/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_lib.cc | 201 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() argument 204 ssl->s3->rwstate = SSL_ERROR_NONE; in ssl_reset_error_state() 209 void ssl_set_read_error(SSL* ssl) { in ssl_set_read_error() argument 210 ssl->s3->read_shutdown = ssl_shutdown_error; in ssl_set_read_error() 211 ssl->s3->read_error.reset(ERR_save_state()); in ssl_set_read_error() 214 static bool check_read_error(const SSL *ssl) { in check_read_error() argument 215 if (ssl->s3->read_shutdown == ssl_shutdown_error) { in check_read_error() 216 ERR_restore_state(ssl->s3->read_error.get()); in check_read_error() 222 bool ssl_can_write(const SSL *ssl) { in ssl_can_write() argument 223 return !SSL_in_init(ssl) || ssl->s3->hs->can_early_write; in ssl_can_write() [all …]
|
D | d1_lib.cc | 88 bool dtls1_new(SSL *ssl) { in dtls1_new() argument 89 if (!tls_new(ssl)) { in dtls1_new() 94 tls_free(ssl); in dtls1_new() 98 ssl->d1 = d1.release(); in dtls1_new() 105 ssl->version = DTLS1_2_VERSION; in dtls1_new() 109 void dtls1_free(SSL *ssl) { in dtls1_free() argument 110 tls_free(ssl); in dtls1_free() 112 if (ssl == NULL) { in dtls1_free() 116 Delete(ssl->d1); in dtls1_free() 117 ssl->d1 = NULL; in dtls1_free() [all …]
|
D | s3_pkt.cc | 129 static int do_tls_write(SSL *ssl, int type, const uint8_t *in, unsigned len); 131 int tls_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in tls_write_app_data() argument 133 assert(ssl_can_write(ssl)); in tls_write_app_data() 134 assert(!ssl->s3->aead_write_ctx->is_null_cipher()); in tls_write_app_data() 138 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in tls_write_app_data() 144 assert(ssl->s3->wnum <= INT_MAX); in tls_write_app_data() 145 unsigned tot = ssl->s3->wnum; in tls_write_app_data() 146 ssl->s3->wnum = 0; in tls_write_app_data() 161 !ssl->server && SSL_in_early_data(ssl) && ssl->s3->hs->can_early_write; in tls_write_app_data() 165 size_t max_send_fragment = ssl->max_send_fragment; in tls_write_app_data() [all …]
|
D | s3_both.cc | 137 static bool add_record_to_flight(SSL *ssl, uint8_t type, in add_record_to_flight() argument 140 assert(!ssl->s3->pending_hs_data); in add_record_to_flight() 142 assert(ssl->s3->pending_flight_offset == 0); in add_record_to_flight() 144 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 145 ssl->s3->pending_flight.reset(BUF_MEM_new()); in add_record_to_flight() 146 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 151 size_t max_out = in.size() + SSL_max_seal_overhead(ssl); in add_record_to_flight() 152 size_t new_cap = ssl->s3->pending_flight->length + max_out; in add_record_to_flight() 159 if (!BUF_MEM_reserve(ssl->s3->pending_flight.get(), new_cap) || in add_record_to_flight() 160 !tls_seal_record(ssl, in add_record_to_flight() [all …]
|
/external/mbedtls/library/ |
D | ssl_tls12_server.c | 48 int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, in mbedtls_ssl_set_client_transport_id() argument 52 if (ssl->conf->endpoint != MBEDTLS_SSL_IS_SERVER) { in mbedtls_ssl_set_client_transport_id() 56 mbedtls_free(ssl->cli_id); in mbedtls_ssl_set_client_transport_id() 58 if ((ssl->cli_id = mbedtls_calloc(1, ilen)) == NULL) { in mbedtls_ssl_set_client_transport_id() 62 memcpy(ssl->cli_id, info, ilen); in mbedtls_ssl_set_client_transport_id() 63 ssl->cli_id_len = ilen; in mbedtls_ssl_set_client_transport_id() 107 static int ssl_parse_renegotiation_info(mbedtls_ssl_context *ssl, in ssl_parse_renegotiation_info() argument 112 if (ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE) { in ssl_parse_renegotiation_info() 114 if (len != 1 + ssl->verify_data_len || in ssl_parse_renegotiation_info() 115 buf[0] != ssl->verify_data_len || in ssl_parse_renegotiation_info() [all …]
