/ssl/test/ |
A D | mock_quic_transport.cc | 86 uint8_t header[8]; in ReadHeader() local 87 if (!ReadAll(bio_.get(), header)) { in ReadHeader() 97 CBS_init(&cbs, header, sizeof(header)); in ReadHeader() 245 uint8_t header[8]; in WriteRecord() local 246 header[0] = type; in WriteRecord() 247 header[1] = level; in WriteRecord() 249 header[3] = cipher_suite & 0xff; in WriteRecord() 250 header[4] = (tlv_len >> 24) & 0xff; in WriteRecord() 252 header[6] = (tlv_len >> 8) & 0xff; in WriteRecord() 253 header[7] = tlv_len & 0xff; in WriteRecord() [all …]
|
A D | packeted_bio.cc | 104 uint8_t header[5]; in PacketedWrite() local 105 header[0] = kOpcodePacket; in PacketedWrite() 106 header[1] = (inl >> 24) & 0xff; in PacketedWrite() 107 header[2] = (inl >> 16) & 0xff; in PacketedWrite() 108 header[3] = (inl >> 8) & 0xff; in PacketedWrite() 109 header[4] = inl & 0xff; in PacketedWrite() 110 int ret = BIO_write(next, header, sizeof(header)); in PacketedWrite()
|
A D | handshake_util.cc | 292 uint8_t header[SSL3_RT_HEADER_LENGTH]; in Proxy() local 293 if (!proxy_data(header, sizeof(header))) { in Proxy() 296 if (header[1] != 3) { in Proxy() 300 size_t remaining = (header[3] << 8) + header[4]; in Proxy()
|
/ssl/test/runner/ |
A D | mock_quic_transport.go | 86 header := make([]byte, 8) 87 if _, err := io.ReadFull(m.Conn, header); err != nil { 90 typ := recordType(header[0]) 91 level := encryptionLevel(header[1]) 92 cipherSuite := binary.BigEndian.Uint16(header[2:4]) 93 length := binary.BigEndian.Uint32(header[4:])
|
A D | conn.go | 441 func (hc *halfConn) computeMAC(epoch *epochState, seq, header, data []byte) []byte { 442 hc.macBuf = epoch.mac.MAC(hc.macBuf[:0], seq, header[:3], header[len(header)-2:], data) 682 header := record[prefixLen-headerLen:] 704 record = append(record, hc.computeMAC(epoch, seq, header, payload)...) 738 copy(additionalData[8:], header[:3]) 928 header := c.rawInput.Bytes()[:recordHeaderLen] 929 typ := recordType(header[0]) 940 vers := uint16(header[1])<<8 | uint16(header[2]) 941 n := int(header[3])<<8 | int(header[4])
|
A D | cipher_suites.go | 210 MAC(digestBuf, seq, header, length, data []byte) []byte argument 312 func (s tls10MAC) MAC(digestBuf, seq, header, length, data []byte) []byte { 315 s.h.Write(header)
|
A D | dtls.go | 393 header := data[:4] 399 Type: header[0],
|
/ssl/ |
A D | ssl_transcript.cc | 102 CBS buf, header; in HashBuffer() local 104 if (!CBS_get_bytes(&buf, &header, 4) || // in HashBuffer() 106 !EVP_DigestUpdate(ctx, CBS_data(&header), CBS_len(&header)) || // in HashBuffer() 131 const uint8_t header[4] = {SSL3_MT_MESSAGE_HASH, 0, 0, in UpdateForHelloRetryRequest() local 134 !AddToBufferOrHash(header) || in UpdateForHelloRetryRequest()
|
A D | ssl_aead_ctx.cc | 209 size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 211 return header; in GetAdditionalData() 228 Span<const uint8_t> header, Span<uint8_t> in) { in Open() argument 250 seqnum, plaintext_len, header); in Open() 302 Span<const uint8_t> header, const uint8_t *in, in SealScatter() argument 327 seqnum, in_len, header); in SealScatter() 385 uint64_t seqnum, Span<const uint8_t> header, in Seal() argument 404 record_version, seqnum, header, in, in_len, 0, 0)) { in Seal()
|
A D | dtls_record.cc | 158 CBS header, body; member 288 BSSL_CHECK(CBS_get_bytes(©, &out->header, header_len)); in parse_dtls_record() 314 ssl_do_msg_callback(ssl, 0 /* read */, SSL3_RT_HEADER, record.header); in dtls_open_record() 329 record.header, in dtls_open_record() 554 Span<const uint8_t> header(out, record_header_len); in dtls_seal_record() local 558 record_version, dtls_aead_sequence(ssl, record_number), header, in, in dtls_seal_record() 581 ssl_do_msg_callback(ssl, 1 /* write */, SSL3_RT_HEADER, header); in dtls_seal_record()
|
A D | tls_record.cc | 146 Span<const uint8_t> header = in.subspan(0, SSL3_RT_HEADER_LENGTH); in tls_open_record() local 147 ssl_do_msg_callback(ssl, 0 /* read */, SSL3_RT_HEADER, header); in tls_open_record() 183 out, type, version, ssl->s3->read_sequence, header, in tls_open_record() 297 Span<const uint8_t> header = Span(out_prefix, SSL3_RT_HEADER_LENGTH); in do_seal_record() local 307 header, in, in_len, extra_in, extra_in_len)) { in do_seal_record() 312 ssl_do_msg_callback(ssl, 1 /* write */, SSL3_RT_HEADER, header); in do_seal_record()
|
A D | tls13_enc.cc | 561 auto header = truncated.subspan(0, 4); in tls13_psk_binder() local 564 !EVP_DigestUpdate(ctx.get(), header.data(), header.size()) || in tls13_psk_binder() 662 auto header = msg.subspan(0, SSL3_HM_HEADER_LENGTH); in ssl_ech_accept_confirmation() local 672 !EVP_DigestUpdate(ctx.get(), header.data(), header.size()) || in ssl_ech_accept_confirmation()
|
A D | internal.h | 571 uint64_t seqnum, Span<const uint8_t> header, Span<uint8_t> in); 579 Span<const uint8_t> header, const uint8_t *in, size_t in_len); 598 Span<const uint8_t> header, const uint8_t *in, size_t in_len, 609 Span<const uint8_t> header);
|
A D | tls13_server.cc | 1116 uint8_t header[4] = { in do_send_half_rtt_ticket() local 1120 if (!hs->transcript.Update(header) || in do_send_half_rtt_ticket()
|
A D | ssl_test.cc | 1299 char *name, *header; in BufferFromPEM() local 1302 if (!PEM_read_bio(bio.get(), &name, &header, &data, &data_len)) { in BufferFromPEM() 1306 OPENSSL_free(header); in BufferFromPEM()
|