/third_party/mbedtls/library/ |
H A D | ssl_tls12_server.c | 205 if (ssl->handshake->curves_tls_id != NULL) { in ssl_parse_supported_groups_ext() 226 ssl->handshake->curves_tls_id = curves_tls_id; in ssl_parse_supported_groups_ext() 267 ssl->handshake->ecdh_ctx.point_format = p[0]; in ssl_parse_supported_point_formats() 271 mbedtls_ecjpake_set_point_format(&ssl->handshake->ecjpake_ctx, in ssl_parse_supported_point_formats() 297 if (ssl->handshake->psa_pake_ctx_is_ok != 1) in ssl_parse_ecjpake_kkpp() 299 if (mbedtls_ecjpake_check(&ssl->handshake->ecjpake_ctx) != 0) in ssl_parse_ecjpake_kkpp() 308 &ssl->handshake->psa_pake_ctx, buf, len, in ssl_parse_ecjpake_kkpp() 310 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_parse_ecjpake_kkpp() 311 psa_pake_abort(&ssl->handshake->psa_pake_ctx); in ssl_parse_ecjpake_kkpp() 322 if ((ret = mbedtls_ecjpake_read_round_one(&ssl->handshake in ssl_parse_ecjpake_kkpp() 2992 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_prepare_server_key_exchange() local 3733 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_parse_client_key_exchange() local 3921 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_parse_client_key_exchange() local [all...] |
H A D | ssl_tls12_client.c | 141 if (ssl->handshake->psa_pake_ctx_is_ok != 1) { in ssl_write_ecjpake_kkpp_ext() 145 if (mbedtls_ecjpake_check(&ssl->handshake->ecjpake_ctx) != 0) { in ssl_write_ecjpake_kkpp_ext() 163 if (ssl->handshake->ecjpake_cache == NULL || in ssl_write_ecjpake_kkpp_ext() 164 ssl->handshake->ecjpake_cache_len == 0) { in ssl_write_ecjpake_kkpp_ext() 168 ret = mbedtls_psa_ecjpake_write_round(&ssl->handshake->psa_pake_ctx, in ssl_write_ecjpake_kkpp_ext() 172 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_write_ecjpake_kkpp_ext() 173 psa_pake_abort(&ssl->handshake->psa_pake_ctx); in ssl_write_ecjpake_kkpp_ext() 178 ret = mbedtls_ecjpake_write_round_one(&ssl->handshake->ecjpake_ctx, in ssl_write_ecjpake_kkpp_ext() 188 ssl->handshake->ecjpake_cache = mbedtls_calloc(1, kkpp_len); in ssl_write_ecjpake_kkpp_ext() 189 if (ssl->handshake in ssl_write_ecjpake_kkpp_ext() 1717 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_parse_server_ecdh_params() local 2761 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_write_client_key_exchange() local 2901 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_write_client_key_exchange() local [all...] |
H A D | ssl_tls13_keys.c | 661 * In the handshake stage, ssl_tls13_generate_application_keys() 662 * can be used to derive the handshake traffic keys. 674 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_tls13_key_schedule_stage_application() local 676 (mbedtls_md_type_t) handshake->ciphersuite_info->mac); in ssl_tls13_key_schedule_stage_application() 683 handshake->tls13_master_secrets.handshake, in ssl_tls13_key_schedule_stage_application() 685 handshake->tls13_master_secrets.app); in ssl_tls13_key_schedule_stage_application() 693 handshake->tls13_master_secrets.app, PSA_HASH_LENGTH(hash_alg)); in ssl_tls13_key_schedule_stage_application() 786 &ssl->handshake in mbedtls_ssl_tls13_calculate_verify_data() 1147 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_generate_early_key() local 1237 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_compute_early_transform() local 1280 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_key_schedule_stage_early() local 1347 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_generate_handshake_keys() local 1469 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_key_schedule_stage_handshake() local 1578 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_generate_application_keys() local 1702 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_compute_handshake_transform() local 1751 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_compute_resumption_master_secret() local [all...] |
