Home
last modified time | relevance | path

Searched refs:hs (Results 1 – 25 of 569) sorted by relevance

12345678910>>...23

/external/boringssl/src/ssl/
Dtls13_server.cc46 static bool resolve_pake_secret(SSL_HANDSHAKE *hs) { in resolve_pake_secret() argument
50 if (!hs->pake_verifier->ProcessProverShare(verifier_share, verifier_confirm, in resolve_pake_secret()
52 hs->pake_share->pake_message)) { in resolve_pake_secret()
54 ssl_send_alert(hs->ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in resolve_pake_secret()
62 !CBBFinishArray(cbb.get(), &hs->pake_share_bytes)) { in resolve_pake_secret()
67 hs, MakeConstSpan(shared_secret, sizeof(shared_secret))); in resolve_pake_secret()
70 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
72 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
73 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
78 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
[all …]
Dhandshake_client.cc67 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
74 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
88 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
90 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
92 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
101 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
107 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
141 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
149 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
150 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dhandshake_server.cc59 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
61 SSL *const ssl = hs->ssl; in negotiate_version()
107 if (!ssl_negotiate_version(hs, out_alert, &ssl->s3->version, &versions)) { in negotiate_version()
114 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
151 static const SSL_CIPHER *choose_cipher(SSL_HANDSHAKE *hs, in choose_cipher() argument
154 SSL *const ssl = hs->ssl; in choose_cipher()
166 hs->config->cipher_list ? hs->config->cipher_list.get() in choose_cipher()
222 static TLS12ServerParams choose_params(SSL_HANDSHAKE *hs, in choose_params() argument
231 if (hs->config->psk_server_callback != nullptr) { in choose_params()
237 bool sign_ok = tls1_choose_signature_algorithm(hs, cred, &sigalg); in choose_params()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
95 hs->new_session.get(), in close_early_data()
96 hs->client_handshake_secret)) { in close_early_data()
107 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 SSL_is_dtls(hs->ssl) ? DTLS1_2_VERSION : TLS1_2_VERSION; in parse_server_hello_tls13()
121 SSL_is_dtls(hs->ssl) ? Span<const uint8_t>() : Span(hs->session_id); in parse_server_hello_tls13()
139 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument
[all …]
Dextensions.cc40 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
41 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
222 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
223 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
224 return hs->config->supported_group_list; in tls1_get_grouplist()
229 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
230 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
242 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
246 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
248 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
218 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
220 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
222 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
231 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
237 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
252 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
260 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
261 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dtls13_server.cc45 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
47 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
48 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
53 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
66 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret()
67 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret()
70 if (!hs->ecdh_public_key.CopyFrom(hints->key_share_public_key) || in resolve_ecdhe_secret()
81 !CBBFinishArray(public_key.get(), &hs->ecdh_public_key)) { in resolve_ecdhe_secret()
85 if (hints && hs->hints_requested) { in resolve_ecdhe_secret()
87 if (!hints->key_share_public_key.CopyFrom(hs->ecdh_public_key) || in resolve_ecdhe_secret()
[all …]
Dhandshake_server.cc196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
198 SSL *const ssl = hs->ssl; in negotiate_version()
246 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
258 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
301 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, in ssl_get_compatible_server_ciphers() argument
307 if (ssl_has_certificate(hs)) { in ssl_get_compatible_server_ciphers()
308 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); in ssl_get_compatible_server_ciphers()
309 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { in ssl_get_compatible_server_ciphers()
316 if (tls1_get_shared_group(hs, &unused)) { in ssl_get_compatible_server_ciphers()
321 if (hs->config->psk_server_callback != NULL) { in ssl_get_compatible_server_ciphers()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
