/ssl/ |
A D | ssl_buffer.cc | 122 if (!buf->empty()) { in dtls_read_buffer_next_packet() 131 BIO_read(ssl->rbio.get(), buf->data(), static_cast<int>(buf->cap())); in dtls_read_buffer_next_packet() 143 if (len > buf->cap()) { in tls_read_buffer_extend_to() 152 int ret = BIO_read(ssl->rbio.get(), buf->data() + buf->size(), in tls_read_buffer_extend_to() 261 while (!buf->empty()) { in tls_write_buffer_flush() 262 int ret = BIO_write(ssl->wbio.get(), buf->data(), buf->size()); in tls_write_buffer_flush() 269 buf->Clear(); in tls_write_buffer_flush() 275 if (buf->empty()) { in dtls_write_buffer_flush() 279 int ret = BIO_write(ssl->wbio.get(), buf->data(), buf->size()); in dtls_write_buffer_flush() 285 buf->Clear(); in dtls_write_buffer_flush() [all …]
|
A D | ssl_cert.cc | 172 UniquePtr<CRYPTO_BUFFER> buf( in ssl_parse_cert_chain() local 174 if (!buf || // in ssl_parse_cert_chain() 205 CBS buf = *in; in ssl_cert_skip_to_spki() local 233 CBS buf = *in; in ssl_cert_extract_issuer() local 265 CBS buf = *in, tbs_cert; in ssl_cert_parse_pubkey() local 266 if (!ssl_cert_skip_to_spki(&buf, &tbs_cert)) { in ssl_cert_parse_pubkey() 301 CBS buf = *in; in ssl_cert_check_key_usage() local 609 return buf != nullptr && in SSL_set_signed_cert_timestamp_list() 616 UniquePtr<CRYPTO_BUFFER> buf( in SSL_CTX_set_ocsp_response() local 627 UniquePtr<CRYPTO_BUFFER> buf( in SSL_set_ocsp_response() local [all …]
|
A D | ssl_privkey.cc | 727 char buf[kMaxSignatureAlgorithmNameLen]; in parse_sigalgs_list() local 750 buf[buf_used] = 0; in parse_sigalgs_list() 752 if (strcmp(buf, "RSA") == 0) { in parse_sigalgs_list() 755 strcmp(buf, "PSS") == 0) { in parse_sigalgs_list() 757 } else if (strcmp(buf, "ECDSA") == 0) { in parse_sigalgs_list() 778 buf[buf_used] = 0; in parse_sigalgs_list() 798 if (strcmp(buf, "SHA1") == 0) { in parse_sigalgs_list() 800 } else if (strcmp(buf, "SHA256") == 0) { in parse_sigalgs_list() 802 } else if (strcmp(buf, "SHA384") == 0) { in parse_sigalgs_list() 835 if (buf_used == sizeof(buf) - 1) { in parse_sigalgs_list() [all …]
|
A D | ssl_transcript.cc | 102 CBS buf, header; in HashBuffer() local 103 CBS_init(&buf, reinterpret_cast<uint8_t *>(buffer_->data), buffer_->length); in HashBuffer() 104 if (!CBS_get_bytes(&buf, &header, 4) || // in HashBuffer() 105 !CBS_skip(&buf, 8) || // in HashBuffer() 107 !EVP_DigestUpdate(ctx, CBS_data(&buf), CBS_len(&buf))) { in HashBuffer()
|
A D | d1_pkt.cc | 270 SSLBuffer *buf = &ssl->s3->write_buffer; in dtls1_write_record() local 275 assert(buf->empty()); in dtls1_write_record() 284 if (!buf->EnsureCap(dtls_seal_prefix_len(ssl, epoch), in dtls1_write_record() 286 !dtls_seal_record(ssl, &record_number, buf->remaining().data(), in dtls1_write_record() 287 &ciphertext_len, buf->remaining().size(), type, in dtls1_write_record() 289 buf->Clear(); in dtls1_write_record() 292 buf->DidWrite(ciphertext_len); in dtls1_write_record()