H A D | ssl_tls13_client.c | 52 unsigned char versions_len = (ssl->handshake->min_tls_version <= in ssl_tls13_write_supported_versions_ext() 83 if (ssl->handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_2) { in ssl_tls13_write_supported_versions_ext() 177 uint16_t group_id = ssl->handshake->offered_group_id; in ssl_tls13_reset_key_share() 190 status = psa_destroy_key(ssl->handshake->xxdh_psa_privkey); in ssl_tls13_reset_key_share() 197 ssl->handshake->xxdh_psa_privkey = MBEDTLS_SVC_KEY_ID_INIT; in ssl_tls13_reset_key_share() 288 group_id = ssl->handshake->offered_group_id; in ssl_tls13_write_key_share_ext() 351 ssl->handshake->offered_group_id = group_id; in ssl_tls13_write_key_share_ext() 404 * then the client MUST abort the handshake with an "illegal_parameter" alert. in ssl_tls13_parse_hrr_key_share_ext() 429 * ClientHello then the client MUST abort the handshake with in ssl_tls13_parse_hrr_key_share_ext() 432 if (found == 0 || selected_group == ssl->handshake in ssl_tls13_parse_hrr_key_share_ext() 535 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_cookie_ext() local 569 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_write_cookie_ext() local 1445 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_preprocess_server_hello() local 1593 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_server_hello() local 1860 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_postprocess_server_hello() local 2071 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_encrypted_extensions() local 2189 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_process_encrypted_extensions() local 2401 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_certificate_request() local 2766 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_new_session_ticket_exts() local [all...] |
H A D | ssl_client.c | 357 ssl->handshake->min_tls_version, in ssl_write_client_hello_cipher_suites() 443 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_write_client_hello_body() local 455 (handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_2) in ssl_write_client_hello_body() 461 (handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_3) in ssl_write_client_hello_body() 481 * the handshake->randbytes buffer and are copied here into the output in ssl_write_client_hello_body() 485 memcpy(p, handshake->randbytes, MBEDTLS_CLIENT_HELLO_RANDOM_LEN); in ssl_write_client_hello_body() 527 if (handshake->cookie != NULL) { in ssl_write_client_hello_body() 529 handshake->cookie, in ssl_write_client_hello_body() 530 handshake in ssl_write_client_hello_body() [all...] |
H A D | ssl_tls13_server.c | 146 ssl->handshake->tls13_kex_modes = ke_modes; in ssl_tls13_parse_key_exchange_modes_ext() 167 * pre-shared-key: if the binder check fails, we fail the handshake and we do 421 /* Get current state of handshake transcript. */ in ssl_tls13_offered_psks_check_binder_match() 561 ret = ssl->handshake->update_checksum(ssl, pre_shared_key_ext, in ssl_tls13_parse_pre_shared_key_ext() 659 * abort the handshake with a decrypt_error alert. in ssl_tls13_parse_pre_shared_key_ext() 671 /* For security reasons, the handshake should be aborted when we in ssl_tls13_parse_pre_shared_key_ext() 707 /* Update the handshake transcript with the binder list. */ in ssl_tls13_parse_pre_shared_key_ext() 708 ret = ssl->handshake->update_checksum( in ssl_tls13_parse_pre_shared_key_ext() 719 ssl->handshake->selected_identity = (uint16_t) matched_identity; in ssl_tls13_parse_pre_shared_key_ext() 745 not_using_psk = (mbedtls_svc_key_id_is_null(ssl->handshake in ssl_tls13_write_server_pre_shared_key_ext() 1266 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_parse_client_hello() local 1797 mbedtls_ssl_handshake_params *handshake = ssl->handshake; ssl_tls13_check_early_data_requirements() local [all...] |
H A D | ssl_tls.c | 789 ssl->handshake->update_checksum = ssl_update_checksum_sha384; in mbedtls_ssl_optimize_checksum() 794 ssl->handshake->update_checksum = ssl_update_checksum_sha256; in mbedtls_ssl_optimize_checksum() 815 return ssl->handshake->update_checksum(ssl, hs_hdr, sizeof(hs_hdr)); in mbedtls_ssl_add_hs_hdr_to_checksum() 828 return ssl->handshake->update_checksum(ssl, msg, msg_len); in mbedtls_ssl_add_hs_msg_to_checksum() 845 status = psa_hash_abort(&ssl->handshake->fin_sha256_psa); in mbedtls_ssl_reset_checksum() 849 status = psa_hash_setup(&ssl->handshake->fin_sha256_psa, PSA_ALG_SHA_256); in mbedtls_ssl_reset_checksum() 854 mbedtls_md_free(&ssl->handshake->fin_sha256); in mbedtls_ssl_reset_checksum() 855 mbedtls_md_init(&ssl->handshake->fin_sha256); in mbedtls_ssl_reset_checksum() 856 ret = mbedtls_md_setup(&ssl->handshake->fin_sha256, in mbedtls_ssl_reset_checksum() 862 ret = mbedtls_md_starts(&ssl->handshake in mbedtls_ssl_reset_checksum() 965 ssl_handshake_params_init(mbedtls_ssl_handshake_params *handshake) ssl_handshake_params_init() argument 4752 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_handshake_free() local 6965 ssl_set_handshake_prfs(mbedtls_ssl_handshake_params *handshake, mbedtls_md_type_t hash) ssl_set_handshake_prfs() argument 7008 ssl_compute_master(mbedtls_ssl_handshake_params *handshake, unsigned char *master, const mbedtls_ssl_context *ssl) ssl_compute_master() argument [all...] |
