/external/boringssl/src/ssl/ |
H A D | tls13_server.cc | 61 static int resolve_ecdhe_secret(SSL_HANDSHAKE *hs, bool *out_need_retry, argument 63 SSL *const ssl = hs->ssl; 78 if (!ssl_ext_key_share_parse_clienthello(hs, &found_key_share, &dhe_secret, 89 return tls13_advance_key_schedule(hs, dhe_secret.data(), dhe_secret.size()); 92 static int ssl_ext_supported_versions_add_serverhello(SSL_HANDSHAKE *hs, argument 97 !CBB_add_u16(&contents, hs->ssl->version) || 151 static int add_new_session_tickets(SSL_HANDSHAKE *hs) { argument 152 SSL *const ssl = hs->ssl; 159 ssl_session_rebase_time(ssl, hs->new_session.get()); 163 SSL_SESSION_dup(hs 219 do_select_parameters(SSL_HANDSHAKE *hs) argument 268 select_session( SSL_HANDSHAKE *hs, uint8_t *out_alert, UniquePtr<SSL_SESSION> *out_session, int32_t *out_ticket_age_skew, const SSLMessage &msg, const SSL_CLIENT_HELLO *client_hello) argument 355 do_select_session(SSL_HANDSHAKE *hs) argument 488 do_send_hello_retry_request(SSL_HANDSHAKE *hs) argument 523 do_read_second_client_hello(SSL_HANDSHAKE *hs) argument 558 do_send_server_hello(SSL_HANDSHAKE *hs) argument 662 do_send_server_certificate_verify(SSL_HANDSHAKE *hs) argument 680 do_send_server_finished(SSL_HANDSHAKE *hs) argument 735 do_read_second_client_flight(SSL_HANDSHAKE *hs) argument 751 do_process_end_of_early_data(SSL_HANDSHAKE *hs) argument 783 do_read_client_certificate(SSL_HANDSHAKE *hs) argument 812 do_read_client_certificate_verify( SSL_HANDSHAKE *hs) argument 847 do_read_channel_id(SSL_HANDSHAKE *hs) argument 869 do_read_client_finished(SSL_HANDSHAKE *hs) argument 902 do_send_new_session_ticket(SSL_HANDSHAKE *hs) argument 918 tls13_server_handshake(SSL_HANDSHAKE *hs) argument 983 tls13_server_handshake_state(SSL_HANDSHAKE *hs) argument [all...] |
H A D | handshake_server.cc | 219 static int negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, argument 221 SSL *const ssl = hs->ssl; 272 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { 284 ssl_protocol_version(ssl) < hs->max_version) { 325 // and current ClientHello parameters of |hs|. It sets |*out_mask_k| to the key 327 static void ssl_get_compatible_server_ciphers(SSL_HANDSHAKE *hs, argument 330 SSL *const ssl = hs->ssl; 335 mask_a |= ssl_cipher_auth_mask_for_key(hs->local_pubkey.get()); 336 if (EVP_PKEY_id(hs->local_pubkey.get()) == EVP_PKEY_RSA) { 343 if (tls1_get_shared_group(hs, 357 ssl3_choose_cipher( SSL_HANDSHAKE *hs, const SSL_CLIENT_HELLO *client_hello, const struct ssl_cipher_preference_list_st *server_pref) argument 426 do_start_accept(SSL_HANDSHAKE *hs) argument 432 do_read_client_hello(SSL_HANDSHAKE *hs) argument 512 do_select_certificate(SSL_HANDSHAKE *hs) argument 562 do_tls13(SSL_HANDSHAKE *hs) argument 572 do_select_parameters(SSL_HANDSHAKE *hs) argument 686 do_send_server_hello(SSL_HANDSHAKE *hs) argument 754 do_send_server_certificate(SSL_HANDSHAKE *hs) argument 842 do_send_server_key_exchange(SSL_HANDSHAKE *hs) argument 914 do_send_server_hello_done(SSL_HANDSHAKE *hs) argument 949 do_read_client_certificate(SSL_HANDSHAKE *hs) argument 1042 do_verify_client_certificate(SSL_HANDSHAKE *hs) argument 1058 do_read_client_key_exchange(SSL_HANDSHAKE *hs) argument 1269 do_read_client_certificate_verify(SSL_HANDSHAKE *hs) argument 1365 do_read_change_cipher_spec(SSL_HANDSHAKE *hs) argument 1370 do_process_change_cipher_spec(SSL_HANDSHAKE *hs) argument 1379 do_read_next_proto(SSL_HANDSHAKE *hs) argument 1415 do_read_channel_id(SSL_HANDSHAKE *hs) argument 1439 do_read_client_finished(SSL_HANDSHAKE *hs) argument 1463 do_send_server_finished(SSL_HANDSHAKE *hs) argument 1511 do_finish_server_handshake(SSL_HANDSHAKE *hs) argument 1539 ssl_server_handshake(SSL_HANDSHAKE *hs) argument 1623 ssl_server_handshake_state(SSL_HANDSHAKE *hs) argument [all...] |