|
A D | s3_pkt.cc | 156 SSLBuffer *buf = &ssl->s3->write_buffer; in do_tls_write() local 157 if (in.size() > SSL3_RT_MAX_PLAIN_LENGTH || buf->size() > 0) { in do_tls_write() 194 if (!buf->EnsureCap(pending_flight.size() + tls_seal_align_prefix_len(ssl), in do_tls_write() 201 OPENSSL_memcpy(buf->remaining().data(), pending_flight.data(), in do_tls_write() 205 buf->DidWrite(pending_flight.size()); in do_tls_write() 210 if (!tls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in do_tls_write() 211 buf->remaining().size(), type, in.data(), in.size())) { in do_tls_write() 214 buf->DidWrite(ciphertext_len); in do_tls_write()
|
A D | ssl_cipher.cc | 553 return strncmp(rule, buf, buf_len) == 0 && rule[buf_len] == '\0'; in rule_equals() 820 const char *l, *buf; in ssl_cipher_process_rulestr() local 898 buf = l; in ssl_cipher_process_rulestr() 921 if (rule_equals(cipher->name, buf, buf_len) || in ssl_cipher_process_rulestr() 922 rule_equals(cipher->standard_name, buf, buf_len)) { in ssl_cipher_process_rulestr() 931 if (rule_equals(kCipherAliases[j].name, buf, buf_len)) { in ssl_cipher_process_rulestr() 973 if (buf_len != 8 || strncmp(buf, "STRENGTH", 8) != 0) { in ssl_cipher_process_rulestr() 1541 if (buf == NULL) { in SSL_CIPHER_description() 1543 buf = (char *)OPENSSL_malloc(len); in SSL_CIPHER_description() 1544 if (buf == NULL) { in SSL_CIPHER_description() [all …]
|
A D | ssl_test.cc | 3191 EXPECT_EQ(-1, SSL_read(ssl, buf, sizeof(buf))); in TEST_P() 4453 ERR_error_string_n(err, buf, sizeof(buf)); in ExpectSingleError() 6281 snprintf(buf, sizeof(buf) - 1, "0x%02x", v); in SigAlgsToString() 6282 buf[sizeof(buf) - 1] = 0; in SigAlgsToString() 8565 ASSERT_EQ(int(sizeof(buf)), SSL_read(server.get(), buf, sizeof(buf))); in TEST() 8573 ASSERT_EQ(int(sizeof(buf)), SSL_read(server.get(), buf, sizeof(buf))); in TEST() 8578 ASSERT_EQ(int(sizeof(buf)), SSL_read(server.get(), buf, sizeof(buf))); in TEST() 9839 ret = SSL_read(client.get(), buf, sizeof(buf)); in TEST() 9891 ret = SSL_read(client.get(), buf, sizeof(buf)); in TEST() 9896 ret = SSL_read(client.get(), buf, sizeof(buf)); in TEST() [all …]
|
A D | ssl_lib.cc | 910 int SSL_read(SSL *ssl, void *buf, int num) { in SSL_read() argument 911 int ret = SSL_peek(ssl, buf, num); in SSL_read() 925 int SSL_peek(SSL *ssl, void *buf, int num) { in SSL_peek() argument 940 OPENSSL_memcpy(buf, ssl->s3->pending_app_data.data(), todo); in SSL_peek() 944 int SSL_write(SSL *ssl, const void *buf, int num) { in SSL_write() argument 1519 size_t SSL_get_finished(const SSL *ssl, void *buf, size_t count) { in SSL_get_finished() argument 1529 return copy_finished(buf, count, ssl->s3->previous_client_finished); in SSL_get_finished() 2512 char *SSL_get_shared_ciphers(const SSL *ssl, char *buf, int len) { in SSL_get_shared_ciphers() argument 2516 buf[0] = '\0'; in SSL_get_shared_ciphers() 2517 return buf; in SSL_get_shared_ciphers() [all …]
