Lines Matching full:s3
58 if (ilen != s->s3.previous_client_finished_len) { in tls_parse_ctos_renegotiate()
63 ok = memcmp(data, s->s3.previous_client_finished, in tls_parse_ctos_renegotiate()
64 s->s3.previous_client_finished_len); in tls_parse_ctos_renegotiate()
67 if ((data[0] ^ s->s3.previous_client_finished[0]) != 0xFF) { in tls_parse_ctos_renegotiate()
77 s->s3.send_connection_binding = 1; in tls_parse_ctos_renegotiate()
445 s->s3.npn_seen = 1; in tls_parse_ctos_npn()
479 OPENSSL_free(s->s3.alpn_proposed); in tls_parse_ctos_alpn()
480 s->s3.alpn_proposed = NULL; in tls_parse_ctos_alpn()
481 s->s3.alpn_proposed_len = 0; in tls_parse_ctos_alpn()
483 &s->s3.alpn_proposed, &s->s3.alpn_proposed_len)) { in tls_parse_ctos_alpn()
622 * Accept a key share group by setting the related variables in s->s3 and
628 s->s3.group_id = ksgroup; in tls_accept_ksgroup()
629 s->s3.group_id_candidate = ksgroup; in tls_accept_ksgroup()
632 if ((s->s3.peer_tmp = ssl_generate_param_group(s, ksgroup)) == NULL) { in tls_accept_ksgroup()
638 if (tls13_set_encoded_pub_key(s->s3.peer_tmp, in tls_accept_ksgroup()
691 if (s->s3.group_id != 0 in extract_keyshares()
692 && (group_id != s->s3.group_id in extract_keyshares()
716 if (s->s3.group_id != 0) { in extract_keyshares()
723 if (!tls_accept_ksgroup(s, s->s3.group_id, &encoded_pubkey)) in extract_keyshares()
845 s->s3.group_id_candidate = 0; in tls_parse_ctos_key_share()
850 if (s->s3.peer_tmp != NULL) { in tls_parse_ctos_key_share()
877 if (s->s3.group_id != 0 && PACKET_remaining(&key_share_list) == 0) { in tls_parse_ctos_key_share()
953 s->s3.group_id_candidate = group_id_candidate; in tls_parse_ctos_key_share()
982 s->s3.group_id_candidate = group_id_candidate; in tls_parse_ctos_key_share()
1024 || (s->s3.flags & TLS1_FLAGS_STATELESS) == 0) in tls_parse_ctos_cookie()
1109 if (group_id != s->s3.group_id in tls_parse_ctos_cookie()
1110 || s->s3.tmp.new_cipher in tls_parse_ctos_cookie()
1159 || !ssl->method->put_cipher_by_char(s->s3.tmp.new_cipher, &hrrpkt, in tls_parse_ctos_cookie()
1178 || !WPACKET_put_bytes_u16(&hrrpkt, s->s3.group_id) in tls_parse_ctos_cookie()
1256 s->s3.flags |= TLS1_FLAGS_RECEIVED_EXTMS; in tls_parse_ctos_ems()
1497 s->s3.tmp.new_cipher->algorithm2)))) { in tls_parse_ctos_psk()
1572 if (!s->s3.send_connection_binding) in tls_construct_stoc_renegotiate()
1579 || !WPACKET_memcpy(pkt, s->s3.previous_client_finished, in tls_construct_stoc_renegotiate()
1580 s->s3.previous_client_finished_len) in tls_construct_stoc_renegotiate()
1581 || !WPACKET_memcpy(pkt, s->s3.previous_server_finished, in tls_construct_stoc_renegotiate()
1582 s->s3.previous_server_finished_len) in tls_construct_stoc_renegotiate()
1642 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; in tls_construct_stoc_ec_pt_formats()
1643 unsigned long alg_a = s->s3.tmp.new_cipher->algorithm_auth; in tls_construct_stoc_ec_pt_formats()
1672 /* s->s3.group_id is non zero if we accepted a key_share */ in tls_construct_stoc_supported_groups()
1673 if (s->s3.group_id == 0) in tls_construct_stoc_supported_groups()
1695 if (s->s3.group_id == group) in tls_construct_stoc_supported_groups()
1789 int npn_seen = s->s3.npn_seen; in tls_construct_stoc_next_proto_neg()
1792 s->s3.npn_seen = 0; in tls_construct_stoc_next_proto_neg()
1804 s->s3.npn_seen = 1; in tls_construct_stoc_next_proto_neg()
1815 if (s->s3.alpn_selected == NULL) in tls_construct_stoc_alpn()
1822 || !WPACKET_sub_memcpy_u8(pkt, s->s3.alpn_selected, in tls_construct_stoc_alpn()
1823 s->s3.alpn_selected_len) in tls_construct_stoc_alpn()
1866 if (s->s3.tmp.new_cipher->algorithm_mac == SSL_AEAD in tls_construct_stoc_etm()
1867 || s->s3.tmp.new_cipher->algorithm_enc == SSL_RC4 in tls_construct_stoc_etm()
1868 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT in tls_construct_stoc_etm()
1869 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT12 in tls_construct_stoc_etm()
1870 || s->s3.tmp.new_cipher->algorithm_enc == SSL_MAGMA in tls_construct_stoc_etm()
1871 || s->s3.tmp.new_cipher->algorithm_enc == SSL_KUZNYECHIK) { in tls_construct_stoc_etm()
1889 if ((s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) == 0) in tls_construct_stoc_ems()
1928 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share()
1938 || !WPACKET_put_bytes_u16(pkt, s->s3.group_id) in tls_construct_stoc_key_share()
1968 || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)) { in tls_construct_stoc_key_share()
1974 s->s3.group_id)) == NULL) { in tls_construct_stoc_key_share()
2007 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share()
2020 * The generated pms is stored in `s->s3.tmp.pms` to be later used via in tls_construct_stoc_key_share()
2045 if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) { in tls_construct_stoc_key_share()
2050 s->s3.did_kex = 1; in tls_construct_stoc_key_share()
2072 if ((s->s3.flags & TLS1_FLAGS_STATELESS) == 0) in tls_construct_stoc_cookie()
2087 || !WPACKET_put_bytes_u16(pkt, s->s3.group_id) in tls_construct_stoc_cookie()
2088 || !ssl->method->put_cipher_by_char(s->s3.tmp.new_cipher, pkt, in tls_construct_stoc_cookie()
2091 || !WPACKET_put_bytes_u8(pkt, s->s3.peer_tmp == NULL) in tls_construct_stoc_cookie()
2199 if (((s->s3.tmp.new_cipher->id & 0xFFFF) != 0x80 in tls_construct_stoc_cryptopro_bug()
2200 && (s->s3.tmp.new_cipher->id & 0xFFFF) != 0x81) in tls_construct_stoc_cryptopro_bug()