/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | handshake_client.cc | 205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 218 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 220 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 222 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 231 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 237 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 252 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 260 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 261 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | tls13_server.cc | 45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() 66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret() 67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret() 70 if (!hs->ecdh_public_key.CopyFrom(hints->key_share_public_key) || in resolve_ecdhe_secret() 81 !CBBFinishArray(public_key.get(), &hs->ecdh_public_key)) { in resolve_ecdhe_secret() 85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret() 87 if (!hints->key_share_public_key.CopyFrom(hs->ecdh_public_key) || in resolve_ecdhe_secret() [all …]
|
D | handshake_server.cc | 196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 198 SSL *const ssl = hs->ssl; in negotiate_version() 246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 301 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument 307 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers() 308 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers() 309 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers() 316 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers() 321 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 93 hs->new_session.get(), in close_early_data() 94 hs->client_handshake_secret())) { in close_early_data() 104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13() 127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument 150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation() [all …]
|
D | extensions.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 311 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 312 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 313 return hs->config->supported_group_list; in tls1_get_grouplist() 318 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 319 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 331 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 335 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 337 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
D | handshake.cc | 197 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local 198 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new() 201 hs->config = ssl->config.get(); in ssl_handshake_new() 202 if (!hs->config) { in ssl_handshake_new() 203 assert(hs->config); in ssl_handshake_new() 206 return hs; in ssl_handshake_new() 260 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument 266 return hs->transcript.Update(msg.raw); in ssl_hash_message() 323 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument 324 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert() [all …]
|
D | tls13_enc.cc | 36 static bool init_key_schedule(SSL_HANDSHAKE *hs, SSLTranscript *transcript, in init_key_schedule() argument 43 hs->ResizeSecrets(transcript->DigestLen()); in init_key_schedule() 44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule() 49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, in hkdf_extract_to_secret() argument 53 if (!HKDF_extract(hs->secret().data(), &len, transcript.Digest(), in.data(), in hkdf_extract_to_secret() 54 in.size(), hs->secret().data(), hs->secret().size())) { in hkdf_extract_to_secret() 57 assert(len == hs->secret().size()); in hkdf_extract_to_secret() 61 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument 62 if (!init_key_schedule(hs, &hs->transcript, ssl_protocol_version(hs->ssl), in tls13_init_key_schedule() 63 hs->new_cipher)) { in tls13_init_key_schedule() [all …]
|
/external/cronet/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 218 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 220 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 222 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 231 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 237 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 262 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 270 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 271 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | tls13_server.cc | 45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() 66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret() 67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret() 70 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret() 81 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret() 85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret() 87 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret() [all …]
|
D | handshake_server.cc | 196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 198 SSL *const ssl = hs->ssl; in negotiate_version() 246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument 305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers() 306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers() 307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers() 314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers() 319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 93 hs->new_session.get(), in close_early_data() 94 hs->client_handshake_secret())) { in close_early_data() 104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13() 127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument 150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation() [all …]
|
D | extensions.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 318 return hs->config->supported_group_list; in tls1_get_grouplist() 323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 324 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 340 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 342 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
D | handshake.cc | 197 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local 198 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new() 201 hs->config = ssl->config.get(); in ssl_handshake_new() 202 if (!hs->config) { in ssl_handshake_new() 203 assert(hs->config); in ssl_handshake_new() 206 return hs; in ssl_handshake_new() 260 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument 266 return hs->transcript.Update(msg.raw); in ssl_hash_message() 323 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument 324 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert() [all …]