H A D | tls13_enc.cc | 35 static int init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, argument 37 if (!hs->transcript.InitHash(version, cipher)) { 41 hs->hash_len = hs->transcript.DigestLen(); 44 OPENSSL_memset(hs->secret, 0, hs->hash_len); 49 int tls13_init_key_schedule(SSL_HANDSHAKE *hs, const uint8_t *psk, argument 51 if (!init_key_schedule(hs, ssl_protocol_version(hs->ssl), hs 60 tls13_init_early_key_schedule(SSL_HANDSHAKE *hs, const uint8_t *psk, size_t psk_len) argument 100 tls13_advance_key_schedule(SSL_HANDSHAKE *hs, const uint8_t *in, size_t len) argument 123 derive_secret(SSL_HANDSHAKE *hs, uint8_t *out, size_t len, const char *label, size_t label_len) argument 215 tls13_derive_early_secrets(SSL_HANDSHAKE *hs) argument 231 tls13_derive_handshake_secrets(SSL_HANDSHAKE *hs) argument 245 tls13_derive_application_secrets(SSL_HANDSHAKE *hs) argument 289 tls13_derive_resumption_secret(SSL_HANDSHAKE *hs) argument 319 tls13_finished_mac(SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, int is_server) argument 414 tls13_write_psk_binder(SSL_HANDSHAKE *hs, uint8_t *msg, size_t len) argument 448 tls13_verify_psk_binder(SSL_HANDSHAKE *hs, SSL_SESSION *session, const SSLMessage &msg, CBS *binders) argument [all...] |
H A D | handshake_client.cc | 214 static int ssl_write_client_cipher_list(SSL_HANDSHAKE *hs, CBB *out) { argument 215 SSL *const ssl = hs->ssl; 226 !CBB_add_u16(&child, ssl_get_grease_value(hs, ssl_grease_cipher))) { 232 if (hs->max_version >= TLS1_3_VERSION) { 247 if (hs->min_version < TLS1_3_VERSION) { 255 if (SSL_CIPHER_get_min_version(cipher) > hs->max_version || 256 SSL_CIPHER_get_max_version(cipher) < hs->min_version) { 266 if (!any_enabled && hs->max_version < TLS1_3_VERSION) { 274 if (hs->max_version == SSL3_VERSION && 290 int ssl_write_client_hello(SSL_HANDSHAKE *hs) { argument 342 parse_server_version(SSL_HANDSHAKE *hs, uint16_t *out, const SSLMessage &msg) argument 413 do_start_connect(SSL_HANDSHAKE *hs) argument 482 do_enter_early_data(SSL_HANDSHAKE *hs) argument 519 do_read_hello_verify_request(SSL_HANDSHAKE *hs) argument 563 do_read_server_hello(SSL_HANDSHAKE *hs) argument 789 do_tls13(SSL_HANDSHAKE *hs) argument 799 do_read_server_certificate(SSL_HANDSHAKE *hs) argument 849 do_read_certificate_status(SSL_HANDSHAKE *hs) argument 899 do_verify_server_certificate(SSL_HANDSHAKE *hs) argument 919 do_read_server_key_exchange(SSL_HANDSHAKE *hs) argument 1101 do_read_certificate_request(SSL_HANDSHAKE *hs) argument 1173 do_read_server_hello_done(SSL_HANDSHAKE *hs) argument 1197 do_send_client_certificate(SSL_HANDSHAKE *hs) argument 1248 do_send_client_key_exchange(SSL_HANDSHAKE *hs) argument 1401 do_send_client_certificate_verify(SSL_HANDSHAKE *hs) argument 1485 do_send_client_finished(SSL_HANDSHAKE *hs) argument 1542 can_false_start(const SSL_HANDSHAKE *hs) argument 1566 do_finish_flight(SSL_HANDSHAKE *hs) argument 1594 do_read_session_ticket(SSL_HANDSHAKE *hs) argument 1677 do_process_change_cipher_spec(SSL_HANDSHAKE *hs) argument 1686 do_read_server_finished(SSL_HANDSHAKE *hs) argument 1702 do_finish_client_handshake(SSL_HANDSHAKE *hs) argument 1735 ssl_client_handshake(SSL_HANDSHAKE *hs) argument 1819 ssl_client_handshake_state(SSL_HANDSHAKE *hs) argument [all...] |
H A D | tls13_client.cc | 53 static enum ssl_hs_wait_t do_read_hello_retry_request(SSL_HANDSHAKE *hs) { argument 54 SSL *const ssl = hs->ssl; 64 if (!hs->early_data_offered && 79 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || 92 hs->tls13_state = state_read_server_hello; 106 hs->new_cipher = cipher; 108 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || 109 !hs 192 do_send_second_client_hello(SSL_HANDSHAKE *hs) argument 212 do_read_server_hello(SSL_HANDSHAKE *hs) argument 398 do_read_encrypted_extensions(SSL_HANDSHAKE *hs) argument 457 do_read_certificate_request(SSL_HANDSHAKE *hs) argument 532 do_read_server_certificate(SSL_HANDSHAKE *hs) argument 549 do_read_server_certificate_verify( SSL_HANDSHAKE *hs) argument 577 do_read_server_finished(SSL_HANDSHAKE *hs) argument 597 do_send_end_of_early_data(SSL_HANDSHAKE *hs) argument 622 do_send_client_certificate(SSL_HANDSHAKE *hs) argument 654 do_send_client_certificate_verify(SSL_HANDSHAKE *hs) argument 679 do_complete_second_flight(SSL_HANDSHAKE *hs) argument 720 tls13_client_handshake(SSL_HANDSHAKE *hs) argument 779 tls13_client_handshake_state(SSL_HANDSHAKE *hs) argument [all...] |
H A D | handshake.cc | 157 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); local 158 if (!hs || 159 !hs->transcript.Init()) { 162 return hs; 215 bool ssl_hash_message(SSL_HANDSHAKE *hs, const SSLMessage &msg) { argument 221 return hs->transcript.Update(msg.raw); 285 enum ssl_verify_result_t ssl_verify_peer_cert(SSL_HANDSHAKE *hs) { argument 286 SSL *const ssl = hs->ssl; 295 sk_CRYPTO_BUFFER_num(hs->new_session->certs)) { 301 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs 362 ssl_get_grease_value(SSL_HANDSHAKE *hs, enum ssl_grease_index_t index) argument 380 ssl_get_finished(SSL_HANDSHAKE *hs) argument 431 ssl_send_finished(SSL_HANDSHAKE *hs) argument 491 ssl_run_handshake(SSL_HANDSHAKE *hs, bool *out_early_return) argument [all...] |