93 hs->new_session.get(), in close_early_data()
94 hs->client_handshake_secret())) { in close_early_data()
104 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 !CBS_mem_equal(&out->session_id, hs->session_id, hs->session_id_len) || in parse_server_hello_tls13()
127 static bool check_ech_confirmation(const SSL_HANDSHAKE *hs, bool *out_accepted, in check_ech_confirmation() argument
150 offset = ssl_ech_confirmation_signal_hello_offset(hs->ssl); in check_ech_confirmation()
[all …]
Dextensions.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
311 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
312 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
313 return hs->config->supported_group_list; in tls1_get_grouplist()
318 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
319 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
331 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
335 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
337 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
/external/cronet/stable/third_party/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
226 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
228 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
230 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
239 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
245 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
279 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
287 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
288 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dhandshake_server.cc196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
198 SSL *const ssl = hs->ssl; in negotiate_version()
244 if (!ssl_negotiate_version(hs, out_alert, &ssl->s3->version, &versions)) { in negotiate_version()
251 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
288 static const SSL_CIPHER *choose_cipher(SSL_HANDSHAKE *hs, in choose_cipher() argument
291 SSL *const ssl = hs->ssl; in choose_cipher()
303 hs->config->cipher_list ? hs->config->cipher_list.get() in choose_cipher()
359 static TLS12ServerParams choose_params(SSL_HANDSHAKE *hs, in choose_params() argument
368 if (hs->config->psk_server_callback != nullptr) { in choose_params()
374 bool sign_ok = tls1_choose_signature_algorithm(hs, cred, &sigalg); in choose_params()
[all …]
Dtls13_server.cc46 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
48 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
49 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
54 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
67 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret()
68 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret()
71 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret()
82 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret()
86 if (hints && hs->hints_requested) { in resolve_ecdhe_secret()
88 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
95 hs->new_session.get(), in close_early_data()
96 hs->client_handshake_secret)) { in close_early_data()
107 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 SSL_is_dtls(hs->ssl) ? DTLS1_2_VERSION : TLS1_2_VERSION; in parse_server_hello_tls13()
120 Span<const uint8_t> expected_session_id = SSL_is_dtls(hs->ssl) in parse_server_hello_tls13()
122 : MakeConstSpan(hs->session_id); in parse_server_hello_tls13()
[all …]
Dextensions.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
318 return hs->config->supported_group_list; in tls1_get_grouplist()
323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
324 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
340 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
342 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
/external/cronet/tot/third_party/boringssl/src/ssl/
Dhandshake_client.cc205 static void ssl_get_client_disabled(const SSL_HANDSHAKE *hs, in ssl_get_client_disabled() argument
212 if (hs->config->psk_client_callback == NULL) { in ssl_get_client_disabled()
226 static bool ssl_write_client_cipher_list(const SSL_HANDSHAKE *hs, CBB *out, in ssl_write_client_cipher_list() argument
228 const SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list()
230 ssl_get_client_disabled(hs, &mask_a, &mask_k); in ssl_write_client_cipher_list()
239 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { in ssl_write_client_cipher_list()
245 if (hs->max_version >= TLS1_3_VERSION) { in ssl_write_client_cipher_list()
279 if (hs->min_version < TLS1_3_VERSION && type != ssl_client_hello_inner) { in ssl_write_client_cipher_list()
287 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || in ssl_write_client_cipher_list()
288 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { in ssl_write_client_cipher_list()
[all …]
Dhandshake_server.cc196 static bool negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, in negotiate_version() argument
198 SSL *const ssl = hs->ssl; in negotiate_version()
244 if (!ssl_negotiate_version(hs, out_alert, &ssl->s3->version, &versions)) { in negotiate_version()
251 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
288 static const SSL_CIPHER *choose_cipher(SSL_HANDSHAKE *hs, in choose_cipher() argument
291 SSL *const ssl = hs->ssl; in choose_cipher()
303 hs->config->cipher_list ? hs->config->cipher_list.get() in choose_cipher()
