Lines Matching defs:pkt

46 static int tls_construct_encrypted_extensions(SSL *s, WPACKET *pkt);
1017 int ossl_statem_server_construct_message(SSL *s, WPACKET *pkt,
1179 MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt)
1190 return tls_process_client_hello(s, pkt);
1193 return tls_process_end_of_early_data(s, pkt);
1196 return tls_process_client_certificate(s, pkt);
1199 return tls_process_client_key_exchange(s, pkt);
1202 return tls_process_cert_verify(s, pkt);
1206 return tls_process_next_proto(s, pkt);
1210 return tls_process_change_cipher_spec(s, pkt);
1213 return tls_process_finished(s, pkt);
1216 return tls_process_key_update(s, pkt);
1277 int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie,
1281 if (!WPACKET_put_bytes_u16(pkt, DTLS1_VERSION)
1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len))
1288 int dtls_construct_hello_verify_request(SSL *s, WPACKET *pkt)
1300 if (!dtls_raw_hello_verify_request(pkt, s->d1->cookie,
1375 MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt)
1435 if (!PACKET_get_1(pkt, &mt)
1447 if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) {
1462 if (!PACKET_get_net_2(pkt, &ciphersuite_len)
1463 || !PACKET_get_net_2(pkt, &session_id_len)
1464 || !PACKET_get_net_2(pkt, &challenge_len)) {
1474 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites,
1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len)
1477 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len)
1479 || PACKET_remaining(pkt) != 0) {
1505 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE)
1506 || !PACKET_get_length_prefixed_1(pkt, &session_id)
1515 if (!PACKET_get_length_prefixed_1(pkt, &cookie)) {
1538 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
1543 if (!PACKET_get_length_prefixed_1(pkt, &compression)) {
1549 if (PACKET_remaining(pkt) == 0) {
1552 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->extensions)
1553 || PACKET_remaining(pkt) != 0) {
2301 int tls_construct_server_hello(SSL *s, WPACKET *pkt)
2310 if (!WPACKET_put_bytes_u16(pkt, version)
2315 || !WPACKET_memcpy(pkt,
2368 if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl)
2369 || !s->method->put_cipher_by_char(s->s3.tmp.new_cipher, pkt, &len)
2370 || !WPACKET_put_bytes_u8(pkt, compm)) {
2375 if (!tls_construct_extensions(s, pkt,
2409 int tls_construct_server_done(SSL *s, WPACKET *pkt)
2420 int tls_construct_server_key_exchange(SSL *s, WPACKET *pkt)
2435 if (!WPACKET_get_total_written(pkt, &paramoffset)) {
2588 || !WPACKET_sub_memcpy_u16(pkt, s->cert->psk_identity_hint,
2602 res = WPACKET_start_sub_packet_u8(pkt);
2605 res = WPACKET_start_sub_packet_u16(pkt);
2621 if (!WPACKET_allocate_bytes(pkt, len, &binval)) {
2629 if (!WPACKET_allocate_bytes(pkt, BN_num_bytes(r[i]), &binval)
2630 || !WPACKET_close(pkt)) {
2645 if (!WPACKET_put_bytes_u8(pkt, NAMED_CURVE_TYPE)
2646 || !WPACKET_put_bytes_u8(pkt, 0)
2647 || !WPACKET_put_bytes_u8(pkt, curve_id)
2648 || !WPACKET_sub_memcpy_u8(pkt, encodedPoint, encodedlen)) {
2669 if (!WPACKET_get_length(pkt, &paramlen)) {
2674 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
2702 || !WPACKET_sub_reserve_bytes_u16(pkt, siglen, &sigbytes1)
2704 || !WPACKET_sub_allocate_bytes_u16(pkt, siglen, &sigbytes2)
2727 int tls_construct_certificate_request(SSL *s, WPACKET *pkt)
2741 || !WPACKET_sub_memcpy_u8(pkt, s->pha_context,
2752 if (!WPACKET_put_bytes_u8(pkt, 0)) {
2758 if (!tls_construct_extensions(s, pkt,
2768 if (!WPACKET_start_sub_packet_u8(pkt)
2769 || !ssl3_get_req_cert_type(s, pkt) || !WPACKET_close(pkt)) {
2778 if (!WPACKET_start_sub_packet_u16(pkt)
2779 || !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH)
2780 || !tls12_copy_sigalgs(s, pkt, psigs, nl)
2781 || !WPACKET_close(pkt)) {
2787 if (!construct_ca_names(s, get_ca_names(s), pkt)) {
2798 static int tls_process_cke_psk_preamble(SSL *s, PACKET *pkt)
2805 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) {
2857 static int tls_process_cke_rsa(SSL *s, PACKET *pkt)
2875 enc_premaster = *pkt;
2877 if (!PACKET_get_length_prefixed_2(pkt, &enc_premaster)
2878 || PACKET_remaining(pkt) != 0) {