|
D | ssl_tls12_client.c | 51 static int ssl_write_renegotiation_ext(mbedtls_ssl_context *ssl, in ssl_write_renegotiation_ext() argument 63 if (ssl->renego_status != MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS) { in ssl_write_renegotiation_ext() 70 MBEDTLS_SSL_CHK_BUF_PTR(p, end, 5 + ssl->verify_data_len); in ssl_write_renegotiation_ext() 79 *p++ = MBEDTLS_BYTE_0(ssl->verify_data_len + 1); in ssl_write_renegotiation_ext() 80 *p++ = MBEDTLS_BYTE_0(ssl->verify_data_len); in ssl_write_renegotiation_ext() 82 memcpy(p, ssl->own_verify_data, ssl->verify_data_len); in ssl_write_renegotiation_ext() 84 *olen = 5 + ssl->verify_data_len; in ssl_write_renegotiation_ext() 95 static int ssl_write_supported_point_formats_ext(mbedtls_ssl_context *ssl, in ssl_write_supported_point_formats_ext() argument 101 (void) ssl; /* ssl used for debugging only */ in ssl_write_supported_point_formats_ext() 128 static int ssl_write_ecjpake_kkpp_ext(mbedtls_ssl_context *ssl, in ssl_write_ecjpake_kkpp_ext() argument [all …]
|
D | ssl_msg.c | 279 static uint32_t ssl_get_hs_total_len(mbedtls_ssl_context const *ssl); 285 void mbedtls_ssl_set_timer(mbedtls_ssl_context *ssl, uint32_t millisecs) in mbedtls_ssl_set_timer() argument 287 if (ssl->f_set_timer == NULL) { in mbedtls_ssl_set_timer() 292 ssl->f_set_timer(ssl->p_timer, millisecs / 4, millisecs); in mbedtls_ssl_set_timer() 298 int mbedtls_ssl_check_timer(mbedtls_ssl_context *ssl) in mbedtls_ssl_check_timer() argument 300 if (ssl->f_get_timer == NULL) { in mbedtls_ssl_check_timer() 304 if (ssl->f_get_timer(ssl->p_timer) == 2) { in mbedtls_ssl_check_timer() 313 static int ssl_parse_record_header(mbedtls_ssl_context const *ssl, 318 int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, in mbedtls_ssl_check_record() argument 329 if (ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_STREAM) { in mbedtls_ssl_check_record() [all …]
|
D | ssl_tls13_server.c | 25 mbedtls_ssl_context *ssl, in ssl_tls13_validate_peer_ciphersuite() argument 29 if (!mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, cipher_suite)) { in ssl_tls13_validate_peer_ciphersuite() 34 if ((mbedtls_ssl_validate_ciphersuite(ssl, ciphersuite_info, in ssl_tls13_validate_peer_ciphersuite() 35 ssl->tls_version, in ssl_tls13_validate_peer_ciphersuite() 36 ssl->tls_version) != 0)) { in ssl_tls13_validate_peer_ciphersuite() 51 static int ssl_tls13_parse_key_exchange_modes_ext(mbedtls_ssl_context *ssl, in ssl_tls13_parse_key_exchange_modes_ext() argument 89 ssl->handshake->tls13_kex_modes = ke_modes; in ssl_tls13_parse_key_exchange_modes_ext() 100 mbedtls_ssl_context *ssl, in ssl_tls13_offered_psks_check_identity_match_ticket() argument 119 if (ssl->conf->f_ticket_parse == NULL || identity_len == 0) { in ssl_tls13_offered_psks_check_identity_match_ticket() 135 if ((ret = ssl->conf->f_ticket_parse(ssl->conf->p_ticket, in ssl_tls13_offered_psks_check_identity_match_ticket() [all …]
|
/external/cronet/tot/net/data/ |