H A D | t1_lib.cc | 134 static int ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs); 303 int tls1_get_shared_group(SSL_HANDSHAKE *hs, uint16_t *out_group_id) { argument 304 SSL *const ssl = hs->ssl; 320 supp = hs->peer_supported_group_list; 322 pref = hs->peer_supported_group_list; 531 void (*init)(SSL_HANDSHAKE *hs); 533 bool (*add_clienthello)(SSL_HANDSHAKE *hs, CBB *out); 534 bool (*parse_serverhello)(SSL_HANDSHAKE *hs, uint8_t *out_alert, 537 bool (*parse_clienthello)(SSL_HANDSHAKE *hs, uint8_t *out_alert, 539 bool (*add_serverhello)(SSL_HANDSHAKE *hs, CB 542 forbid_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 554 ignore_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 560 ignore_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 565 dont_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 573 ext_sni_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 594 ext_sni_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 601 ext_sni_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 645 ext_sni_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 664 ext_ri_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 687 ext_ri_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 770 ext_ri_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 805 ext_ri_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 829 ext_ems_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 843 ext_ems_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 869 ext_ems_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 889 ext_ems_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 907 ext_ticket_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 942 ext_ticket_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 966 ext_ticket_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 987 ext_sigalgs_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1005 ext_sigalgs_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1028 ext_ocsp_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1047 ext_ocsp_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1073 ext_ocsp_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1091 ext_ocsp_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1112 ext_npn_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1128 ext_npn_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1179 ext_npn_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1201 ext_npn_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1235 ext_sct_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1249 ext_sct_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1289 ext_sct_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1303 ext_sct_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1327 ext_alpn_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1347 ext_alpn_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1418 ssl_negotiate_alpn(SSL_HANDSHAKE *hs, uint8_t *out_alert, const SSL_CLIENT_HELLO *client_hello) argument 1472 ext_alpn_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1497 ext_channel_id_init(SSL_HANDSHAKE *hs) argument 1501 ext_channel_id_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1516 ext_channel_id_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1535 ext_channel_id_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1553 ext_channel_id_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1573 ext_srtp_init(SSL_HANDSHAKE *hs) argument 1577 ext_srtp_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1606 ext_srtp_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1651 ext_srtp_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1692 ext_srtp_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1716 ext_ec_point_add_extension(SSL_HANDSHAKE *hs, CBB *out) argument 1729 ext_ec_point_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1738 ext_ec_point_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1766 