Lines Matching +refs:cc +refs:with
53 \ with an 'ERR_OK fail' call). We can thus make this processing right
83 cc: DBG ( addr -- ) {
91 cc: DBG2 ( addr x -- ) {
99 \ Mark the context as failed with a specific error code. This also
101 cc: fail ( err -- ! ) {
107 cc: get8 ( addr -- val ) {
113 cc: get16 ( addr -- val ) {
119 cc: get32 ( addr -- val ) {
125 cc: set8 ( val addr -- ) {
131 cc: set16 ( val addr -- ) {
137 cc: set32 ( val addr -- ) {
235 cc: supported-curves ( -- x ) {
242 cc: supported-hash-functions ( -- x num ) {
259 cc: supports-rsa-sign? ( -- bool ) {
264 cc: supports-ecdsa? ( -- bool ) {
269 cc: multihash-init ( -- ) {
276 cc: flush-record ( -- ) {
387 \ Yield control to the engine, with a possible flush. If 'cnr' is 0,
408 cc: payload-to-send? ( -- bool ) {
413 cc: has-input? ( -- bool ) {
418 cc: can-output? ( -- bool ) {
423 cc: discard-input ( -- ) {
431 cc: read8-native ( -- x ) {
454 cc: read-chunk-native ( addr len -- addr len ) {
506 \ In general we only deal with handshake data here. Alerts are processed
538 cc: more-incoming-bytes? ( -- bool ) {
603 cc: write8-native ( x -- bool ) {
636 cc: write-blob-chunk ( addr len -- addr len ) {
657 \ Write a blob with the length as header (over one byte)
661 \ Write a blob with the length as header (over two bytes)
669 cc: memcmp ( addr1 addr2 len -- bool ) {
679 cc: memcpy ( dst src len -- ) {
689 cc: strlen ( str -- len ) {
694 \ Fill a buffer with zeros. The buffer address is an offset in the context.
695 cc: bzero ( addr len -- ) {
717 cc: mkrand ( addr len -- ) {
747 \ performed with a binary search (not implemented for the moment, since it
771 \ 0 none (for suites with AEAD encryption)
776 \ 4 with SHA-256
777 \ 5 with SHA-384
780 \ PRF (with TLS 1.2), be sure to check the suites_sha384[] array defined
857 \ BR_KEYTYPE_RSA or BR_KEYTYPE_EC, combined with either BR_KEYTYPE_KEYX
875 \ Test whether the cipher suite uses ECDHE key exchange, signed with RSA.
879 \ Test whether the cipher suite uses ECDHE key exchange, signed with ECDSA.
883 \ Test whether the cipher suite uses ECDHE key exchange (with RSA or ECDSA).
896 \ can be used with TLS-1.0 or 1.1 use HMAC/SHA-1. RFC do not formally
898 \ with older protocol versions; however, servers should not do that, since
981 \ and replace the cipher_id with the key and tag lengths.
1000 cc: switch-cbc-out ( is_client prf_id mac_id aes cipher_key_len -- ) {
1013 cc: switch-cbc-in ( is_client prf_id mac_id aes cipher_key_len -- ) {
1026 cc: switch-aesgcm-out ( is_client prf_id cipher_key_len -- ) {
1037 cc: switch-aesgcm-in ( is_client prf_id cipher_key_len -- ) {
1048 cc: switch-chapol-out ( is_client prf_id -- ) {
1056 cc: switch-chapol-in ( is_client prf_id -- ) {
1064 cc: switch-aesccm-out ( is_client prf_id cipher_key_len tag_len -- ) {
1076 cc: switch-aesccm-in ( is_client prf_id cipher_key_len tag_len -- ) {
1111 cc: compute-Finished-inner ( from_client prf_id -- ) {
1162 \ Read and parse a list of supported signature algorithms (with hash
1195 cc: total-chain-length ( -- len ) {
1208 cc: begin-cert ( -- len ) {
1222 cc: copy-cert-chunk ( -- len ) {
1250 cc: x509-start-chain ( by_client -- ) {
1259 cc: x509-start-cert ( length -- ) {
1266 cc: x509-append ( length -- ) {
1275 cc: x509-end-cert ( -- ) {
1282 cc: x509-end-chain ( -- err ) {
1289 cc: get-key-type-usages ( -- key-type-usages ) {
1358 cc: copy-protocol-name ( idx -- len ) {
1365 \ Compare name in pad with the configured list of protocol names.
1368 cc: test-protocol-name ( len -- n ) {