/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | handshake_server.cc | 175 const SSL_CLIENT_HELLO *client_hello, uint16_t id) { in ssl_client_cipher_list_contains_cipher() argument 177 CBS_init(&cipher_suites, client_hello->cipher_suites, in ssl_client_cipher_list_contains_cipher() 178 client_hello->cipher_suites_len); in ssl_client_cipher_list_contains_cipher() 195 const SSL_CLIENT_HELLO *client_hello) { in negotiate_version() argument 199 if (ssl_client_hello_get_extension(client_hello, &supported_versions, in negotiate_version() 224 if (client_hello->version <= DTLS1_2_VERSION) { in negotiate_version() 226 } else if (client_hello->version <= DTLS1_VERSION) { in negotiate_version() 232 if (client_hello->version >= TLS1_2_VERSION) { in negotiate_version() 234 } else if (client_hello->version >= TLS1_1_VERSION) { in negotiate_version() 236 } else if (client_hello->version >= TLS1_VERSION) { in negotiate_version() [all …]
|
D | tls13_server.cc | 45 SSL_CLIENT_HELLO *client_hello) { in resolve_ecdhe_secret() argument 51 if (!ssl_client_hello_get_extension(client_hello, &key_share, in resolve_ecdhe_secret() 89 const SSL *ssl, const SSL_CLIENT_HELLO *client_hello, uint16_t group_id) { in choose_tls13_cipher() argument 91 CBS_init(&cipher_suites, client_hello->cipher_suites, in choose_tls13_cipher() 92 client_hello->cipher_suites_len); in choose_tls13_cipher() 192 SSL_CLIENT_HELLO client_hello; in do_select_parameters() local 193 if (!ssl_client_hello_init(ssl, &client_hello, msg)) { in do_select_parameters() 199 OPENSSL_memcpy(hs->session_id, client_hello.session_id, in do_select_parameters() 200 client_hello.session_id_len); in do_select_parameters() 201 hs->session_id_len = client_hello.session_id_len; in do_select_parameters() [all …]
|
D | tls13_enc.cc | 431 Span<const uint8_t> client_hello, size_t binders_len) { in hash_transcript_and_truncated_client_hello() argument 433 if (binders_len + 2 < binders_len || client_hello.size() < binders_len + 2) { in hash_transcript_and_truncated_client_hello() 436 client_hello = client_hello.subspan(0, client_hello.size() - binders_len - 2); in hash_transcript_and_truncated_client_hello() 441 !EVP_DigestUpdate(ctx.get(), client_hello.data(), client_hello.size()) || in hash_transcript_and_truncated_client_hello()
|
D | t1_lib.cc | 210 out->client_hello = CBS_data(&msg.body); in ssl_client_hello_init() 213 CBS client_hello, random, session_id; in ssl_client_hello_init() local 214 CBS_init(&client_hello, out->client_hello, out->client_hello_len); in ssl_client_hello_init() 215 if (!CBS_get_u16(&client_hello, &out->version) || in ssl_client_hello_init() 216 !CBS_get_bytes(&client_hello, &random, SSL3_RANDOM_SIZE) || in ssl_client_hello_init() 217 !CBS_get_u8_length_prefixed(&client_hello, &session_id) || in ssl_client_hello_init() 230 if (!CBS_get_u8_length_prefixed(&client_hello, &cookie) || in ssl_client_hello_init() 237 if (!CBS_get_u16_length_prefixed(&client_hello, &cipher_suites) || in ssl_client_hello_init() 239 !CBS_get_u8_length_prefixed(&client_hello, &compression_methods) || in ssl_client_hello_init() 251 if (CBS_len(&client_hello) == 0) { in ssl_client_hello_init() [all …]
|