ext_ec_point_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1775 ext_ec_point_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1797 ext_pre_shared_key_clienthello_length(SSL_HANDSHAKE *hs) argument 1808 ext_pre_shared_key_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1852 ssl_ext_pre_shared_key_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1873 ssl_ext_pre_shared_key_parse_clienthello( SSL_HANDSHAKE *hs, CBS *out_ticket, CBS *out_binders, uint32_t *out_obfuscated_ticket_age, uint8_t *out_alert, CBS *contents) argument 1929 ssl_ext_pre_shared_key_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 1951 ext_psk_key_exchange_modes_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 1968 ext_psk_key_exchange_modes_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 1995 ext_early_data_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2024 ext_early_data_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2046 ext_early_data_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2063 ext_early_data_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 2082 ext_key_share_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2148 ssl_ext_key_share_parse_serverhello(SSL_HANDSHAKE *hs, Array<uint8_t> *out_secret, uint8_t *out_alert, CBS *contents) argument 2177 ssl_ext_key_share_parse_clienthello(SSL_HANDSHAKE *hs, bool *out_found, Array<uint8_t> *out_secret, uint8_t *out_alert, CBS *contents) argument 2242 ssl_ext_key_share_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 2267 ext_supported_versions_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2299 ext_cookie_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2327 ext_dummy_pq_padding_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2360 ext_supported_groups_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2385 ext_supported_groups_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2416 ext_supported_groups_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2445 ext_token_binding_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2465 ext_token_binding_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2526 ext_token_binding_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2562 ext_token_binding_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 2584 ext_quic_transport_params_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) argument 2602 ext_quic_transport_params_parse_serverhello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2618 ext_quic_transport_params_parse_clienthello(SSL_HANDSHAKE *hs, uint8_t *out_alert, CBS *contents) argument 2633 ext_quic_transport_params_add_serverhello(SSL_HANDSHAKE *hs, CBB *out) argument 2852 ssl_add_clienthello_tlsext(SSL_HANDSHAKE *hs, CBB *out, size_t header_len) argument 2968 ssl_add_serverhello_tlsext(SSL_HANDSHAKE *hs, CBB *out) argument 3005 ssl_scan_clienthello_tlsext(SSL_HANDSHAKE *hs, const SSL_CLIENT_HELLO *client_hello, int *out_alert) argument 3090 ssl_parse_clienthello_tlsext(SSL_HANDSHAKE *hs, const SSL_CLIENT_HELLO *client_hello) argument 3107 ssl_scan_serverhello_tlsext(SSL_HANDSHAKE *hs, CBS *cbs, int *out_alert) argument 3188 ssl_check_clienthello_tlsext(SSL_HANDSHAKE *hs) argument 3224 ssl_parse_serverhello_tlsext(SSL_HANDSHAKE *hs, CBS *cbs) argument 3434 tls1_parse_peer_sigalgs(SSL_HANDSHAKE *hs, const CBS *in_sigalgs) argument 3456 tls1_choose_signature_algorithm(SSL_HANDSHAKE *hs, uint16_t *out) argument 3505 tls1_verify_channel_id(SSL_HANDSHAKE *hs, const SSLMessage &msg) argument 3573 tls1_write_channel_id(SSL_HANDSHAKE *hs, CBB *cbb) argument 3614 tls1_channel_id_hash(SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len) argument 3658 tls1_record_handshake_hashes_for_channel_id(SSL_HANDSHAKE *hs) argument [all...] |
H A D | ssl_stat.cc | 92 if (ssl->s3->hs == nullptr) { 96 return ssl->server ? ssl_server_handshake_state(ssl->s3->hs.get()) 97 : ssl_client_handshake_state(ssl->s3->hs.get());
|