D | test_support_bundle_data.filelist | 13 data/ssl/certificates/2029_globalsign_com_cert.pem 14 data/ssl/certificates/2_client_certs_1_key.p12 15 data/ssl/certificates/BUILD.gn 16 data/ssl/certificates/README 17 data/ssl/certificates/bad_validity.pem 18 data/ssl/certificates/can_sign_http_exchanges_draft_extension.pem 19 data/ssl/certificates/can_sign_http_exchanges_draft_extension_invalid.pem 20 data/ssl/certificates/client-empty-password.p12 21 data/ssl/certificates/client-nokey.p12 22 data/ssl/certificates/client-null-password.p12 [all …]
|
/external/cronet/stable/net/data/ |
D | test_support_bundle_data.filelist | 13 data/ssl/certificates/2029_globalsign_com_cert.pem 14 data/ssl/certificates/2_client_certs_1_key.p12 15 data/ssl/certificates/BUILD.gn 16 data/ssl/certificates/README 17 data/ssl/certificates/bad_validity.pem 18 data/ssl/certificates/can_sign_http_exchanges_draft_extension.pem 19 data/ssl/certificates/can_sign_http_exchanges_draft_extension_invalid.pem 20 data/ssl/certificates/client-empty-password.p12 21 data/ssl/certificates/client-nokey.p12 22 data/ssl/certificates/client-null-password.p12 [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_lib.cc | 79 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() argument 82 ssl->s3->rwstate = SSL_ERROR_NONE; in ssl_reset_error_state() 87 void ssl_set_read_error(SSL *ssl) { in ssl_set_read_error() argument 88 ssl->s3->read_shutdown = ssl_shutdown_error; in ssl_set_read_error() 89 ssl->s3->read_error.reset(ERR_save_state()); in ssl_set_read_error() 92 static bool check_read_error(const SSL *ssl) { in check_read_error() argument 93 if (ssl->s3->read_shutdown == ssl_shutdown_error) { in check_read_error() 94 ERR_restore_state(ssl->s3->read_error.get()); in check_read_error() 100 bool ssl_can_write(const SSL *ssl) { in ssl_can_write() argument 101 return !SSL_in_init(ssl) || ssl->s3->hs->can_early_write; in ssl_can_write() [all …]
|
D | d1_both.cc | 206 static bool dtls1_is_current_message_complete(const SSL *ssl) { in dtls1_is_current_message_complete() argument 207 size_t idx = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT; in dtls1_is_current_message_complete() 208 DTLSIncomingMessage *frag = ssl->d1->incoming_messages[idx].get(); in dtls1_is_current_message_complete() 217 SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) { in dtls1_get_incoming_message() argument 218 if (msg_hdr->seq < ssl->d1->handshake_read_seq || in dtls1_get_incoming_message() 219 msg_hdr->seq - ssl->d1->handshake_read_seq >= SSL_MAX_HANDSHAKE_FLIGHT) { in dtls1_get_incoming_message() 225 DTLSIncomingMessage *frag = ssl->d1->incoming_messages[idx].get(); in dtls1_get_incoming_message() 240 ssl->d1->incoming_messages[idx] = dtls_new_incoming_message(msg_hdr); in dtls1_get_incoming_message() 241 if (!ssl->d1->incoming_messages[idx]) { in dtls1_get_incoming_message() 245 return ssl->d1->incoming_messages[idx].get(); in dtls1_get_incoming_message() [all …]
|
D | s3_pkt.cc | 30 static int do_tls_write(SSL *ssl, size_t *out_bytes_written, uint8_t type, 33 int tls_write_app_data(SSL *ssl, bool *out_needs_handshake, in tls_write_app_data() argument 35 assert(ssl_can_write(ssl)); in tls_write_app_data() 36 assert(!ssl->s3->aead_write_ctx->is_null_cipher()); in tls_write_app_data() 40 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in tls_write_app_data() 45 size_t total_bytes_written = ssl->s3->unreported_bytes_written; in tls_write_app_data() 60 !ssl->server && SSL_in_early_data(ssl) && ssl->s3->hs->can_early_write; in tls_write_app_data() 62 size_t max_send_fragment = ssl->max_send_fragment; in tls_write_app_data() 64 SSL_HANDSHAKE *hs = ssl->s3->hs.get(); in tls_write_app_data() 66 ssl->s3->unreported_bytes_written = total_bytes_written; in tls_write_app_data() [all …]
