s3->hs->transcript.Update(transcript); in SSL_apply_handoff() 238 s3->hs->handback = true; in SSL_apply_handoff() 248 SSL_HANDSHAKE *const hs = s3->hs.get(); in SSL_serialize_handback() local 250 switch (hs->state) { in SSL_serialize_handback() 261 if (hs->tls13_state != state13_send_half_rtt_ticket) { in SSL_serialize_handback() [all …]
|
D | tls13_both.cc | 57 SSL_HANDSHAKE *hs, Array<uint8_t> *out, in tls13_get_cert_verify_signature_input() argument 97 if (!hs->transcript.GetHash(context_hash, &context_hash_len) || in tls13_get_cert_verify_signature_input() 107 bool tls13_process_certificate(SSL_HANDSHAKE *hs, const SSLMessage &msg, in tls13_process_certificate() argument 109 SSL *const ssl = hs->ssl; in tls13_process_certificate() 194 ssl->server && hs->config->retain_only_sha256_of_client_certs; in tls13_process_certificate() 224 hs->new_session->peer_sha256); in tls13_process_certificate() 256 if (ssl->server || !hs->config->ocsp_stapling_enabled) { in tls13_process_certificate() 274 hs->new_session->ocsp_response.reset( in tls13_process_certificate() 276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate() 284 if (ssl->server || !hs->config->signed_cert_timestamps_enabled) { in tls13_process_certificate() [all …]
|
D | ssl_versions.cc | 170 bool ssl_get_version_range(const SSL_HANDSHAKE *hs, uint16_t *out_min_version, in ssl_get_version_range() argument 174 uint32_t options = hs->ssl->options; in ssl_get_version_range() 175 if (SSL_is_dtls(hs->ssl)) { in ssl_get_version_range() 184 hs->config->conf_min_version) || in ssl_get_version_range() 186 hs->config->conf_max_version)) { in ssl_get_version_range() 192 if (hs->ssl->quic_method && min_version < TLS1_3_VERSION) { in ssl_get_version_range() 246 return ssl->s3->hs->early_session->ssl_version; in ssl_version() 263 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) { in ssl_supports_version() argument 264 SSL *const ssl = hs->ssl; in ssl_supports_version() 268 hs->min_version > protocol_version || in ssl_supports_version() [all …]
|
/external/boringssl/src/ssl/ |
D | handshake_client.cc | 204 static void ssl_get_client_disabled(SSL_HANDSHAKE *hs, uint32_t *out_mask_a, in ssl_get_client_disabled() argument 210 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 216 static bool ssl_write_client_cipher_list(SSL_HANDSHAKE *hs, CBB *out) { in ssl_write_client_cipher_list() argument 217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 219 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 228 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 234 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 249 if (hs->min_version < TLS1_3_VERSION) { in ssl_write_client_cipher_list() 257 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 258 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | tls13_server.cc | 44 static int resolve_ecdhe_secret(SSL_HANDSHAKE *hs, bool *out_need_retry, in resolve_ecdhe_secret() argument 46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 61 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &dhe_secret, in resolve_ecdhe_secret() 72 return tls13_advance_key_schedule(hs, dhe_secret); in resolve_ecdhe_secret() 75 static int ssl_ext_supported_versions_add_serverhello(SSL_HANDSHAKE *hs, in ssl_ext_supported_versions_add_serverhello() argument 80 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello() 99 static bool add_new_session_tickets(SSL_HANDSHAKE *hs, bool *out_sent_tickets) { in add_new_session_tickets() argument 100 SSL *const ssl = hs->ssl; in add_new_session_tickets() 103 !hs->accept_psk_mode || in add_new_session_tickets() 117 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() [all …]
|
