Home
last modified time | relevance | path

Searched refs:hs (Results 1 – 25 of 506) sorted by relevance

12345678910>>...21

/external/rust/crates/quiche/deps/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
218 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
220 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
222 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
231 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
237 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
252 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
260 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
261 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret()
67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret()
70 if (!hs->ecdh_public_key.CopyFrom(hints->key_share_public_key) || in resolve_ecdhe_secret()
81 !CBBFinishArray(public_key.get(), &hs->ecdh_public_key)) { in resolve_ecdhe_secret()
85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret()
87 if (!hints->key_share_public_key.CopyFrom(hs->ecdh_public_key) || in resolve_ecdhe_secret()
[all …]
Dhandshake_server.cc196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
198 SSL *const ssl = hs->ssl; in negotiate_version()
246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
301 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
307 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
308 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
309 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
316 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
321 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
93 hs->new_session.get(), in close_early_data()
94 hs->client_handshake_secret())) { in close_early_data()
104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13()
127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument
150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation()
[all …]
Dextensions.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
311 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
312 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
313 return hs->config->supported_group_list; in tls1_get_grouplist()
318 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
319 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
331 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
335 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
337 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
Dhandshake.cc197 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local
198 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new()
201 hs->config = ssl->config.get(); in ssl_handshake_new()
202 if (!hs->config) { in ssl_handshake_new()
203 assert(hs->config); in ssl_handshake_new()
206 return hs; in ssl_handshake_new()
260 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument
266 return hs->transcript.Update(msg.raw); in ssl_hash_message()
323 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument
324 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert()
[all …]
Dtls13_enc.cc36 static bool init_key_schedule(SSL_HANDSHAKE *hs, SSLTranscript *transcript, in init_key_schedule() argument
43 hs->ResizeSecrets(transcript->DigestLen()); in init_key_schedule()
44 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule()
49 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, in hkdf_extract_to_secret() argument
53 if (!HKDF_extract(hs->secret().data(), &len, transcript.Digest(), in.data(), in hkdf_extract_to_secret()
54 in.size(), hs->secret().data(), hs->secret().size())) { in hkdf_extract_to_secret()
57 assert(len == hs->secret().size()); in hkdf_extract_to_secret()
61 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
62 if (!init_key_schedule(hs, &hs->transcript, ssl_protocol_version(hs->ssl), in tls13_init_key_schedule()
63 hs->new_cipher)) { in tls13_init_key_schedule()
[all …]
/external/cronet/third_party/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
218 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
220 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
222 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
231 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
237 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
262 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
270 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
271 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret()
67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret()
70 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret()
81 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret()
85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret()
87 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret()
[all …]
Dhandshake_server.cc196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
198 SSL *const ssl = hs->ssl; in negotiate_version()
246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
93 hs->new_session.get(), in close_early_data()
94 hs->client_handshake_secret())) { in close_early_data()
104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13()
127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument
150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation()
[all …]
Dextensions.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
318 return hs->config->supported_group_list; in tls1_get_grouplist()
323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
324 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
340 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
342 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
Dhandshake.cc197 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local
198 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new()
201 hs->config = ssl->config.get(); in ssl_handshake_new()
202 if (!hs->config) { in ssl_handshake_new()
203 assert(hs->config); in ssl_handshake_new()
206 return hs; in ssl_handshake_new()
260 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument
266 return hs->transcript.Update(msg.raw); in ssl_hash_message()
323 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument
324 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert()
[all …]
Dtls13_enc.cc37 static bool init_key_schedule(SSL_HANDSHAKE *hs, SSLTranscript *transcript, in init_key_schedule() argument