H A D | ssl_tls13_generic.c | 63 MBEDTLS_SSL_DEBUG_MSG(1, ("Receive unexpected handshake message.")); in mbedtls_ssl_tls13_fetch_handshake_msg() 71 * Jump handshake header (4 bytes, see Section 4 of RFC 8446). in mbedtls_ssl_tls13_fetch_handshake_msg() 254 * certificates and decides to abort the handshake, then it MUST abort the in ssl_tls13_parse_certificate_verify() 255 * handshake with an appropriate certificate-related alert in ssl_tls13_parse_certificate_verify() 326 * If the verification fails, the receiver MUST terminate the handshake in ssl_tls13_parse_certificate_verify() 360 (mbedtls_md_type_t) ssl->handshake->ciphersuite_info->mac, in mbedtls_ssl_tls13_process_certificate_verify() 370 MBEDTLS_SSL_DEBUG_BUF(3, "handshake hash", transcript, transcript_len); in mbedtls_ssl_tls13_process_certificate_verify() 449 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_tls13_parse_certificate() local 552 handshake in mbedtls_ssl_tls13_parse_certificate() 1570 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_read_public_xxdhe_share() local 1645 mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_tls13_generate_and_write_xxdh_key_exchange() local [all...] |
H A D | ssl_msg.c | 485 if (ssl->handshake->retransmit_timeout >= ssl->conf->hs_timeout_max) { in ssl_double_retransmit_timeout() 495 if (ssl->handshake->retransmit_timeout != ssl->conf->hs_timeout_min) { in ssl_double_retransmit_timeout() 496 ssl->handshake->mtu = 508; in ssl_double_retransmit_timeout() 497 MBEDTLS_SSL_DEBUG_MSG(2, ("mtu autoreduction to %d bytes", ssl->handshake->mtu)); in ssl_double_retransmit_timeout() 500 new_timeout = 2 * ssl->handshake->retransmit_timeout; in ssl_double_retransmit_timeout() 503 if (new_timeout < ssl->handshake->retransmit_timeout || in ssl_double_retransmit_timeout() 508 ssl->handshake->retransmit_timeout = new_timeout; in ssl_double_retransmit_timeout() 510 (unsigned long) ssl->handshake->retransmit_timeout)); in ssl_double_retransmit_timeout() 517 ssl->handshake->retransmit_timeout = ssl->conf->hs_timeout_min; in ssl_reset_retransmit_timeout() 519 (unsigned long) ssl->handshake in ssl_reset_retransmit_timeout() [all...] |
H A D | ssl_misc.h | 65 /* Faked handshake message identity for HelloRetryRequest. */ 69 * Internal identity of handshake extensions 113 * extensions should result in handshake abortion. Messages containing 126 * not specified for the message in which it appears, it MUST abort the handshake 327 /* The maximum number of buffered handshake messages. */ 639 * This structure contains the parameters only needed during handshake. 672 * For a fresh handshake not linked to any previous handshake, it is 677 * There is no maximum TLS version field in this handshake context. 678 * From the start of the handshake, w 1007 unsigned char handshake[MBEDTLS_TLS1_3_MD_MAX_SIZE]; global() member [all...] |
/third_party/libwebsockets/contrib/ |
H A D | Android.mk | 15 $(LWS_LIB_PATH)/client-handshake.c \ 22 $(LWS_LIB_PATH)/handshake.c \
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
H A D | ssl_methods.h | 29 handshake, shutdown, clear, \ 38 handshake, \
|
/third_party/curl/lib/ |
H A D | cf-h1-proxy.c | 580 hyper_task *handshake = NULL; in start_CONNECT() local 581 hyper_task *task = NULL; /* for the handshake */ in start_CONNECT() 626 handshake = hyper_clientconn_handshake(io, options); in start_CONNECT() 627 if(!handshake) { in start_CONNECT() 628 failf(data, "Couldn't create hyper client handshake"); in start_CONNECT() 635 if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { in start_CONNECT() 636 failf(data, "Couldn't hyper_executor_push the handshake"); in start_CONNECT() 640 handshake = NULL; /* ownership passed on */ in start_CONNECT() 644 failf(data, "Couldn't hyper_executor_poll the handshake"); in start_CONNECT() 777 if(handshake) in start_CONNECT() [all...] |