D | handshake_server.cc | 194 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 196 SSL *const ssl = hs->ssl; in negotiate_version() 244 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 256 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument 305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers() 306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers() 307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers() 314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers() 319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 93 hs->new_session.get(), in close_early_data() 94 hs->client_handshake_secret())) { in close_early_data() 104 static enum ssl_hs_wait_t do_read_hello_retry_request(SSL_HANDSHAKE *hs) { in do_read_hello_retry_request() argument 105 SSL *const ssl = hs->ssl; in do_read_hello_retry_request() 115 if (!hs->early_data_offered && in do_read_hello_retry_request() 130 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || in do_read_hello_retry_request() [all …]
|
D | t1_lib.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 304 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 305 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 306 return hs->config->supported_group_list; in tls1_get_grouplist() 311 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 312 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 324 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 328 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 330 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
D | handshake.cc | 168 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local 169 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new() 172 hs->config = ssl->config.get(); in ssl_handshake_new() 173 if (!hs->config) { in ssl_handshake_new() 174 assert(hs->config); in ssl_handshake_new() 177 return hs; in ssl_handshake_new() 231 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument 237 return hs->transcript.Update(msg.raw); in ssl_hash_message() 291 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument 292 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert() [all …]
|
D | tls13_enc.cc | 36 static bool init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, in init_key_schedule() argument 38 if (!hs->transcript.InitHash(version, cipher)) { in init_key_schedule() 43 hs->ResizeSecrets(hs->transcript.DigestLen()); in init_key_schedule() 44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule() 49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { in hkdf_extract_to_secret() argument 51 if (!HKDF_extract(hs->secret().data(), &len, hs->transcript.Digest(), in hkdf_extract_to_secret() 52 in.data(), in.size(), hs->secret().data(), in hkdf_extract_to_secret() 53 hs->secret().size())) { in hkdf_extract_to_secret() 56 assert(len == hs->secret().size()); in hkdf_extract_to_secret() 60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument [all …]
|
D | handoff.cc | 79 s3->hs == nullptr || in SSL_serialize_handoff() 86 Span<const uint8_t> transcript = s3->hs->transcript.buffer(); in SSL_serialize_handoff() 106 s3->hs == nullptr || in SSL_decline_handoff() 111 s3->hs->config->handoff = false; in SSL_decline_handoff() 180 tls1_get_grouplist(ssl->s3->hs.get()); in apply_remote_features() 270 s3->hs->transcript.Update(transcript); in SSL_apply_handoff() 273 s3->hs->handback = true; in SSL_apply_handoff() 283 SSL_HANDSHAKE *const hs = s3->hs.get(); in SSL_serialize_handback() local 285 switch (hs->state) { in SSL_serialize_handback() 296 if (hs->tls13_state != state13_send_half_rtt_ticket) { in SSL_serialize_handback() [all …]
|
D | tls13_both.cc | 57 SSL_HANDSHAKE *hs, Array<uint8_t> *out, in tls13_get_cert_verify_signature_input() argument 97 if (!hs->transcript.GetHash(context_hash, &context_hash_len) || in tls13_get_cert_verify_signature_input() 107 bool tls13_process_certificate(SSL_HANDSHAKE *hs, const SSLMessage &msg, in tls13_process_certificate() argument 109 SSL *const ssl = hs->ssl; in tls13_process_certificate() 194 ssl->server && hs->config->retain_only_sha256_of_client_certs; in tls13_process_certificate() 224 hs->new_session->peer_sha256); in tls13_process_certificate() 255 if (ssl->server || !hs->config->ocsp_stapling_enabled) { in tls13_process_certificate() 273 hs->new_session->ocsp_response.reset( in tls13_process_certificate() 275 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate() 283 if (ssl->server || !hs->config->signed_cert_timestamps_enabled) { in tls13_process_certificate() [all …]
|