H A D | tls13_both.cc | 55 SSL_HANDSHAKE *hs, Array<uint8_t> *out, 95 if (!hs->transcript.GetHash(context_hash, &context_hash_len) || 105 int tls13_process_certificate(SSL_HANDSHAKE *hs, const SSLMessage &msg, argument 107 SSL *const ssl = hs->ssl; 155 hs->new_session->peer_sha256); 205 CRYPTO_BUFFER_free(hs->new_session->ocsp_response); 206 hs->new_session->ocsp_response = 208 if (hs->new_session->ocsp_response == nullptr) { 229 CRYPTO_BUFFER_free(hs->new_session->signed_cert_timestamp_list); 230 hs 54 tls13_get_cert_verify_signature_input( SSL_HANDSHAKE *hs, Array<uint8_t> *out, enum ssl_cert_verify_context_t cert_verify_context) argument 276 tls13_process_certificate_verify(SSL_HANDSHAKE *hs, const SSLMessage &msg) argument 323 tls13_process_finished(SSL_HANDSHAKE *hs, const SSLMessage &msg, int use_saved_value) argument 354 tls13_add_certificate(SSL_HANDSHAKE *hs) argument 426 tls13_add_certificate_verify(SSL_HANDSHAKE *hs) argument 475 tls13_add_finished(SSL_HANDSHAKE *hs) argument [all...] |
H A D | custom_extensions.cc | 63 static int custom_ext_add_hello(SSL_HANDSHAKE *hs, CBB *extensions) { argument 64 SSL *const ssl = hs->ssl; 78 !(hs->custom_extensions.received & (1u << i))) { 108 assert((hs->custom_extensions.sent & (1u << i)) == 0); 109 hs->custom_extensions.sent |= (1u << i); 127 int custom_ext_add_clienthello(SSL_HANDSHAKE *hs, CBB *extensions) { argument 128 return custom_ext_add_hello(hs, extensions); 131 int custom_ext_parse_serverhello(SSL_HANDSHAKE *hs, int *out_alert, argument 133 SSL *const ssl = hs->ssl; 141 !(hs 159 custom_ext_parse_clienthello(SSL_HANDSHAKE *hs, int *out_alert, uint16_t value, const CBS *extension) argument 184 custom_ext_add_serverhello(SSL_HANDSHAKE *hs, CBB *extensions) argument [all...] |
H A D | ssl_versions.cc | 270 return ssl->s3->hs->early_session->ssl_version; 287 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) { argument 288 SSL *const ssl = hs->ssl; 292 hs->min_version > protocol_version || 293 protocol_version > hs->max_version) { 315 bool ssl_add_supported_versions(SSL_HANDSHAKE *hs, CBB *cbb) { argument 318 get_method_versions(hs->ssl->method, &versions, &num_versions); 320 if (ssl_supports_version(hs, versions[i]) && 328 bool ssl_negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, argument 332 get_method_versions(hs [all...] |
H A D | internal.h | 377 // ssl_supports_version returns whether |hs| supports |version|. 378 bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version); 380 // ssl_add_supported_versions writes the supported versions of |hs| to |cbb|, in 382 bool ssl_add_supported_versions(SSL_HANDSHAKE *hs, CBB *cbb); 384 // ssl_negotiate_version negotiates a common version based on |hs|'s preferences 388 bool ssl_negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert, 868 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, 871 enum ssl_private_key_result_t ssl_private_key_decrypt(SSL_HANDSHAKE *hs, 877 // ssl_private_key_supports_signature_algorithm returns whether |hs|'s private 879 bool ssl_private_key_supports_signature_algorithm(SSL_HANDSHAKE *hs, 2327 UniquePtr<SSL_HANDSHAKE> hs; member in struct:bssl::SSL3_STATE [all...] |
/external/javassist/sample/hotswap/ |
H A D | Test.java | 6 HotSwapper hs = new HotSwapper(8000); 14 hs.reload("HelloWorld", bytes); 22 hs.reload("HelloWorld", bytes);
|
/external/icu/icu4j/perf-tests/src/com/ibm/icu/dev/test/perf/ |
H A D | UnicodeSetPerf.java | 26 HashSet hs; field in class:UnicodeSetPerf 42 hs = new HashSet(); 68 hs.clear(); 73 hs.add(new Integer(cp)); 106 hs.clear(); 109 hs.add(new Integer(it.codepoint)); 115 if (hs.contains(new Integer(cp))) { 144 hs.clear(); 147 hs.add(new Integer(it.codepoint)); 152 Iterator itr = hs [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
H A D | Support_UnmodifiableCollectionTest.java | 55 HashSet<Integer> hs = new HashSet<Integer>(); 56 hs.add(new Integer(0)); 57 hs.add(new Integer(25)); 58 hs.add(new Integer(99)); 61 col.containsAll(hs)); 62 hs.add(new Integer(100)); 65 !col.containsAll(hs));
|
H A D | Support_UnmodifiableMapTest.java | 113 HashSet<String> hs = new HashSet<String>(); 114 hs.add("0"); 115 hs.add("25"); 116 hs.add("99"); 119 keySet.containsAll(hs)); 120 hs.add("100"); 123 !keySet.containsAll(hs));
|
/external/swiftshader/src/Common/ |
H A D | Half.hpp | 41 } hs; local 43 hs.s = s; 45 return hs.h;
|
/external/skia/src/core/ |
H A D | SkHalf.h | 42 Sk4h hs = Sk4h::Load(&rgba); local 45 asm ("fcvtl %[fs].4s, %[hs].4h \n" // vcvt_f32_f16(...) 47 : [hs] "w" (hs.fVec)); // w: read-only NEON register 50 Sk4i bits = SkNx_cast<int>(hs), // Expand to 32 bit.