|
D | s3_both.cc | 35 static bool add_record_to_flight(SSL *ssl, uint8_t type, in add_record_to_flight() argument 38 assert(!ssl->s3->pending_hs_data); in add_record_to_flight() 40 assert(ssl->s3->pending_flight_offset == 0); in add_record_to_flight() 42 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 43 ssl->s3->pending_flight.reset(BUF_MEM_new()); in add_record_to_flight() 44 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 49 size_t max_out = in.size() + SSL_max_seal_overhead(ssl); in add_record_to_flight() 50 size_t new_cap = ssl->s3->pending_flight->length + max_out; in add_record_to_flight() 57 if (!BUF_MEM_reserve(ssl->s3->pending_flight.get(), new_cap) || in add_record_to_flight() 58 !tls_seal_record(ssl, in add_record_to_flight() [all …]
|
/external/cronet/tot/third_party/boringssl/src/ssl/ |
D | ssl_lib.cc | 208 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() argument 211 ssl->s3->rwstate = SSL_ERROR_NONE; in ssl_reset_error_state() 216 void ssl_set_read_error(SSL *ssl) { in ssl_set_read_error() argument 217 ssl->s3->read_shutdown = ssl_shutdown_error; in ssl_set_read_error() 218 ssl->s3->read_error.reset(ERR_save_state()); in ssl_set_read_error() 221 static bool check_read_error(const SSL *ssl) { in check_read_error() argument 222 if (ssl->s3->read_shutdown == ssl_shutdown_error) { in check_read_error() 223 ERR_restore_state(ssl->s3->read_error.get()); in check_read_error() 229 bool ssl_can_write(const SSL *ssl) { in ssl_can_write() argument 230 return !SSL_in_init(ssl) || ssl->s3->hs->can_early_write; in ssl_can_write() [all …]
|
D | s3_pkt.cc | 129 static int do_tls_write(SSL *ssl, size_t *out_bytes_written, uint8_t type, 132 int tls_write_app_data(SSL *ssl, bool *out_needs_handshake, in tls_write_app_data() argument 134 assert(ssl_can_write(ssl)); in tls_write_app_data() 135 assert(!ssl->s3->aead_write_ctx->is_null_cipher()); in tls_write_app_data() 139 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in tls_write_app_data() 144 size_t total_bytes_written = ssl->s3->unreported_bytes_written; in tls_write_app_data() 159 !ssl->server && SSL_in_early_data(ssl) && ssl->s3->hs->can_early_write; in tls_write_app_data() 161 size_t max_send_fragment = ssl->max_send_fragment; in tls_write_app_data() 163 SSL_HANDSHAKE *hs = ssl->s3->hs.get(); in tls_write_app_data() 165 ssl->s3->unreported_bytes_written = total_bytes_written; in tls_write_app_data() [all …]
|
/external/cronet/stable/third_party/boringssl/src/ssl/ |
D | ssl_lib.cc | 208 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() argument 211 ssl->s3->rwstate = SSL_ERROR_NONE; in ssl_reset_error_state() 216 void ssl_set_read_error(SSL *ssl) { in ssl_set_read_error() argument 217 ssl->s3->read_shutdown = ssl_shutdown_error; in ssl_set_read_error() 218 ssl->s3->read_error.reset(ERR_save_state()); in ssl_set_read_error() 221 static bool check_read_error(const SSL *ssl) { in check_read_error() argument 222 if (ssl->s3->read_shutdown == ssl_shutdown_error) { in check_read_error() 223 ERR_restore_state(ssl->s3->read_error.get()); in check_read_error() 229 bool ssl_can_write(const SSL *ssl) { in ssl_can_write() argument 230 return !SSL_in_init(ssl) || ssl->s3->hs->can_early_write; in ssl_can_write() [all …]
|