|
A D | d1_both.cc | 983 uint8_t buf[2 + 16 * DTLS_MAX_ACK_BUFFER]; in send_ack() local 985 CBB_init_fixed(&cbb, buf, sizeof(buf)); in send_ack() 994 uint8_t record[DTLS1_3_RECORD_HEADER_WRITE_LENGTH + sizeof(buf) + in send_ack()
|
A D | tls13_both.cc | 223 UniquePtr<CRYPTO_BUFFER> buf( in tls13_process_certificate() local 225 if (!buf || // in tls13_process_certificate() 226 !PushToStack(certs.get(), std::move(buf))) { in tls13_process_certificate()
|
A D | ssl_x509.cc | 50 uint8_t *buf = NULL; in x509_to_buffer() local 51 int cert_len = i2d_X509(x509, &buf); in x509_to_buffer() 56 UniquePtr<CRYPTO_BUFFER> buffer(CRYPTO_BUFFER_new(buf, cert_len, NULL)); in x509_to_buffer() 57 OPENSSL_free(buf); in x509_to_buffer()
|
/ssl/test/ |
A D | packeted_bio.cc | 153 uint8_t buf[8]; in PacketedRead() local 154 ret = ReadAll(next, buf, sizeof(buf)); in PacketedRead() 159 uint64_t timeout = CRYPTO_load_u64_be(buf); in PacketedRead() 178 uint8_t buf[4]; in PacketedRead() local 179 ret = ReadAll(next, buf, sizeof(buf)); in PacketedRead() 184 uint32_t mtu = CRYPTO_load_u32_be(buf); in PacketedRead() 194 uint8_t buf[8]; in PacketedRead() local 195 ret = ReadAll(next, buf, sizeof(buf)); in PacketedRead() 251 ret = ReadAll(next, buf.data(), buf.size()); in PacketedRead() 258 outl = static_cast<int>(buf.size()); in PacketedRead() [all …]
|
A D | mock_quic_transport.cc | 53 uint8_t *buf = out.data(); in ReadAll() local 60 buf += ret; in ReadAll() 163 std::vector<uint8_t> buf(len); in ReadHandshake() local 164 if (!ReadAll(bio_.get(), bssl::Span(buf))) { in ReadHandshake() 167 return SSL_provide_quic_data(ssl_, level, buf.data(), buf.size()); in ReadHandshake() 201 std::vector<uint8_t> buf(len); in ReadApplicationData() local 202 if (!ReadAll(bio_.get(), bssl::Span(buf))) { in ReadApplicationData() 205 if (SSL_provide_quic_data(ssl_, level, buf.data(), buf.size()) != 1) { in ReadApplicationData() 222 uint8_t *buf = out; in ReadApplicationData() local 225 buf = pending_app_data_.data(); in ReadApplicationData() [all …]
|
A D | handshake_util.cc | 141 char buf[256]; in CheckIdempotentError() local 142 ERR_error_string_n(err, buf, sizeof(buf)); in CheckIdempotentError() 143 fprintf(stderr, "Wanted: %d %d %s\n", ret, ssl_err, buf); in CheckIdempotentError() 144 ERR_error_string_n(err2, buf, sizeof(buf)); in CheckIdempotentError() 213 char buf[64]; in Proxy() local 216 (bytes = read_eintr(wfd, buf, sizeof(buf))) > 0) { in Proxy() 217 char *b = buf; in Proxy() 561 std::vector<uint8_t> buf(kBufSize); in RunHandshaker() local 562 ssize_t len = read_eintr(control.fd(), buf.data(), buf.size()); in RunHandshaker() 567 buf.resize(len); in RunHandshaker() [all …]
|