|
D | tls13_enc.cc | 37 static bool init_key_schedule(SSL_HANDSHAKE *hs, SSLTranscript *transcript, in init_key_schedule() argument 44 hs->ResizeSecrets(transcript->DigestLen()); in init_key_schedule() 45 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule() 50 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, in hkdf_extract_to_secret() argument 54 if (!HKDF_extract(hs->secret().data(), &len, transcript.Digest(), in.data(), in hkdf_extract_to_secret() 55 in.size(), hs->secret().data(), hs->secret().size())) { in hkdf_extract_to_secret() 58 assert(len == hs->secret().size()); in hkdf_extract_to_secret() 62 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument 63 if (!init_key_schedule(hs, &hs->transcript, ssl_protocol_version(hs->ssl), in tls13_init_key_schedule() 64 hs->new_cipher)) { in tls13_init_key_schedule() [all …]
|
/external/boringssl/src/ssl/ |
D | handshake_client.cc | 205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 226 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 228 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 230 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 239 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 245 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 266 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 274 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 275 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | tls13_server.cc | 45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() 66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret() 67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret() 70 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret() 81 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret() 85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret() 87 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret() [all …]
|
D | handshake_server.cc | 196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 198 SSL *const ssl = hs->ssl; in negotiate_version() 246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument 305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers() 306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers() 307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers() 314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers() 319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 93 hs->new_session.get(), in close_early_data() 94 hs->client_handshake_secret())) { in close_early_data() 104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13() 127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument 150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation() [all …]
|
D | extensions.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 318 return hs->config->supported_group_list; in tls1_get_grouplist() 323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 324 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 340 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 342 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
D | handshake.cc | 197 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local 198 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new() 201 hs->config = ssl->config.get(); in ssl_handshake_new() 202 if (!hs->config) { in ssl_handshake_new() 203 assert(hs->config); in ssl_handshake_new() 206 return hs; in ssl_handshake_new() 260 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument 266 return hs->transcript.Update(msg.raw); in ssl_hash_message() 323 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument 324 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert() [all …]
|
D | tls13_enc.cc | 37 static bool init_key_schedule(SSL_HANDSHAKE *hs, SSLTranscript *transcript, in init_key_schedule() argument 44 hs->ResizeSecrets(transcript->DigestLen()); in init_key_schedule() 45 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule() 50 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, in hkdf_extract_to_secret() argument 54 if (!HKDF_extract(hs->secret().data(), &len, transcript.Digest(), in.data(), in hkdf_extract_to_secret() 55 in.size(), hs->secret().data(), hs->secret().size())) { in hkdf_extract_to_secret() 58 assert(len == hs->secret().size()); in hkdf_extract_to_secret() 62 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument 63 if (!init_key_schedule(hs, &hs->transcript, ssl_protocol_version(hs->ssl), in tls13_init_key_schedule() 64 hs->new_cipher)) { in tls13_init_key_schedule() [all …]
|
/external/boringssl/src/ssl/test/runner/ |
D | handshake_server.go | 55 hs := serverHandshakeState{ 58 if err := hs.readClientHello(); err != nil { 63 if err := hs.doTLS13Handshake(); err != nil { 67 isResume, err := hs.processClientHello() 76 c.writeRecord(recordTypeHandshake, hs.hello.marshal()) 87 if err := hs.doResumeHandshake(); err != nil { 90 if err := hs.establishKeys(); err != nil { 94 if err := hs.sendSessionTicket(); err != nil { 98 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil { 106 c.writeRecord(recordTypeHandshake, hs.finishedBytes) [all …]
|
D | handshake_client.go | 99 hs := &clientHandshakeState{ 137 hs.session = session 159 …hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA… 164 hs.innerHello, err = hs.createClientHello(nil, nil) 168 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc) 172 earlyHello = hs.innerHello 174 hs.hello, err = hs.createClientHello(nil, nil) 178 earlyHello = hs.hello 186 hs.hello.isV2ClientHello = true 192 challengeLength = len(hs.hello.random) [all …]
|
/external/cronet/third_party/boringssl/src/ssl/test/runner/ |
D | handshake_server.go | 55 hs := serverHandshakeState{ 58 if err := hs.readClientHello(); err != nil { 63 if err := hs.doTLS13Handshake(); err != nil { 67 isResume, err := hs.processClientHello() 76 c.writeRecord(recordTypeHandshake, hs.hello.marshal()) 87 if err := hs.doResumeHandshake(); err != nil { 90 if err := hs.establishKeys(); err != nil { 94 if err := hs.sendSessionTicket(); err != nil { 98 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil { 106 c.writeRecord(recordTypeHandshake, hs.finishedBytes) [all …]
|
D | handshake_client.go | 99 hs := &clientHandshakeState{ 137 hs.session = session 159 …hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA… 164 hs.innerHello, err = hs.createClientHello(nil, nil) 168 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc) 172 earlyHello = hs.innerHello 174 hs.hello, err = hs.createClientHello(nil, nil) 178 earlyHello = hs.hello 186 hs.hello.isV2ClientHello = true 192 challengeLength = len(hs.hello.random) [all …]
|