D | s3_both.cc | 420 ScopedCBB client_hello; in read_v2_client_hello() local 427 !CBB_init_fixed(client_hello.get(), (uint8_t *)ssl->s3->hs_buf->data, in read_v2_client_hello() 429 !CBB_add_u8(client_hello.get(), SSL3_MT_CLIENT_HELLO) || in read_v2_client_hello() 430 !CBB_add_u24_length_prefixed(client_hello.get(), &hello_body) || in read_v2_client_hello() 461 !CBB_finish(client_hello.get(), NULL, &ssl->s3->hs_buf->length)) { in read_v2_client_hello()
|
D | ssl_session.cc | 735 const SSL_CLIENT_HELLO *client_hello) { in ssl_get_prev_session() argument 745 ssl_client_hello_get_extension(client_hello, &ticket, in ssl_get_prev_session() 749 MakeConstSpan(client_hello->session_id, in ssl_get_prev_session() 750 client_hello->session_id_len))) { in ssl_get_prev_session() 765 MakeConstSpan(client_hello->session_id, client_hello->session_id_len)); in ssl_get_prev_session()
|
D | ssl_test.cc | 1094 const uint8_t *client_hello; in GetClientHello() local 1096 if (!BIO_mem_contents(bio.get(), &client_hello, &client_hello_len)) { in GetClientHello() 1099 *out = std::vector<uint8_t>(client_hello, client_hello + client_hello_len); in GetClientHello() 1123 std::vector<uint8_t> client_hello; in GetClientHelloLen() local 1124 if (!GetClientHello(ssl.get(), &client_hello) || in GetClientHelloLen() 1125 client_hello.size() <= SSL3_RT_HEADER_LENGTH) { in GetClientHelloLen() 1129 return client_hello.size() - SSL3_RT_HEADER_LENGTH; in GetClientHelloLen() 2117 std::vector<uint8_t> client_hello; in TEST() local 2118 ASSERT_TRUE(GetClientHello(ssl.get(), &client_hello)); in TEST() 2124 ASSERT_GE(client_hello.size(), kRandomOffset + SSL3_RANDOM_SIZE); in TEST() [all …]
|
D | internal.h | 1883 const SSL_CLIENT_HELLO *client_hello, CBS *contents); 1915 const SSL_CLIENT_HELLO *client_hello); 1956 bool ssl_client_hello_get_extension(const SSL_CLIENT_HELLO *client_hello, 1960 const SSL_CLIENT_HELLO *client_hello, uint16_t id); 2819 const SSL_CLIENT_HELLO *client_hello); 2965 const SSL_CLIENT_HELLO *client_hello);
|
/external/boringssl/src/ssl/ |
D | handshake_server.cc | 175 const SSL_CLIENT_HELLO *client_hello, uint16_t id) { in ssl_client_cipher_list_contains_cipher() argument 177 CBS_init(&cipher_suites, client_hello->cipher_suites, in ssl_client_cipher_list_contains_cipher() 178 client_hello->cipher_suites_len); in ssl_client_cipher_list_contains_cipher() 195 const SSL_CLIENT_HELLO *client_hello) { in negotiate_version() argument 199 if (ssl_client_hello_get_extension(client_hello, &supported_versions, in negotiate_version() 224 if (client_hello->version <= DTLS1_2_VERSION) { in negotiate_version() 226 } else if (client_hello->version <= DTLS1_VERSION) { in negotiate_version() 232 if (client_hello->version >= TLS1_2_VERSION) { in negotiate_version() 234 } else if (client_hello->version >= TLS1_1_VERSION) { in negotiate_version() 236 } else if (client_hello->version >= TLS1_VERSION) { in negotiate_version() [all …]
|
D | tls13_server.cc | 45 SSL_CLIENT_HELLO *client_hello) { in resolve_ecdhe_secret() argument 51 if (!ssl_client_hello_get_extension(client_hello, &key_share, in resolve_ecdhe_secret() 89 const SSL *ssl, const SSL_CLIENT_HELLO *client_hello, uint16_t group_id) { in choose_tls13_cipher() argument 91 CBS_init(&cipher_suites, client_hello->cipher_suites, in choose_tls13_cipher() 92 client_hello->cipher_suites_len); in choose_tls13_cipher() 192 SSL_CLIENT_HELLO client_hello; in do_select_parameters() local 193 if (!ssl_client_hello_init(ssl, &client_hello, msg)) { in do_select_parameters() 199 if (ssl->quic_method != nullptr && client_hello.session_id_len > 0) { in do_select_parameters() 204 OPENSSL_memcpy(hs->session_id, client_hello.session_id, in do_select_parameters() 205 client_hello.session_id_len); in do_select_parameters() [all …]
