Go to the documentation of this file.
190 if (!
GetHash(old_hash, &hash_len)) {
194 static_cast<uint8_t>(hash_len)};
204 const EVP_MD *digest)
const {
206 if (transcript_digest !=
nullptr &&
236 ScopedEVP_MD_CTX
ctx;
248 bool from_server)
const {
249 static const char kClientLabel[] =
"client finished";
250 static const char kServerLabel[] =
"server finished";
251 auto label = from_server
257 if (!
GetHash(digest, &digest_len)) {
261 static const size_t kFinishedLen = 12;
268 *out_len = kFinishedLen;
bool UpdateForHelloRetryRequest()
bool InitHash(uint16_t version, const SSL_CIPHER *cipher)
const EVP_MD * Digest() const
#define OPENSSL_PUT_ERROR(library, reason)
static struct test_ctx ctx
#define EVP_DigestInit_ex
bool GetFinishedMAC(uint8_t *out, size_t *out_len, const SSL_SESSION *session, bool from_server) const
#define EVP_MD_CTX_copy_ex
#define SSL3_MT_MESSAGE_HASH
#define BSSL_NAMESPACE_END
struct absl::base_internal::@2940::AllocList::Header header
#define ERR_R_INTERNAL_ERROR
#define EVP_DigestFinal_ex
bool tls1_prf(const EVP_MD *digest, Span< uint8_t > out, Span< const uint8_t > secret, Span< const char > label, Span< const uint8_t > seed1, Span< const uint8_t > seed2)
bool Update(Span< const uint8_t > in)
bool GetHash(uint8_t *out, size_t *out_len) const
UniquePtr< BUF_MEM > buffer_
bool CopyToHashContext(EVP_MD_CTX *ctx, const EVP_MD *digest) const
constexpr Span< T > MakeSpan(T *ptr, size_t size) noexcept
uint8_t secret[SSL_MAX_MASTER_KEY_LENGTH]
const EVP_MD * ssl_get_handshake_digest(uint16_t version, const SSL_CIPHER *cipher)
constexpr Span< const T > MakeConstSpan(T *ptr, size_t size) noexcept
grpc
Author(s):
autogenerated on Thu Mar 13 2025 03:01:21