Home
last modified time | relevance | path

Searched refs:handshake (Results 1 - 21 of 21) sorted by relevance

/third_party/mbedtls/library/
H A Dssl_tls12_server.c205 if (ssl->handshake->curves_tls_id != NULL) { in ssl_parse_supported_groups_ext()
226 ssl->handshake->curves_tls_id = curves_tls_id; in ssl_parse_supported_groups_ext()
267 ssl->handshake->ecdh_ctx.point_format = p[0]; in ssl_parse_supported_point_formats()
271 mbedtls_ecjpake_set_point_format(&ssl->handshake->ecjpake_ctx, in ssl_parse_supported_point_formats()
297 if (ssl->handshake->psa_pake_ctx_is_ok != 1) in ssl_parse_ecjpake_kkpp()
299 if (mbedtls_ecjpake_check(&ssl->handshake->ecjpake_ctx) != 0) in ssl_parse_ecjpake_kkpp()
308 &ssl->handshake->psa_pake_ctx, buf, len, in ssl_parse_ecjpake_kkpp()
310 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_parse_ecjpake_kkpp()
311 psa_pake_abort(&ssl->handshake->psa_pake_ctx); in ssl_parse_ecjpake_kkpp()
322 if ((ret = mbedtls_ecjpake_read_round_one(&ssl->handshake in ssl_parse_ecjpake_kkpp()
2992 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_prepare_server_key_exchange() local
3733 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_parse_client_key_exchange() local
3921 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_parse_client_key_exchange() local
[all...]
H A Dssl_tls12_client.c141 if (ssl->handshake->psa_pake_ctx_is_ok != 1) { in ssl_write_ecjpake_kkpp_ext()
145 if (mbedtls_ecjpake_check(&ssl->handshake->ecjpake_ctx) != 0) { in ssl_write_ecjpake_kkpp_ext()
163 if (ssl->handshake->ecjpake_cache == NULL || in ssl_write_ecjpake_kkpp_ext()
164 ssl->handshake->ecjpake_cache_len == 0) { in ssl_write_ecjpake_kkpp_ext()
168 ret = mbedtls_psa_ecjpake_write_round(&ssl->handshake->psa_pake_ctx, in ssl_write_ecjpake_kkpp_ext()
172 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_write_ecjpake_kkpp_ext()
173 psa_pake_abort(&ssl->handshake->psa_pake_ctx); in ssl_write_ecjpake_kkpp_ext()
178 ret = mbedtls_ecjpake_write_round_one(&ssl->handshake->ecjpake_ctx, in ssl_write_ecjpake_kkpp_ext()
188 ssl->handshake->ecjpake_cache = mbedtls_calloc(1, kkpp_len); in ssl_write_ecjpake_kkpp_ext()
189 if (ssl->handshake in ssl_write_ecjpake_kkpp_ext()
1717 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_parse_server_ecdh_params() local
2761 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_write_client_key_exchange() local
2901 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_write_client_key_exchange() local
[all...]
H A Dssl_tls13_keys.c661 * In the handshake stage, ssl_tls13_generate_application_keys()
662 * can be used to derive the handshake traffic keys.
674 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_tls13_key_schedule_stage_application() local
676 (mbedtls_md_type_t) handshake->ciphersuite_info->mac); in ssl_tls13_key_schedule_stage_application()
683 handshake->tls13_master_secrets.handshake, in ssl_tls13_key_schedule_stage_application()
685 handshake->tls13_master_secrets.app); in ssl_tls13_key_schedule_stage_application()
693 handshake->tls13_master_secrets.app, PSA_HASH_LENGTH(hash_alg)); in ssl_tls13_key_schedule_stage_application()
786 &ssl->handshake in mbedtls_ssl_tls13_calculate_verify_data()
1147 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_generate_early_key() local
1237 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_compute_early_transform() local
1280 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_key_schedule_stage_early() local
1347 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_generate_handshake_keys() local
1469 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_key_schedule_stage_handshake() local
1578 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_generate_application_keys() local
1702 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_compute_handshake_transform() local
1751 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_compute_resumption_master_secret() local
[all...]