|
D | tls13_enc.cc | 430 Span<const uint8_t> client_hello, size_t binders_len) { in hash_transcript_and_truncated_client_hello() argument 432 if (binders_len + 2 < binders_len || client_hello.size() < binders_len + 2) { in hash_transcript_and_truncated_client_hello() 435 client_hello = client_hello.subspan(0, client_hello.size() - binders_len - 2); in hash_transcript_and_truncated_client_hello() 440 !EVP_DigestUpdate(ctx.get(), client_hello.data(), client_hello.size()) || in hash_transcript_and_truncated_client_hello()
|
D | t1_lib.cc | 215 out->client_hello = CBS_data(&msg.body); in ssl_client_hello_init() 218 CBS client_hello, random, session_id; in ssl_client_hello_init() local 219 CBS_init(&client_hello, out->client_hello, out->client_hello_len); in ssl_client_hello_init() 220 if (!CBS_get_u16(&client_hello, &out->version) || in ssl_client_hello_init() 221 !CBS_get_bytes(&client_hello, &random, SSL3_RANDOM_SIZE) || in ssl_client_hello_init() 222 !CBS_get_u8_length_prefixed(&client_hello, &session_id) || in ssl_client_hello_init() 235 if (!CBS_get_u8_length_prefixed(&client_hello, &cookie) || in ssl_client_hello_init() 242 if (!CBS_get_u16_length_prefixed(&client_hello, &cipher_suites) || in ssl_client_hello_init() 244 !CBS_get_u8_length_prefixed(&client_hello, &compression_methods) || in ssl_client_hello_init() 256 if (CBS_len(&client_hello) == 0) { in ssl_client_hello_init() [all …]
|
D | s3_both.cc | 420 ScopedCBB client_hello; in read_v2_client_hello() local 427 !CBB_init_fixed(client_hello.get(), (uint8_t *)ssl->s3->hs_buf->data, in read_v2_client_hello() 429 !CBB_add_u8(client_hello.get(), SSL3_MT_CLIENT_HELLO) || in read_v2_client_hello() 430 !CBB_add_u24_length_prefixed(client_hello.get(), &hello_body) || in read_v2_client_hello() 461 !CBB_finish(client_hello.get(), NULL, &ssl->s3->hs_buf->length)) { in read_v2_client_hello()
|
D | ssl_session.cc | 730 const SSL_CLIENT_HELLO *client_hello) { in ssl_get_prev_session() argument 740 ssl_client_hello_get_extension(client_hello, &ticket, in ssl_get_prev_session() 744 MakeConstSpan(client_hello->session_id, in ssl_get_prev_session() 745 client_hello->session_id_len))) { in ssl_get_prev_session() 760 MakeConstSpan(client_hello->session_id, client_hello->session_id_len)); in ssl_get_prev_session()
|
D | ssl_test.cc | 1094 const uint8_t *client_hello; in GetClientHello() local 1096 if (!BIO_mem_contents(bio.get(), &client_hello, &client_hello_len)) { in GetClientHello() 1099 *out = std::vector<uint8_t>(client_hello, client_hello + client_hello_len); in GetClientHello() 1123 std::vector<uint8_t> client_hello; in GetClientHelloLen() local 1124 if (!GetClientHello(ssl.get(), &client_hello) || in GetClientHelloLen() 1125 client_hello.size() <= SSL3_RT_HEADER_LENGTH) { in GetClientHelloLen() 1129 return client_hello.size() - SSL3_RT_HEADER_LENGTH; in GetClientHelloLen() 2117 std::vector<uint8_t> client_hello; in TEST() local 2118 ASSERT_TRUE(GetClientHello(ssl.get(), &client_hello)); in TEST() 2124 ASSERT_GE(client_hello.size(), kRandomOffset + SSL3_RANDOM_SIZE); in TEST() [all …]