44 hs->ResizeSecrets(transcript->DigestLen()); in init_key_schedule()
45 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule()
50 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, in hkdf_extract_to_secret() argument
54 if (!HKDF_extract(hs->secret().data(), &len, transcript.Digest(), in.data(), in hkdf_extract_to_secret()
55 in.size(), hs->secret().data(), hs->secret().size())) { in hkdf_extract_to_secret()
58 assert(len == hs->secret().size()); in hkdf_extract_to_secret()
62 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
63 if (!init_key_schedule(hs, &hs->transcript, ssl_protocol_version(hs->ssl), in tls13_init_key_schedule()
64 hs->new_cipher)) { in tls13_init_key_schedule()
[all …]
/external/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
226 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
228 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
230 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
239 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
245 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
266 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
274 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
275 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret()
67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret()
70 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret()
81 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret()
85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret()
87 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret()
[all …]
Dhandshake_server.cc196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
198 SSL *const ssl = hs->ssl; in negotiate_version()
246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
299 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
305 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
306 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
307 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
314 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
319 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
93 hs->new_session.get(), in close_early_data()
94 hs->client_handshake_secret())) { in close_early_data()
104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13()
127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument
150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation()
[all …]
Dextensions.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
318 return hs->config->supported_group_list; in tls1_get_grouplist()
323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
324 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
340 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
342 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
Dhandshake.cc197 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() local
198 if (!hs || !hs->transcript.Init()) { in ssl_handshake_new()
201 hs->config = ssl->config.get(); in ssl_handshake_new()
202 if (!hs->config) { in ssl_handshake_new()
203 assert(hs->config); in ssl_handshake_new()
206 return hs; in ssl_handshake_new()
260 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { in ssl_hash_message() argument
266 return hs->transcript.Update(msg.raw); in ssl_hash_message()
323 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { in ssl_verify_peer_cert() argument
324 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert()
[all …]
Dtls13_enc.cc37 static bool init_key_schedule(SSL_HANDSHAKE *hs, SSLTranscript *transcript, in init_key_schedule() argument
44 hs->ResizeSecrets(transcript->DigestLen()); in init_key_schedule()
45 OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); in init_key_schedule()
50 static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, in hkdf_extract_to_secret() argument
54 if (!HKDF_extract(hs->secret().data(), &len, transcript.Digest(), in.data(), in hkdf_extract_to_secret()
55 in.size(), hs->secret().data(), hs->secret().size())) { in hkdf_extract_to_secret()
58 assert(len == hs->secret().size()); in hkdf_extract_to_secret()
62 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
63 if (!init_key_schedule(hs, &hs->transcript, ssl_protocol_version(hs->ssl), in tls13_init_key_schedule()
64 hs->new_cipher)) { in tls13_init_key_schedule()
[all …]
/external/boringssl/src/ssl/test/runner/
Dhandshake_server.go55 hs := serverHandshakeState{
58 if err := hs.readClientHello(); err != nil {
63 if err := hs.doTLS13Handshake(); err != nil {
67 isResume, err := hs.processClientHello()
76 c.writeRecord(recordTypeHandshake, hs.hello.marshal())
87 if err := hs.doResumeHandshake(); err != nil {
90 if err := hs.establishKeys(); err != nil {
94 if err := hs.sendSessionTicket(); err != nil {
98 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
106 c.writeRecord(recordTypeHandshake, hs.finishedBytes)
[all …]
Dhandshake_client.go99 hs := &clientHandshakeState{
137 hs.session = session
159hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA…
164 hs.innerHello, err = hs.createClientHello(nil, nil)
168 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc)
172 earlyHello = hs.innerHello
174 hs.hello, err = hs.createClientHello(nil, nil)
178 earlyHello = hs.hello
186 hs.hello.isV2ClientHello = true
192 challengeLength = len(hs.hello.random)
[all …]
/external/cronet/third_party/boringssl/src/ssl/test/runner/
Dhandshake_server.go55 hs := serverHandshakeState{
58 if err := hs.readClientHello(); err != nil {
63 if err := hs.doTLS13Handshake(); err != nil {
67 isResume, err := hs.processClientHello()
76 c.writeRecord(recordTypeHandshake, hs.hello.marshal())
87 if err := hs.doResumeHandshake(); err != nil {
90 if err := hs.establishKeys(); err != nil {
94 if err := hs.sendSessionTicket(); err != nil {
98 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
106 c.writeRecord(recordTypeHandshake, hs.finishedBytes)
[all …]
Dhandshake_client.go99 hs := &clientHandshakeState{
137 hs.session = session
159hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA…
164 hs.innerHello, err = hs.createClientHello(nil, nil)
168 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc)
172 earlyHello = hs.innerHello
174 hs.hello, err = hs.createClientHello(nil, nil)
178 earlyHello = hs.hello
186 hs.hello.isV2ClientHello = true
192 challengeLength = len(hs.hello.random)
[all …]

12345678910>>...21