D | s3_pkt.cc | 129 static int do_tls_write(SSL *ssl, size_t *out_bytes_written, uint8_t type, 132 int tls_write_app_data(SSL *ssl, bool *out_needs_handshake, in tls_write_app_data() argument 134 assert(ssl_can_write(ssl)); in tls_write_app_data() 135 assert(!ssl->s3->aead_write_ctx->is_null_cipher()); in tls_write_app_data() 139 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in tls_write_app_data() 144 size_t total_bytes_written = ssl->s3->unreported_bytes_written; in tls_write_app_data() 159 !ssl->server && SSL_in_early_data(ssl) && ssl->s3->hs->can_early_write; in tls_write_app_data() 161 size_t max_send_fragment = ssl->max_send_fragment; in tls_write_app_data() 163 SSL_HANDSHAKE *hs = ssl->s3->hs.get(); in tls_write_app_data() 165 ssl->s3->unreported_bytes_written = total_bytes_written; in tls_write_app_data() [all …]
|
D | s3_both.cc | 137 static bool add_record_to_flight(SSL *ssl, uint8_t type, in add_record_to_flight() argument 140 assert(!ssl->s3->pending_hs_data); in add_record_to_flight() 142 assert(ssl->s3->pending_flight_offset == 0); in add_record_to_flight() 144 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 145 ssl->s3->pending_flight.reset(BUF_MEM_new()); in add_record_to_flight() 146 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 151 size_t max_out = in.size() + SSL_max_seal_overhead(ssl); in add_record_to_flight() 152 size_t new_cap = ssl->s3->pending_flight->length + max_out; in add_record_to_flight() 159 if (!BUF_MEM_reserve(ssl->s3->pending_flight.get(), new_cap) || in add_record_to_flight() 160 !tls_seal_record(ssl, in add_record_to_flight() [all …]
|
/external/openthread/third_party/mbedtls/repo/library/ |
D | ssl_tls12_client.c | 51 static int ssl_write_renegotiation_ext(mbedtls_ssl_context *ssl, in ssl_write_renegotiation_ext() argument 63 if (ssl->renego_status != MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS) { in ssl_write_renegotiation_ext() 70 MBEDTLS_SSL_CHK_BUF_PTR(p, end, 5 + ssl->verify_data_len); in ssl_write_renegotiation_ext() 79 *p++ = MBEDTLS_BYTE_0(ssl->verify_data_len + 1); in ssl_write_renegotiation_ext() 80 *p++ = MBEDTLS_BYTE_0(ssl->verify_data_len); in ssl_write_renegotiation_ext() 82 memcpy(p, ssl->own_verify_data, ssl->verify_data_len); in ssl_write_renegotiation_ext() 84 *olen = 5 + ssl->verify_data_len; in ssl_write_renegotiation_ext() 95 static int ssl_write_supported_point_formats_ext(mbedtls_ssl_context *ssl, in ssl_write_supported_point_formats_ext() argument 101 (void) ssl; /* ssl used for debugging only */ in ssl_write_supported_point_formats_ext() 128 static int ssl_write_ecjpake_kkpp_ext(mbedtls_ssl_context *ssl, in ssl_write_ecjpake_kkpp_ext() argument [all …]
|
D | ssl_msg.c | 279 static uint32_t ssl_get_hs_total_len(mbedtls_ssl_context const *ssl); 285 void mbedtls_ssl_set_timer(mbedtls_ssl_context *ssl, uint32_t millisecs) in mbedtls_ssl_set_timer() argument 287 if (ssl->f_set_timer == NULL) { in mbedtls_ssl_set_timer() 292 ssl->f_set_timer(ssl->p_timer, millisecs / 4, millisecs); in mbedtls_ssl_set_timer() 298 int mbedtls_ssl_check_timer(mbedtls_ssl_context *ssl) in mbedtls_ssl_check_timer() argument 300 if (ssl->f_get_timer == NULL) { in mbedtls_ssl_check_timer() 304 if (ssl->f_get_timer(ssl->p_timer) == 2) { in mbedtls_ssl_check_timer() 313 static int ssl_parse_record_header(mbedtls_ssl_context const *ssl, 318 int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, in mbedtls_ssl_check_record() argument 329 if (ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_STREAM) { in mbedtls_ssl_check_record() [all …]
|