|
D | internal.h | 1915 const SSL_CLIENT_HELLO *client_hello, CBS *contents); 1947 const SSL_CLIENT_HELLO *client_hello); 1953 const SSL_CLIENT_HELLO *client_hello); 1999 bool ssl_client_hello_get_extension(const SSL_CLIENT_HELLO *client_hello, 2003 const SSL_CLIENT_HELLO *client_hello, uint16_t id); 2873 const SSL_CLIENT_HELLO *client_hello); 3020 const SSL_CLIENT_HELLO *client_hello);
|
/external/webrtc/rtc_base/ |
D | server_socket_adapters.cc | 32 const ArrayView<const uint8_t> client_hello = in ProcessInput() local 34 if (*len < client_hello.size()) { in ProcessInput() 38 if (memcmp(client_hello.data(), data, client_hello.size()) != 0) { in ProcessInput() 44 *len -= client_hello.size(); in ProcessInput()
|
/external/scapy/scapy/layers/tls/ |
D | automaton_cli.py | 63 client_hello=None, version=None, argument 91 self.client_hello = client_hello 171 self.add_msg(self.client_hello or TLSClientHello()) 529 p = self.client_hello or SSLv2ClientHello(challenge=randstring(16)) 820 if self.client_hello: 821 p = self.client_hello
|
/external/scapy/test/tls/ |
D | example_client.py | 29 t = TLSClientAutomaton(client_hello=ch,
|
D | travis_test_client.py | 32 t = TLSClientAutomaton(client_hello=ch, data=[send_data, b"stop_server", b"quit"], debug=1)
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/test/ |
D | test_config.cc | 1098 const SSL_CLIENT_HELLO *client_hello) { in SelectCertificateCallback() argument 1099 const TestConfig *config = GetTestConfig(client_hello->ssl); in SelectCertificateCallback() 1100 GetTestState(client_hello->ssl)->early_callback_called = true; in SelectCertificateCallback() 1104 SSL_get_servername(client_hello->ssl, TLSEXT_NAMETYPE_host_name); in SelectCertificateCallback() 1121 GetTestState(client_hello->ssl)->early_callback_ready; in SelectCertificateCallback() 1126 if (!InstallCertificate(client_hello->ssl)) { in SelectCertificateCallback() 1359 static int DDoSCallback(const SSL_CLIENT_HELLO *client_hello) { in DDoSCallback() argument 1360 const TestConfig *config = GetTestConfig(client_hello->ssl); in DDoSCallback()
|
/external/boringssl/src/ssl/test/ |
D | test_config.cc | 1163 const SSL_CLIENT_HELLO *client_hello) { in SelectCertificateCallback() argument 1164 const TestConfig *config = GetTestConfig(client_hello->ssl); in SelectCertificateCallback() 1165 GetTestState(client_hello->ssl)->early_callback_called = true; in SelectCertificateCallback() 1169 SSL_get_servername(client_hello->ssl, TLSEXT_NAMETYPE_host_name); in SelectCertificateCallback() 1186 GetTestState(client_hello->ssl)->early_callback_ready; in SelectCertificateCallback() 1191 if (!InstallCertificate(client_hello->ssl)) { in SelectCertificateCallback() 1420 static int DDoSCallback(const SSL_CLIENT_HELLO *client_hello) { in DDoSCallback() argument 1421 const TestConfig *config = GetTestConfig(client_hello->ssl); in DDoSCallback()
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | ssl.h | 3804 const uint8_t *client_hello; member 3839 const SSL_CLIENT_HELLO *client_hello, uint16_t extension_type,
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 3889 const uint8_t *client_hello; member 3924 const SSL_CLIENT_HELLO *client_hello, uint16_t extension_type,
|
/external/scapy/test/ |
D | sslv2.uts | 256 ch_pkt.msgtype = 'client_hello'
|