H A Dssl_tls13_client.c52 unsigned char versions_len = (ssl->handshake->min_tls_version <= in ssl_tls13_write_supported_versions_ext()
83 if (ssl->handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_2) { in ssl_tls13_write_supported_versions_ext()
177 uint16_t group_id = ssl->handshake->offered_group_id; in ssl_tls13_reset_key_share()
190 status = psa_destroy_key(ssl->handshake->xxdh_psa_privkey); in ssl_tls13_reset_key_share()
197 ssl->handshake->xxdh_psa_privkey = MBEDTLS_SVC_KEY_ID_INIT; in ssl_tls13_reset_key_share()
288 group_id = ssl->handshake->offered_group_id; in ssl_tls13_write_key_share_ext()
351 ssl->handshake->offered_group_id = group_id; in ssl_tls13_write_key_share_ext()
404 * then the client MUST abort the handshake with an "illegal_parameter" alert. in ssl_tls13_parse_hrr_key_share_ext()
429 * ClientHello then the client MUST abort the handshake with in ssl_tls13_parse_hrr_key_share_ext()
432 if (found == 0 || selected_group == ssl->handshake in ssl_tls13_parse_hrr_key_share_ext()
535 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_cookie_ext() local
569 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_write_cookie_ext() local
1445 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_preprocess_server_hello() local
1593 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_server_hello() local
1860 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_postprocess_server_hello() local
2071 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_encrypted_extensions() local
2189 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_process_encrypted_extensions() local
2401 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_certificate_request() local
2766 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_new_session_ticket_exts() local
[all...]
H A Dssl_client.c357 ssl->handshake->min_tls_version, in ssl_write_client_hello_cipher_suites()
443 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_write_client_hello_body() local
455 (handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_2) in ssl_write_client_hello_body()
461 (handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_3) in ssl_write_client_hello_body()
481 * the handshake->randbytes buffer and are copied here into the output in ssl_write_client_hello_body()
485 memcpy(p, handshake->randbytes, MBEDTLS_CLIENT_HELLO_RANDOM_LEN); in ssl_write_client_hello_body()
527 if (handshake->cookie != NULL) { in ssl_write_client_hello_body()
529 handshake->cookie, in ssl_write_client_hello_body()
530 handshake in ssl_write_client_hello_body()
[all...]
H A Dssl_tls13_server.c146 ssl->handshake->tls13_kex_modes = ke_modes; in ssl_tls13_parse_key_exchange_modes_ext()
167 * pre-shared-key: if the binder check fails, we fail the handshake and we do
421 /* Get current state of handshake transcript. */ in ssl_tls13_offered_psks_check_binder_match()
561 ret = ssl->handshake->update_checksum(ssl, pre_shared_key_ext, in ssl_tls13_parse_pre_shared_key_ext()
659 * abort the handshake with a decrypt_error alert. in ssl_tls13_parse_pre_shared_key_ext()
671 /* For security reasons, the handshake should be aborted when we in ssl_tls13_parse_pre_shared_key_ext()
707 /* Update the handshake transcript with the binder list. */ in ssl_tls13_parse_pre_shared_key_ext()
708 ret = ssl->handshake->update_checksum( in ssl_tls13_parse_pre_shared_key_ext()
719 ssl->handshake->selected_identity = (uint16_t) matched_identity; in ssl_tls13_parse_pre_shared_key_ext()
745 not_using_psk = (mbedtls_svc_key_id_is_null(ssl->handshake in ssl_tls13_write_server_pre_shared_key_ext()
1266 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_client_hello() local
1797 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_check_early_data_requirements() local
[all...]
H A Dssl_tls.c789 ssl->handshake->update_checksum = ssl_update_checksum_sha384; in mbedtls_ssl_optimize_checksum()
794 ssl->handshake->update_checksum = ssl_update_checksum_sha256; in mbedtls_ssl_optimize_checksum()
815 return ssl->handshake->update_checksum(ssl, hs_hdr, sizeof(hs_hdr)); in mbedtls_ssl_add_hs_hdr_to_checksum()
828 return ssl->handshake->update_checksum(ssl, msg, msg_len); in mbedtls_ssl_add_hs_msg_to_checksum()
845 status = psa_hash_abort(&ssl->handshake->fin_sha256_psa); in mbedtls_ssl_reset_checksum()
849 status = psa_hash_setup(&ssl->handshake->fin_sha256_psa, PSA_ALG_SHA_256); in mbedtls_ssl_reset_checksum()
854 mbedtls_md_free(&ssl->handshake->fin_sha256); in mbedtls_ssl_reset_checksum()
855 mbedtls_md_init(&ssl->handshake->fin_sha256); in mbedtls_ssl_reset_checksum()
856 ret = mbedtls_md_setup(&ssl->handshake->fin_sha256, in mbedtls_ssl_reset_checksum()
862 ret = mbedtls_md_starts(&ssl->handshake in mbedtls_ssl_reset_checksum()
965 ssl_handshake_params_init(mbedtls_ssl_handshake_params *handshake) ssl_handshake_params_init() argument
4752 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_handshake_free() local
6965 ssl_set_handshake_prfs(mbedtls_ssl_handshake_params *handshake, mbedtls_md_type_t hash) ssl_set_handshake_prfs() argument
7008 ssl_compute_master(mbedtls_ssl_handshake_params *handshake, unsigned char *master, const mbedtls_ssl_context *ssl) ssl_compute_master() argument
[all...]
