/external/boringssl/src/ssl/ |
D | tls13_server.cc | 46 static bool resolve_pake_secret(SSL_HANDSHAKE *hs) { in resolve_pake_secret() argument 50 if (!hs->pake_verifier->ProcessProverShare(verifier_share, verifier_confirm, in resolve_pake_secret() 52 hs->pake_share->pake_message)) { in resolve_pake_secret() 54 ssl_send_alert(hs->ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in resolve_pake_secret() 62 !CBBFinishArray(cbb.get(), &hs->pake_share_bytes)) { in resolve_pake_secret() 67 hs, MakeConstSpan(shared_secret, sizeof(shared_secret))); in resolve_pake_secret() 70 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 72 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 73 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 78 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() [all …]
|
D | handshake_client.cc | 67 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 74 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 88 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 90 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 92 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 101 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 107 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 141 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 149 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 150 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | handshake_server.cc | 59 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 61 SSL *const ssl = hs->ssl; in negotiate_version() 107 if (!ssl_negotiate_version(hs, out_alert, &ssl->s3->version, &versions)) { in negotiate_version() 114 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 151 static const SSL_CIPHER *choose_cipher(SSL_HANDSHAKE *hs, in choose_cipher() argument 154 SSL *const ssl = hs->ssl; in choose_cipher() 166 hs->config->cipher_list ? hs->config->cipher_list.get() in choose_cipher() 222 static TLS12ServerParams choose_params(SSL_HANDSHAKE *hs, in choose_params() argument 231 if (hs->config->psk_server_callback != nullptr) { in choose_params() 237 bool sign_ok = tls1_choose_signature_algorithm(hs, cred, &sigalg); in choose_params() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 95 hs->new_session.get(), in close_early_data() 96 hs->client_handshake_secret)) { in close_early_data() 107 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 SSL_is_dtls(hs->ssl) ? DTLS1_2_VERSION : TLS1_2_VERSION; in parse_server_hello_tls13() 121 SSL_is_dtls(hs->ssl) ? Span<const uint8_t>() : Span(hs->session_id); in parse_server_hello_tls13() 139 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument [all …]
|
D | extensions.cc | 40 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 41 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 222 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 223 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 224 return hs->config->supported_group_list; in tls1_get_grouplist() 229 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 230 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 242 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 246 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 248 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | handshake_client.cc | 205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 218 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 220 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 222 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 231 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 237 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 252 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 260 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 261 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | tls13_server.cc | 45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() 66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret() 67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret() 70 if (!hs->ecdh_public_key.CopyFrom(hints->key_share_public_key) || in resolve_ecdhe_secret() 81 !CBBFinishArray(public_key.get(), &hs->ecdh_public_key)) { in resolve_ecdhe_secret() 85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret() 87 if (!hints->key_share_public_key.CopyFrom(hs->ecdh_public_key) || in resolve_ecdhe_secret() [all …]
|
D | handshake_server.cc | 196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 198 SSL *const ssl = hs->ssl; in negotiate_version() 246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 301 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument 307 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers() 308 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers() 309 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers() 316 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers() 321 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 93 hs->new_session.get(), in close_early_data() 94 hs->client_handshake_secret())) { in close_early_data() 104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13() 127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument 150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation() [all …]
|
D | extensions.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 311 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 312 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 313 return hs->config->supported_group_list; in tls1_get_grouplist() 318 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 319 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 331 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 335 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 337 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
/external/cronet/stable/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 226 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 228 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 230 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 239 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 245 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 279 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 287 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 288 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | handshake_server.cc | 196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 198 SSL *const ssl = hs->ssl; in negotiate_version() 244 if (!ssl_negotiate_version(hs, out_alert, &ssl->s3->version, &versions)) { in negotiate_version() 251 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 288 static const SSL_CIPHER *choose_cipher(SSL_HANDSHAKE *hs, in choose_cipher() argument 291 SSL *const ssl = hs->ssl; in choose_cipher() 303 hs->config->cipher_list ? hs->config->cipher_list.get() in choose_cipher() 359 static TLS12ServerParams choose_params(SSL_HANDSHAKE *hs, in choose_params() argument 368 if (hs->config->psk_server_callback != nullptr) { in choose_params() 374 bool sign_ok = tls1_choose_signature_algorithm(hs, cred, &sigalg); in choose_params() [all …]
|