D | ssl_tls12_server.c | 48 int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, in mbedtls_ssl_set_client_transport_id() argument 52 if (ssl->conf->endpoint != MBEDTLS_SSL_IS_SERVER) { in mbedtls_ssl_set_client_transport_id() 56 mbedtls_free(ssl->cli_id); in mbedtls_ssl_set_client_transport_id() 58 if ((ssl->cli_id = mbedtls_calloc(1, ilen)) == NULL) { in mbedtls_ssl_set_client_transport_id() 62 memcpy(ssl->cli_id, info, ilen); in mbedtls_ssl_set_client_transport_id() 63 ssl->cli_id_len = ilen; in mbedtls_ssl_set_client_transport_id() 107 static int ssl_parse_renegotiation_info(mbedtls_ssl_context *ssl, in ssl_parse_renegotiation_info() argument 112 if (ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE) { in ssl_parse_renegotiation_info() 114 if (len != 1 + ssl->verify_data_len || in ssl_parse_renegotiation_info() 115 buf[0] != ssl->verify_data_len || in ssl_parse_renegotiation_info() [all …]
|
D | ssl_tls13_server.c | 25 mbedtls_ssl_context *ssl, in ssl_tls13_validate_peer_ciphersuite() argument 29 if (!mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, cipher_suite)) { in ssl_tls13_validate_peer_ciphersuite() 34 if ((mbedtls_ssl_validate_ciphersuite(ssl, ciphersuite_info, in ssl_tls13_validate_peer_ciphersuite() 35 ssl->tls_version, in ssl_tls13_validate_peer_ciphersuite() 36 ssl->tls_version) != 0)) { in ssl_tls13_validate_peer_ciphersuite() 43 mbedtls_ssl_context *ssl, in ssl_tls13_select_ciphersuite() argument 71 ssl_tls13_validate_peer_ciphersuite(ssl, id); in ssl_tls13_select_ciphersuite() 108 static int ssl_tls13_parse_key_exchange_modes_ext(mbedtls_ssl_context *ssl, in ssl_tls13_parse_key_exchange_modes_ext() argument 146 ssl->handshake->tls13_kex_modes = ke_modes; in ssl_tls13_parse_key_exchange_modes_ext() 177 static int ssl_tls13_key_exchange_is_psk_available(mbedtls_ssl_context *ssl); [all …]
|
D | ssl_tls13_client.c | 46 static int ssl_tls13_write_supported_versions_ext(mbedtls_ssl_context *ssl, in ssl_tls13_write_supported_versions_ext() argument 52 unsigned char versions_len = (ssl->handshake->min_tls_version <= in ssl_tls13_write_supported_versions_ext() 83 if (ssl->handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_2) { in ssl_tls13_write_supported_versions_ext() 92 ssl, MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS); in ssl_tls13_write_supported_versions_ext() 98 static int ssl_tls13_parse_supported_versions_ext(mbedtls_ssl_context *ssl, in ssl_tls13_parse_supported_versions_ext() argument 102 ((void) ssl); in ssl_tls13_parse_supported_versions_ext() 105 if (mbedtls_ssl_read_version(buf, ssl->conf->transport) != in ssl_tls13_parse_supported_versions_ext() 127 static int ssl_tls13_parse_alpn_ext(mbedtls_ssl_context *ssl, in ssl_tls13_parse_alpn_ext() argument 136 if (ssl->conf->alpn_list == NULL) { in ssl_tls13_parse_alpn_ext() 162 for (const char **alpn = ssl->conf->alpn_list; *alpn != NULL; alpn++) { in ssl_tls13_parse_alpn_ext() [all …]
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_lib.c | 69 int ossl_statem_in_error(const SSL *ssl) in ossl_statem_in_error() argument 71 SSL_ASSERT1(ssl); in ossl_statem_in_error() 73 if (ssl->statem.state == MSG_FLOW_ERROR) in ossl_statem_in_error() 82 int SSL_want(const SSL *ssl) in SSL_want() argument 84 SSL_ASSERT1(ssl); in SSL_want() 86 return ssl->rwstate; in SSL_want() 92 int SSL_want_nothing(const SSL *ssl) in SSL_want_nothing() argument 94 SSL_ASSERT1(ssl); in SSL_want_nothing() 96 if (ssl->err) in SSL_want_nothing() 99 return (SSL_want(ssl) == SSL_NOTHING); in SSL_want_nothing() [all …]
|