H A D | c-hyper.c | 871 hyper_task *task = NULL; /* for the handshake */ in Curl_http() 876 hyper_task *handshake = NULL; in Curl_http() local 967 handshake = hyper_clientconn_handshake(io, options); in Curl_http() 968 if(!handshake) { in Curl_http() 969 failf(data, "Couldn't create hyper client handshake"); in Curl_http() 976 if(HYPERE_OK != hyper_executor_push(h->exec, handshake)) { in Curl_http() 977 failf(data, "Couldn't hyper_executor_push the handshake"); in Curl_http() 981 handshake = NULL; /* ownership passed on */ in Curl_http() 985 failf(data, "Couldn't hyper_executor_poll the handshake"); in Curl_http() 1217 if(handshake) in Curl_http() [all...] |
/third_party/node/test/common/ |
H A D | tls.js | 23 this.on('handshake', (msg) => { 48 this.emit('handshake', msg); 61 this.emit('handshake', msg); 72 this.emit('handshake', msg); 107 const handshake = buf.slice(0, offset + length); 108 this.emit('handshake', handshake);
|
/third_party/curl/lib/vtls/ |
H A D | gtls.c | 212 /* this function does a SSL/TLS (re-)handshake */ 213 static CURLcode handshake(struct Curl_cfilter *cf, in handshake() function 1341 rc = handshake(cf, data, TRUE, nonblocking); in gtls_connect_common() 1343 /* handshake() sets its own error message with failf() */ in gtls_connect_common() 1348 /* Finish connecting once the handshake is done */ in gtls_connect_common() 1570 CURLcode result = handshake(cf, data, FALSE, FALSE); in gtls_recv() 1572 /* handshake() writes error message on its own */ in gtls_recv()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
H A D | ssl_lib.c | 388 * @brief perform the SSL handshake 396 ret = SSL_METHOD_CALL(handshake, ssl); in SSL_do_handshake()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_server2.c | 382 " range of DTLS handshake timeouts in millisecs\n" \ 680 uint32_t hs_to_min; /* Initial value of DTLS handshake timer */ 681 uint32_t hs_to_max; /* Max value of DTLS handshake timer */ 1604 /*! master keys and master salt for SRTP generated during handshake */ in main() 2061 * should always perform `ephemeral` handshake. `psk` or `psk_ephemeral` in main() 3335 goto handshake; in main() 3443 * if being set per-handshake using mbedtls_ssl_set_hs_dn_hints()) */ in main() 3455 handshake: in main() 3456 mbedtls_printf(" . Performing the SSL/TLS handshake..."); in main() 3694 ret = report_cid_usage(&ssl, "initial handshake"); in main() [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | mod.rs | 320 /// handshake. 394 /// On the server side, abort the handshake if the client did not send a certificate. 570 /// Abort the handshake with a fatal alert. 573 /// Send a warning alert to the client and continue the handshake. 599 /// Terminate the handshake with a fatal alert. 605 /// Do not select a protocol, but continue the handshake. 618 /// Continue the handshake. 621 /// Return from the handshake with an `ErrorCode::WANT_CLIENT_HELLO_CB` error. 951 /// handshake and need to be restarted. 1318 /// `Ok(false)` indicates that the OCSP status is invalid and the handshake shoul 3438 pub fn handshake(mut self) -> Result<SslStream<S>, HandshakeError<S>> { handshake() functions 3946 pub fn handshake(mut self) -> Result<SslStream<S>, HandshakeError<S>> { handshake() functions [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 83 /** Processing of the Certificate handshake message failed. */ 94 * Early data has been received as part of an on-going handshake. 99 * early data has been received as part of the handshake sequence they 119 /** The handshake negotiation failed. */ 361 * - attempting to deprotect received records using the handshake traffic 365 * server proceeds as with an ordinary 1-RTT handshake. 405 * DTLS handshake message reassembly and future message buffering. 521 * Message, alert and handshake types 946 * This callback is called during an SSL handshake to start 954 * the handshake ste [all...] |
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 923 /* If /p second_ssl ends the handshake procedure before /p ssl then in mbedtls_test_move_handshake_to_state() 2008 /* forced_ciphersuite needs to last until the end of the handshake */ in mbedtls_test_ssl_perform_handshake() 2281 /* After calling this function for the server, it only sends a handshake in mbedtls_test_ssl_perform_handshake() 2540 TEST_EQUAL(server_ep.ssl.handshake->new_session_tickets_count, 0); in mbedtls_test_get_tls13_ticket()
|