|
/external/skqp/src/core/ |
H A D | SkHalf.h | 42 Sk4h hs = Sk4h::Load(&rgba); local 45 asm ("fcvtl %[fs].4s, %[hs].4h \n" // vcvt_f32_f16(...) 47 : [hs] "w" (hs.fVec)); // w: read-only NEON register 50 Sk4i bits = SkNx_cast<int>(hs), // Expand to 32 bit.
|
/external/lzma/CS/7zip/Compress/LZ/ |
H A D | LzBinTree.cs | 97 UInt32 hs = kBT2HashSize;
101 hs = historySize - 1;
102 hs |= (hs >> 1);
103 hs |= (hs >> 2);
104 hs |= (hs >> 4);
105 hs |= (hs >> [all...] |
/external/lzma/Java/SevenZip/Compression/LZ/ |
H A D | BinTree.java | 97 int hs = kBT2HashSize;
101 hs = historySize - 1;
102 hs |= (hs >> 1);
103 hs |= (hs >> 2);
104 hs |= (hs >> 4);
105 hs |= (hs >> [all...] |
/external/syslinux/com32/chain/ |
H A D | utility.c | 98 uint32_t cs, hs, ss; local 106 hs = di->head; 109 if (cs < 1024 && di->lbacnt > cs*hs*ss) 116 hs = 255; 120 hs = 2; 125 if (lba >= cs*hs*ss) { 127 h = hs - 1; 132 h = t % hs; 133 c = t / hs;
|
/external/aac/libSBRenc/src/ |
H A D | mh_det.cpp | 1120 HANDLE_SBR_MISSING_HARMONICS_DETECTOR hs = hSbrMHDet; local 1128 FDKmemclear(hs, sizeof(SBR_MISSING_HARMONICS_DETECTOR)); 1130 hs->prevEnvelopeCompensation = GetRam_Sbr_prevEnvelopeCompensation(chan); 1131 hs->guideScfb = GetRam_Sbr_guideScfb(chan); 1135 (NULL == hs->prevEnvelopeCompensation) || (NULL == hs->guideScfb)) { 1140 hs->guideVectors[i].guideVectorDiff = 1142 hs->guideVectors[i].guideVectorOrig = 1144 hs->detectionVectors[i] = detectionVectors + (i * MAX_FREQ_COEFFS); 1145 hs 1174 HANDLE_SBR_MISSING_HARMONICS_DETECTOR hs = hSbrMHDet; local 1263 HANDLE_SBR_MISSING_HARMONICS_DETECTOR hs = hSbrMHDet; local [all...] |
/external/libvpx/libvpx/vp8/common/ |
H A D | onyx.h | 59 static INLINE void Scale2Ratio(int mode, int *hr, int *hs) { argument 63 *hs = 1; 67 *hs = 5; 71 *hs = 5; 75 *hs = 2; 79 *hs = 1;
|
/external/tensorflow/tensorflow/contrib/gan/python/eval/python/ |
H A D | sliced_wasserstein_impl.py | 100 hs = patch_size // 2 102 patch_id, y, x, chan = np.ogrid[0:patch_count, -hs:hs + 1, -hs:hs + 1, 0:3] 106 y = y + np.random.randint(hs, height - hs, size=(patch_count, 1, 1, 1)) 107 x = x + np.random.randint(hs, width - hs, size=(patch_count, 1, 1, 1))
|