2954 static int tls_process_cke_dhe(SSL *s, PACKET *pkt)
2962 if (!PACKET_get_net_2(pkt, &i) || PACKET_remaining(pkt) != i) {
2972 if (PACKET_remaining(pkt) == 0L) {
2976 if (!PACKET_get_bytes(pkt, &data, i)) {
3005 static int tls_process_cke_ecdhe(SSL *s, PACKET *pkt)
3011 if (PACKET_remaining(pkt) == 0L) {
3025 if (!PACKET_get_1(pkt, &i) || !PACKET_get_bytes(pkt, &data, i)
3026 || PACKET_remaining(pkt) != 0) {
3061 static int tls_process_cke_srp(SSL *s, PACKET *pkt)
3067 if (!PACKET_get_net_2(pkt, &i)
3068 || !PACKET_get_bytes(pkt, &data, i)) {
3100 static int tls_process_cke_gost(SSL *s, PACKET *pkt)
3151 ptr = PACKET_data(pkt);
3154 pKX = d2i_GOST_KX_MESSAGE(NULL, &ptr, PACKET_remaining(pkt));
3162 if (!PACKET_forward(pkt, ptr - PACKET_data(pkt))) {
3167 if (PACKET_remaining(pkt) != 0) {
3203 static int tls_process_cke_gost18(SSL *s, PACKET *pkt)
3256 inlen = PACKET_remaining(pkt);
3257 start = PACKET_data(pkt);
3281 MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt)
3288 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) {
3295 if (PACKET_remaining(pkt) != 0) {
3305 if (!tls_process_cke_rsa(s, pkt)) {
3310 if (!tls_process_cke_dhe(s, pkt)) {
3315 if (!tls_process_cke_ecdhe(s, pkt)) {
3320 if (!tls_process_cke_srp(s, pkt)) {
3325 if (!tls_process_cke_gost(s, pkt)) {
3330 if (!tls_process_cke_gost18(s, pkt)) {
3411 MSG_PROCESS_RETURN tls_process_client_certificate(SSL *s, PACKET *pkt)
3435 if (SSL_IS_TLS13(s) && (!PACKET_get_length_prefixed_1(pkt, &context)
3443 if (!PACKET_get_length_prefixed_3(pkt, &spkt)
3444 || PACKET_remaining(pkt) != 0) {
3595 int tls_construct_server_certificate(SSL *s, WPACKET *pkt)
3608 if (SSL_IS_TLS13(s) && !WPACKET_put_bytes_u8(pkt, 0)) {
3612 if (!ssl3_output_cert_chain(s, pkt, cpk)) {
3620 static int create_ticket_prequel(SSL *s, WPACKET *pkt, uint32_t age_add,
3640 if (!WPACKET_put_bytes_u32(pkt, timeout)) {
3646 if (!WPACKET_put_bytes_u32(pkt, age_add)
3647 || !WPACKET_sub_memcpy_u8(pkt, tick_nonce, TICKET_NONCE_SIZE)) {
3654 if (!WPACKET_start_sub_packet_u16(pkt)) {
3666 static int construct_stateless_ticket(SSL *s, WPACKET *pkt, uint32_t age_add,
3771 if (!WPACKET_put_bytes_u32(pkt, 0)
3772 || !WPACKET_put_bytes_u16(pkt, 0)) {
3817 if (!create_ticket_prequel(s, pkt, age_add, tick_nonce)) {
3822 if (!WPACKET_get_total_written(pkt, &macoffset)
3824 || !WPACKET_memcpy(pkt, key_name, sizeof(key_name))
3826 || !WPACKET_memcpy(pkt, iv, iv_len)
3827 || !WPACKET_reserve_bytes(pkt, slen + EVP_MAX_BLOCK_LENGTH,
3831 || !WPACKET_allocate_bytes(pkt, len, &encdata2)
3834 || !WPACKET_allocate_bytes(pkt, lenfinal, &encdata2)
3837 || !WPACKET_get_total_written(pkt, &macendoffset)
3841 || !WPACKET_reserve_bytes(pkt, EVP_MAX_MD_SIZE, &macdata1)
3844 || !WPACKET_allocate_bytes(pkt, hlen, &macdata2)
3851 if (!WPACKET_close(pkt)) {
3864 static int construct_stateful_ticket(SSL *s, WPACKET *pkt, uint32_t age_add,
3867 if (!create_ticket_prequel(s, pkt, age_add, tick_nonce)) {
3872 if (!WPACKET_memcpy(pkt, s->session->session_id,
3874 || !WPACKET_close(pkt)) {
3896 int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt)
3998 if (!construct_stateful_ticket(s, pkt, age_add_u.age_add, tick_nonce)) {
4005 tmpret = construct_stateless_ticket(s, pkt, age_add_u.age_add,
4019 if (!tls_construct_extensions(s, pkt,
4038 int tls_construct_cert_status_body(SSL *s, WPACKET *pkt)
4040 if (!WPACKET_put_bytes_u8(pkt, s->ext.status_type)
4041 || !WPACKET_sub_memcpy_u24(pkt, s->ext.ocsp.resp,
4050 int tls_construct_cert_status(SSL *s, WPACKET *pkt)
4052 if (!tls_construct_cert_status_body(s, pkt)) {
4065 MSG_PROCESS_RETURN tls_process_next_proto(SSL *s, PACKET *pkt)
4077 if (!PACKET_get_length_prefixed_1(pkt, &next_proto)
4078 || !PACKET_get_length_prefixed_1(pkt, &padding)
4079 || PACKET_remaining(pkt) > 0) {
4096 static int tls_construct_encrypted_extensions(SSL *s, WPACKET *pkt)
4098 if (!tls_construct_extensions(s, pkt, SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS,
4107 MSG_PROCESS_RETURN tls_process_end_of_early_data(SSL *s, PACKET *pkt)
4109 if (PACKET_remaining(pkt) != 0) {