A D | settings_writer.cc | 33 char buf[DECIMAL_SIZE(int)]; in Init() local 34 snprintf(buf, sizeof(buf), "%d", i); in Init() 35 path_ = config->write_settings + buf; in Init()
|
A D | bssl_shim.cc | 124 char buf[1024]; in reset() local 125 if (recv(sock_, buf, sizeof(buf), 0) <= 0) { in reset() 224 uint8_t buf; in DoRead() local 236 int ret2 = SSL_peek(ssl, buf.get(), ret); in DoRead() 243 ret2 = SSL_read(ssl, buf.get(), ret); in DoRead() 1142 auto buf = std::make_unique<uint8_t[]>(kBufLen); in DoExchange() local 1143 OPENSSL_memset(buf.get(), 0x42, kBufLen); in DoExchange() 1152 if (WriteAll(ssl, buf.get(), len) < 0) { in DoExchange() 1199 int n = DoRead(ssl, buf.get(), read_size); in DoExchange() 1251 buf[i] ^= 0xff; in DoExchange() [all …]
|
A D | test_config.cc | 1529 bssl::UniquePtr<CRYPTO_BUFFER> buf( in CredentialFromConfig() local 1532 if (buf == nullptr || in CredentialFromConfig() 1539 bssl::UniquePtr<CRYPTO_BUFFER> buf( in CredentialFromConfig() local 1542 if (buf == nullptr || in CredentialFromConfig() 1549 bssl::UniquePtr<CRYPTO_BUFFER> buf( in CredentialFromConfig() local 1553 cred.get(), buf.get())) { in CredentialFromConfig() 1621 auto buf = std::make_unique<uint8_t[]>(in.size() / 2); in HexDecode() local 1628 buf[i] = (high << 4) | low; in HexDecode() 2125 buf[0] = 0; in SetupCtx() 2126 buf[1] = 0; in SetupCtx() [all …]
|
A D | fuzzer.h | 318 int TestOneInput(const uint8_t *buf, size_t len) { in TestOneInput() argument 324 CBS_init(&cbs, buf, len); in TestOneInput()
|
/ssl/test/runner/ |
A D | deterministic.go | 30 func (d *deterministicRand) Read(buf []byte) (int, error) { 31 clear(buf) 38 cipher.XORKeyStream(buf, buf) 40 return len(buf), nil
|
A D | recordingconn.go | 59 buf := make([]byte, len(data)) 60 copy(buf, data) 61 r.flows = append(r.flows, flow{flowType, message, buf})
|
A D | runner.go | 1014 buf := make([]byte, len(shimPrefix)) 1015 _, err := io.ReadFull(tlsConn, buf) 1019 if string(buf) != shimPrefix { 1108 buf := make([]byte, len(shimPrefix)) 1109 _, err := io.ReadFull(tlsConn, buf) 1113 if string(buf) != shimPrefix { 1132 buf := make([]byte, len(testMessage)) 1134 bufTmp := make([]byte, len(buf)+1) 1146 if n != len(buf) { 1149 copy(buf, bufTmp) [all …]
|
A D | shim_dispatcher.go | 93 var buf [8]byte 94 if _, err := io.ReadFull(conn, buf[:]); err != nil { 99 shimID := binary.LittleEndian.Uint64(buf[:])
|
A D | conn.go | 900 buf := c.rawInput.AvailableBuffer() 901 nread, err := io.ReadAtLeast(c.conn, buf[:cap(buf)], n) 902 c.rawInput.Write(buf[:nread]) 1394 var buf [maxPlaintext]byte 1395 n, _ := c.pendingFlight.Read(buf[:]) 1396 if _, err := c.doWriteRecord(recordTypeHandshake, buf[:n]); err != nil {
|
/ssl/test/runner/kyber/ |
A D | kyber.go | 240 var buf [3]byte 242 keccak.Read(buf[:]) 243 d1 := uint16(buf[0]) + 256*uint16(buf[1]%16) 244 d2 := uint16(buf[1])/16 + 16*uint16(buf[2])
|