D | ssl_versions.cc | 170 bool ssl_get_version_range(const SSL_HANDSHAKE *hs, uint16_t *out_min_version, in ssl_get_version_range() argument 174 uint32_t options = hs->ssl->options; in ssl_get_version_range() 175 if (SSL_is_dtls(hs->ssl)) { in ssl_get_version_range() 184 hs->config->conf_min_version) || in ssl_get_version_range() 186 hs->config->conf_max_version)) { in ssl_get_version_range() 192 if (hs->ssl->quic_method && min_version < TLS1_3_VERSION) { in ssl_get_version_range() 246 return ssl->s3->hs->early_session->ssl_version; in ssl_version() 263 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) { in ssl_supports_version() argument 264 SSL *const ssl = hs->ssl; in ssl_supports_version() 268 hs->min_version > protocol_version || in ssl_supports_version() [all …]
|
/external/boringssl/src/ssl/test/runner/ |
D | handshake_server.go | 51 hs := serverHandshakeState{ 54 if err := hs.readClientHello(); err != nil { 59 if err := hs.doTLS13Handshake(); err != nil { 63 isResume, err := hs.processClientHello() 71 if err := hs.doResumeHandshake(); err != nil { 74 if err := hs.establishKeys(); err != nil { 78 if err := hs.sendSessionTicket(); err != nil { 82 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil { 90 c.writeRecord(recordTypeHandshake, hs.finishedBytes) 95 if err := hs.readFinished(nil, isResume); err != nil { [all …]
|
D | handshake_client.go | 747 hs := &clientHandshakeState{ 757 hs.writeHash(helloBytes, hs.c.sendHandshakeSeq-1) 759 err = hs.finishedHash.UpdateForHelloRetryRequest() 763 hs.writeServerHash(helloRetryRequest.marshal()) 764 hs.writeClientHash(secondHelloBytes) 768 if err := hs.doTLS13Handshake(); err != nil { 772 hs.writeServerHash(hs.serverHello.marshal()) 774 hs.establishKeys() 778 if hs.serverHello.compressionMethod != compressionNone { 783 err = hs.processServerExtensions(&serverHello.extensions) [all …]
|
/external/skqp/src/compute/hs/vk/ |
D | hs_vk.c | 247 hs_transpose(struct hs_vk const * const hs, in hs_transpose() argument 254 hs->pipelines.transpose[0]); in hs_transpose() 265 hs_bc(struct hs_vk const * const hs, in hs_bc() argument 278 hs->pipelines.bc[clean_slabs_log2]); in hs_bc() 289 hs_hm(struct hs_vk const * const hs, in hs_hm() argument 301 uint32_t const log2_rem = clean_slabs_log2 - hs->bc_slabs_log2_max; in hs_hm() 302 uint32_t const scale_log2 = MIN_MACRO(hs->config.merge.hm.scale_max,log2_rem); in hs_hm() 306 uint32_t const slab_span = hs->config.slab.height << log2_out; in hs_hm() 310 hs->pipelines.hm[scale_log2][0]); in hs_hm() 323 hs_fm(struct hs_vk const * const hs, in hs_fm() argument [all …]
|
/external/skqp/src/compute/hs/cl/ |
D | hs_cl.c | 233 hs_transpose(struct hs_cl const * const hs, in hs_transpose() argument 236 size_t const size[1] = { state->bx_ru << hs->config.slab.threads_log2 }; in hs_transpose() 237 cl_kernel kernel = hs->kernels.transpose[0]; in hs_transpose() 273 hs_hm_enqueue(struct hs_cl const * const hs, in hs_hm_enqueue() argument 283 cl_kernel kernel = hs->kernels.hm[scale_log2][0]; in hs_hm_enqueue() 313 hs_hm(struct hs_cl const * const hs, in hs_hm() argument 323 uint32_t const log2_rem = clean_slabs_log2 - hs->bc_slabs_log2_max; in hs_hm() 324 uint32_t const scale_log2 = MIN_MACRO(hs->config.merge.hm.scale_max,log2_rem); in hs_hm() 328 uint32_t const span_threads = hs->slab_keys << log2_out; in hs_hm() 331 hs_hm_enqueue(hs, in hs_hm() [all …]
|
/external/llvm-project/clang/test/Analysis/ |
D | fuchsia_handle.cpp | 236 void close_handle_struct(HandleStruct hs ZX_HANDLE_RELEASE); 238 void use_handle_struct(HandleStruct hs ZX_HANDLE_USE); 243 HandleStruct hs; in checkHandleInStructureUseAfterFree() local 244 hs.h = sb; in checkHandleInStructureUseAfterFree() 245 use_handle_struct(hs); in checkHandleInStructureUseAfterFree() 246 close_handle_struct(hs); // expected-note {{Handle released through 1st parameter}} in checkHandleInStructureUseAfterFree() 256 HandleStruct hs; in checkHandleInStructureUseAfterFree2() local 257 hs.h = sb; in checkHandleInStructureUseAfterFree2() 258 use_handle_struct(hs); in checkHandleInStructureUseAfterFree2() 262 use_handle_struct(hs); // expected-warning {{Using a previously released handle}} in checkHandleInStructureUseAfterFree2() [all …]
|