Home | History | Annotate | Download | only in ssl

Lines Matching defs:cbs

148 static int tls1_check_duplicate_extensions(const CBS *cbs) {
149 CBS extensions = *cbs;
157 CBS extension;
178 extensions = *cbs;
180 CBS extension;
212 CBS client_hello, random, session_id;
228 CBS cookie;
235 CBS cipher_suites, compression_methods;
257 CBS extensions;
271 CBS *out, uint16_t extension_type) {
272 CBS extensions;
277 CBS extension;
296 CBS cbs;
297 if (!ssl_client_hello_get_extension(client_hello, &cbs, extension_type)) {
301 *out_data = CBS_data(&cbs);
302 *out_len = CBS_len(&cbs);
534 * The parse callbacks receive a |CBS| that contains the contents of the
536 * not received then the parse callbacks will be called with a NULL CBS so that
551 CBS *contents);
554 CBS *contents);
559 CBS *contents) {
571 CBS *contents) {
606 CBS *contents) {
631 CBS *contents) {
636 CBS server_name_list, host_name;
719 CBS *contents) {
758 CBS renegotiated_connection;
794 CBS *contents) {
808 CBS renegotiated_connection;
872 CBS *contents) {
898 CBS *contents) {
979 CBS *contents) {
1058 CBS *contents) {
1067 CBS supported_signature_algorithms;
1103 CBS *contents) {
1129 CBS *contents) {
1184 CBS *contents) {
1212 CBS proto;
1242 CBS *contents) {
1312 CBS *contents) {
1349 CBS *contents) {
1407 CBS *contents) {
1425 CBS protocol_name_list, protocol_name;
1437 CBS client_protocol_name_list, client_protocol_name;
1474 CBS contents;
1486 CBS protocol_name_list;
1496 CBS protocol_name_list_copy = protocol_name_list;
1498 CBS protocol_name;
1572 uint8_t *out_alert, CBS *contents) {
1590 uint8_t *out_alert, CBS *contents) {
1664 CBS *contents) {
1674 CBS profile_ids, srtp_mki;
1712 CBS *contents) {
1718 CBS profile_ids, srtp_mki;
1736 CBS profile_ids_tmp;
1807 CBS *contents) {
1816 CBS ec_point_format_list;
1835 CBS *contents) {
1942 CBS *contents) {
1962 SSL_HANDSHAKE *hs, CBS *out_ticket, CBS *out_binders,
1963 uint32_t *out_obfuscated_ticket_age, uint8_t *out_alert, CBS *contents) {
1965 CBS identities, binders;
1982 CBS unused_ticket;
1998 CBS binder;
2064 CBS *contents) {
2069 CBS ke_modes;
2114 uint8_t *out_alert, CBS *contents) {
2136 uint8_t *out_alert, CBS *contents) {
2250 uint8_t *out_alert, CBS *contents) {
2251 CBS peer_key;
2280 uint8_t *out_alert, CBS *contents) {
2282 CBS key_shares;
2297 CBS peer_key;
2300 CBS peer_key_tmp;
2479 CBS *contents) {
2487 CBS *contents) {
2492 CBS supported_group_list;
2878 CBS extensions;
2882 CBS extension;
2924 CBS *contents = NULL, fake_contents;
2968 static int ssl_scan_serverhello_tlsext(SSL_HANDSHAKE *hs, CBS *cbs,
2972 if (CBS_len(cbs) == 0 && ssl3_protocol_version(ssl) < TLS1_3_VERSION) {
2977 CBS extensions;
2978 if (!CBS_get_u16_length_prefixed(cbs, &extensions) ||
2987 CBS extension;
3075 int ssl_parse_serverhello_tlsext(SSL_HANDSHAKE *hs, CBS *cbs) {
3078 if (ssl_scan_serverhello_tlsext(hs, cbs, &alert) <= 0) {
3264 int tls1_parse_peer_sigalgs(SSL_HANDSHAKE *hs, const CBS *in_sigalgs) {
3294 CBS sigalgs;
3369 CBS extension, channel_id;
3594 int ssl_is_sct_list_valid(const CBS *contents) {
3598 CBS copy = *contents;
3599 CBS sct_list;
3607 CBS sct;