H A Dssl_tls13_generic.c63 MBEDTLS_SSL_DEBUG_MSG(1, ("Receive unexpected handshake message.")); in mbedtls_ssl_tls13_fetch_handshake_msg()
71 * Jump handshake header (4 bytes, see Section 4 of RFC 8446). in mbedtls_ssl_tls13_fetch_handshake_msg()
254 * certificates and decides to abort the handshake, then it MUST abort the in ssl_tls13_parse_certificate_verify()
255 * handshake with an appropriate certificate-related alert in ssl_tls13_parse_certificate_verify()
326 * If the verification fails, the receiver MUST terminate the handshake in ssl_tls13_parse_certificate_verify()
360 (mbedtls_md_type_t) ssl->handshake->ciphersuite_info->mac, in mbedtls_ssl_tls13_process_certificate_verify()
370 MBEDTLS_SSL_DEBUG_BUF(3, "handshake hash", transcript, transcript_len); in mbedtls_ssl_tls13_process_certificate_verify()
449 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_tls13_parse_certificate() local
552 handshake in mbedtls_ssl_tls13_parse_certificate()
1570 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_read_public_xxdhe_share() local
1645 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_generate_and_write_xxdh_key_exchange() local
[all...]
H A Dssl_msg.c485 if (ssl->handshake->retransmit_timeout >= ssl->conf->hs_timeout_max) { in ssl_double_retransmit_timeout()
495 if (ssl->handshake->retransmit_timeout != ssl->conf->hs_timeout_min) { in ssl_double_retransmit_timeout()
496 ssl->handshake->mtu = 508; in ssl_double_retransmit_timeout()
497 MBEDTLS_SSL_DEBUG_MSG(2, ("mtu autoreduction to %d bytes", ssl->handshake->mtu)); in ssl_double_retransmit_timeout()
500 new_timeout = 2 * ssl->handshake->retransmit_timeout; in ssl_double_retransmit_timeout()
503 if (new_timeout < ssl->handshake->retransmit_timeout || in ssl_double_retransmit_timeout()
508 ssl->handshake->retransmit_timeout = new_timeout; in ssl_double_retransmit_timeout()
510 (unsigned long) ssl->handshake->retransmit_timeout)); in ssl_double_retransmit_timeout()
517 ssl->handshake->retransmit_timeout = ssl->conf->hs_timeout_min; in ssl_reset_retransmit_timeout()
519 (unsigned long) ssl->handshake in ssl_reset_retransmit_timeout()
[all...]
H A Dssl_misc.h65 /* Faked handshake message identity for HelloRetryRequest. */
69 * Internal identity of handshake extensions
113 * extensions should result in handshake abortion. Messages containing
126 * not specified for the message in which it appears, it MUST abort the handshake
327 /* The maximum number of buffered handshake messages. */
639 * This structure contains the parameters only needed during handshake.
672 * For a fresh handshake not linked to any previous handshake, it is
677 * There is no maximum TLS version field in this handshake context.
678 * From the start of the handshake, w
1007 unsigned char handshake[MBEDTLS_TLS1_3_MD_MAX_SIZE]; global() member
[all...]
/third_party/libwebsockets/contrib/
H A DAndroid.mk15 $(LWS_LIB_PATH)/client-handshake.c \
22 $(LWS_LIB_PATH)/handshake.c \
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/
H A Dssl_methods.h29 handshake, shutdown, clear, \
38 handshake, \
/third_party/curl/lib/
H A Dcf-h1-proxy.c580 hyper_task *handshake = NULL; in start_CONNECT() local
581 hyper_task *task = NULL; /* for the handshake */ in start_CONNECT()
626 handshake = hyper_clientconn_handshake(io, options); in start_CONNECT()
627 if(!handshake) { in start_CONNECT()
628 failf(data, "Couldn't create hyper client handshake"); in start_CONNECT()
635 if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { in start_CONNECT()
636 failf(data, "Couldn't hyper_executor_push the handshake"); in start_CONNECT()
640 handshake = NULL; /* ownership passed on */ in start_CONNECT()
644 failf(data, "Couldn't hyper_executor_poll the handshake"); in start_CONNECT()
777 if(handshake) in start_CONNECT()
[all...]