D | tls13_server.cc | 46 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 48 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 49 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 54 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() 67 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret() 68 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret() 71 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret() 82 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret() 86 if (hints && hs->hints_requested) { in resolve_ecdhe_secret() 88 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 95 hs->new_session.get(), in close_early_data() 96 hs->client_handshake_secret)) { in close_early_data() 107 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 SSL_is_dtls(hs->ssl) ? DTLS1_2_VERSION : TLS1_2_VERSION; in parse_server_hello_tls13() 120 Span<const uint8_t> expected_session_id = SSL_is_dtls(hs->ssl) in parse_server_hello_tls13() 122 : MakeConstSpan(hs->session_id); in parse_server_hello_tls13() [all …]
|
D | extensions.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 318 return hs->config->supported_group_list; in tls1_get_grouplist() 323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 324 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 340 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 342 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
/external/cronet/tot/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument 212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled() 226 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument 228 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 230 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list() 239 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list() 245 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list() 279 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list() 287 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list() 288 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list() [all …]
|
D | handshake_server.cc | 196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument 198 SSL *const ssl = hs->ssl; in negotiate_version() 244 if (!ssl_negotiate_version(hs, out_alert, &ssl->s3->version, &versions)) { in negotiate_version() 251 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 288 static const SSL_CIPHER *choose_cipher(SSL_HANDSHAKE *hs, in choose_cipher() argument 291 SSL *const ssl = hs->ssl; in choose_cipher() 303 hs->config->cipher_list ? hs->config->cipher_list.get() in choose_cipher() 359 static TLS12ServerParams choose_params(SSL_HANDSHAKE *hs, in choose_params() argument 368 if (hs->config->psk_server_callback != nullptr) { in choose_params() 374 bool sign_ok = tls1_choose_signature_algorithm(hs, cred, &sigalg); in choose_params() [all …]
|
D | tls13_server.cc | 46 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument 48 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() 49 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret() 54 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret() 67 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret() 68 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret() 71 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret() 82 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret() 86 if (hints && hs->hints_requested) { in resolve_ecdhe_secret() 88 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret() [all …]
|
D | tls13_client.cc | 58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument 59 SSL *const ssl = hs->ssl; in close_early_data() 60 assert(hs->in_early_data); in close_early_data() 64 hs->can_early_write = false; in close_early_data() 95 hs->new_session.get(), in close_early_data() 96 hs->client_handshake_secret)) { in close_early_data() 107 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument 114 SSL_is_dtls(hs->ssl) ? DTLS1_2_VERSION : TLS1_2_VERSION; in parse_server_hello_tls13() 120 Span<const uint8_t> expected_session_id = SSL_is_dtls(hs->ssl) in parse_server_hello_tls13() 122 : MakeConstSpan(hs->session_id); in parse_server_hello_tls13() [all …]
|
D | extensions.cc | 138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs); 316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument 317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist() 318 return hs->config->supported_group_list; in tls1_get_grouplist() 323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument 324 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group() 340 supp = hs->peer_supported_group_list; in tls1_get_shared_group() 342 pref = hs->peer_supported_group_list; in tls1_get_shared_group() [all …]
|
/external/cronet/tot/third_party/boringssl/src/ssl/test/runner/ |
D | handshake_server.go | 57 hs := serverHandshakeState{ 60 if err := hs.readClientHello(); err != nil { 65 if err := hs.doTLS13Handshake(); err != nil { 69 isResume, err := hs.processClientHello() 78 c.writeRecord(recordTypeHandshake, hs.hello.marshal()) 91 if err := hs.doResumeHandshake(); err != nil { 94 if err := hs.establishKeys(); err != nil { 98 if err := hs.sendSessionTicket(); err != nil { 102 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil { 105 if err := hs.readFinished(nil, isResume); err != nil { [all …]
|
D | handshake_client.go | 104 hs := &clientHandshakeState{ 142 hs.session = session 164 …hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA… 169 hs.innerHello, err = hs.createClientHello(nil, nil) 173 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc) 177 earlyHello = hs.innerHello 179 hs.hello, err = hs.createClientHello(nil, nil) 183 earlyHello = hs.hello 191 hs.hello.isV2ClientHello = true 197 challengeLength = len(hs.hello.random) [all …]
|
/external/cronet/stable/third_party/boringssl/src/ssl/test/runner/ |
D | handshake_server.go | 57 hs := serverHandshakeState{ 60 if err := hs.readClientHello(); err != nil { 65 if err := hs.doTLS13Handshake(); err != nil { 69 isResume, err := hs.processClientHello() 78 c.writeRecord(recordTypeHandshake, hs.hello.marshal()) 91 if err := hs.doResumeHandshake(); err != nil { 94 if err := hs.establishKeys(); err != nil { 98 if err := hs.sendSessionTicket(); err != nil { 102 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil { 105 if err := hs.readFinished(nil, isResume); err != nil { [all …]
|
D | handshake_client.go | 104 hs := &clientHandshakeState{ 142 hs.session = session 164 …hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA… 169 hs.innerHello, err = hs.createClientHello(nil, nil) 173 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc) 177 earlyHello = hs.innerHello 179 hs.hello, err = hs.createClientHello(nil, nil) 183 earlyHello = hs.hello 191 hs.hello.isV2ClientHello = true 197 challengeLength = len(hs.hello.random) [all …]
|
/external/boringssl/src/ssl/test/runner/ |
D | handshake_server.go | 58 hs := serverHandshakeState{ 61 if err := hs.readClientHello(); err != nil { 66 if err := hs.doTLS13Handshake(); err != nil { 70 isResume, err := hs.processClientHello() 79 c.writeRecord(recordTypeHandshake, hs.hello.marshal()) 92 if err := hs.doResumeHandshake(); err != nil { 95 if err := hs.establishKeys(); err != nil { 99 if err := hs.sendSessionTicket(); err != nil { 103 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil { 106 if err := hs.readFinished(nil, isResume); err != nil { [all …]
|