359 static TLS12ServerParams choose_params(SSL_HANDSHAKE *hs, in choose_params() argument
368 if (hs->config->psk_server_callback != nullptr) { in choose_params()
374 bool sign_ok = tls1_choose_signature_algorithm(hs, cred, &sigalg); in choose_params()
[all …]
Dtls13_server.cc46 static bool resolve_ecdhe_secret(SSL_HANDSHAKE *hs, in resolve_ecdhe_secret() argument
48 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret()
49 const uint16_t group_id = hs->new_session->group_id; in resolve_ecdhe_secret()
54 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &peer_key, in resolve_ecdhe_secret()
67 SSL_HANDSHAKE_HINTS *const hints = hs->hints.get(); in resolve_ecdhe_secret()
68 if (hints && !hs->hints_requested && hints->key_share_group_id == group_id && in resolve_ecdhe_secret()
71 if (!hs->key_share_ciphertext.CopyFrom(hints->key_share_ciphertext) || in resolve_ecdhe_secret()
82 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret()
86 if (hints && hs->hints_requested) { in resolve_ecdhe_secret()
88 if (!hints->key_share_ciphertext.CopyFrom(hs->key_share_ciphertext) || in resolve_ecdhe_secret()
[all …]
Dtls13_client.cc58 static bool close_early_data(SSL_HANDSHAKE *hs, ssl_encryption_level_t level) { in close_early_data() argument
59 SSL *const ssl = hs->ssl; in close_early_data()
60 assert(hs->in_early_data); in close_early_data()
64 hs->can_early_write = false; in close_early_data()
95 hs->new_session.get(), in close_early_data()
96 hs->client_handshake_secret)) { in close_early_data()
107 static bool parse_server_hello_tls13(const SSL_HANDSHAKE *hs, in parse_server_hello_tls13() argument
114 SSL_is_dtls(hs->ssl) ? DTLS1_2_VERSION : TLS1_2_VERSION; in parse_server_hello_tls13()
120 Span<const uint8_t> expected_session_id = SSL_is_dtls(hs->ssl) in parse_server_hello_tls13()
122 : MakeConstSpan(hs->session_id); in parse_server_hello_tls13()
[all …]
Dextensions.cc138 static bool ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs);
139 static bool ssl_check_serverhello_tlsext(SSL_HANDSHAKE *hs);
316 Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { in tls1_get_grouplist() argument
317 if (!hs->config->supported_group_list.empty()) { in tls1_get_grouplist()
318 return hs->config->supported_group_list; in tls1_get_grouplist()
323 bool tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { in tls1_get_shared_group() argument
324 SSL *const ssl = hs->ssl; in tls1_get_shared_group()
336 Span<const uint16_t> groups = tls1_get_grouplist(hs); in tls1_get_shared_group()
340 supp = hs->peer_supported_group_list; in tls1_get_shared_group()
342 pref = hs->peer_supported_group_list; in tls1_get_shared_group()
[all …]
/external/cronet/tot/third_party/boringssl/src/ssl/test/runner/
Dhandshake_server.go57 hs := serverHandshakeState{
60 if err := hs.readClientHello(); err != nil {
65 if err := hs.doTLS13Handshake(); err != nil {
69 isResume, err := hs.processClientHello()
78 c.writeRecord(recordTypeHandshake, hs.hello.marshal())
91 if err := hs.doResumeHandshake(); err != nil {
94 if err := hs.establishKeys(); err != nil {
98 if err := hs.sendSessionTicket(); err != nil {
102 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
105 if err := hs.readFinished(nil, isResume); err != nil {
[all …]
Dhandshake_client.go104 hs := &clientHandshakeState{
142 hs.session = session
164hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA…
169 hs.innerHello, err = hs.createClientHello(nil, nil)
173 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc)
177 earlyHello = hs.innerHello
179 hs.hello, err = hs.createClientHello(nil, nil)
183 earlyHello = hs.hello
191 hs.hello.isV2ClientHello = true
197 challengeLength = len(hs.hello.random)
[all …]
/external/cronet/stable/third_party/boringssl/src/ssl/test/runner/
Dhandshake_server.go57 hs := serverHandshakeState{
60 if err := hs.readClientHello(); err != nil {
65 if err := hs.doTLS13Handshake(); err != nil {
69 isResume, err := hs.processClientHello()
78 c.writeRecord(recordTypeHandshake, hs.hello.marshal())
91 if err := hs.doResumeHandshake(); err != nil {
94 if err := hs.establishKeys(); err != nil {
98 if err := hs.sendSessionTicket(); err != nil {
102 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
105 if err := hs.readFinished(nil, isResume); err != nil {
[all …]
Dhandshake_client.go104 hs := &clientHandshakeState{
142 hs.session = session
164hs.echHPKEContext, echEnc, err = hpke.SetupBaseSenderX25519(echCipherSuite.KDF, echCipherSuite.AEA…
169 hs.innerHello, err = hs.createClientHello(nil, nil)
173 hs.hello, err = hs.createClientHello(hs.innerHello, echEnc)
177 earlyHello = hs.innerHello
179 hs.hello, err = hs.createClientHello(nil, nil)
183 earlyHello = hs.hello
191 hs.hello.isV2ClientHello = true
197 challengeLength = len(hs.hello.random)
[all …]
/external/boringssl/src/ssl/test/runner/
Dhandshake_server.go58 hs := serverHandshakeState{
61 if err := hs.readClientHello(); err != nil {
66 if err := hs.doTLS13Handshake(); err != nil {
70 isResume, err := hs.processClientHello()
79 c.writeRecord(recordTypeHandshake, hs.hello.marshal())
92 if err := hs.doResumeHandshake(); err != nil {
95 if err := hs.establishKeys(); err != nil {
99 if err := hs.sendSessionTicket(); err != nil {
103 if err := hs.sendFinished(c.firstFinished[:], isResume); err != nil {
106 if err := hs.readFinished(nil, isResume); err != nil {
[all …]

12345678910>>...23