H A Dc-hyper.c871 hyper_task *task = NULL; /* for the handshake */ in Curl_http()
876 hyper_task *handshake = NULL; in Curl_http() local
967 handshake = hyper_clientconn_handshake(io, options); in Curl_http()
968 if(!handshake) { in Curl_http()
969 failf(data, "Couldn't create hyper client handshake"); in Curl_http()
976 if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { in Curl_http()
977 failf(data, "Couldn't hyper_executor_push the handshake"); in Curl_http()
981 handshake = NULL; /* ownership passed on */ in Curl_http()
985 failf(data, "Couldn't hyper_executor_poll the handshake"); in Curl_http()
1217 if(handshake) in Curl_http()
[all...]
/third_party/node/test/common/
H A Dtls.js23 this.on('handshake', (msg) => {
48 this.emit('handshake', msg);
61 this.emit('handshake', msg);
72 this.emit('handshake', msg);
107 const handshake = buf.slice(0, offset + length);
108 this.emit('handshake', handshake);
/third_party/curl/lib/vtls/
H A Dgtls.c212 /* this function does a SSL/TLS (re-)handshake */
213 static CURLcode handshake(struct Curl_cfilter *cf, in handshake() function
1341 rc = handshake(cf, data, TRUE, nonblocking); in gtls_connect_common()
1343 /* handshake() sets its own error message with failf() */ in gtls_connect_common()
1348 /* Finish connecting once the handshake is done */ in gtls_connect_common()
1570 CURLcode result = handshake(cf, data, FALSE, FALSE); in gtls_recv()
1572 /* handshake() writes error message on its own */ in gtls_recv()
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
H A Dssl_lib.c388 * @brief perform the SSL handshake
396 ret = SSL_METHOD_CALL(handshake, ssl); in SSL_do_handshake()
/third_party/mbedtls/programs/ssl/
H A Dssl_server2.c382 " range of DTLS handshake timeouts in millisecs\n" \
680 uint32_t hs_to_min; /* Initial value of DTLS handshake timer */
681 uint32_t hs_to_max; /* Max value of DTLS handshake timer */
1604 /*! master keys and master salt for SRTP generated during handshake */ in main()
2061 * should always perform `ephemeral` handshake. `psk` or `psk_ephemeral` in main()
3335 goto handshake; in main()
3443 * if being set per-handshake using mbedtls_ssl_set_hs_dn_hints()) */ in main()
3455 handshake: in main()
3456 mbedtls_printf(" . Performing the SSL/TLS handshake..."); in main()
3694 ret = report_cid_usage(&ssl, "initial handshake"); in main()
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
H A Dmod.rs320 /// handshake.
394 /// On the server side, abort the handshake if the client did not send a certificate.
570 /// Abort the handshake with a fatal alert.
573 /// Send a warning alert to the client and continue the handshake.
599 /// Terminate the handshake with a fatal alert.
605 /// Do not select a protocol, but continue the handshake.
618 /// Continue the handshake.
621 /// Return from the handshake with an `ErrorCode::WANT_CLIENT_HELLO_CB` error.
951 /// handshake and need to be restarted.
1318 /// `Ok(false)` indicates that the OCSP status is invalid and the handshake shoul
3438 pub fn handshake(mut self) -> Result<SslStream<S>, HandshakeError<S>> { handshake() functions
3946 pub fn handshake(mut self) -> Result<SslStream<S>, HandshakeError<S>> { handshake() functions
[all...]
/third_party/mbedtls/include/mbedtls/
H A Dssl.h83 /** Processing of the Certificate handshake message failed. */
94 * Early data has been received as part of an on-going handshake.
99 * early data has been received as part of the handshake sequence they
119 /** The handshake negotiation failed. */
361 * - attempting to deprotect received records using the handshake traffic
365 * server proceeds as with an ordinary 1-RTT handshake.
405 * DTLS handshake message reassembly and future message buffering.
521 * Message, alert and handshake types
946 * This callback is called during an SSL handshake to start
954 * the handshake ste
[all...]
/third_party/mbedtls/tests/src/test_helpers/
H A Dssl_helpers.c923 /* If /p second_ssl ends the handshake procedure before /p ssl then in mbedtls_test_move_handshake_to_state()
2008 /* forced_ciphersuite needs to last until the end of the handshake */ in mbedtls_test_ssl_perform_handshake()
2281 /* After calling this function for the server, it only sends a handshake in mbedtls_test_ssl_perform_handshake()
2540 TEST_EQUAL(server_ep.ssl.handshake->new_session_tickets_count, 0); in mbedtls_test_get_tls13_ticket()

Completed in 38 milliseconds