Searched refs:clienthello (Results 1 – 9 of 9) sorted by relevance
| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 05-sni.cnf | 11 test-6 = 6-SNI-bad-clienthello-sni-ignore-mismatch 12 test-7 = 7-SNI-bad-clienthello-sni-reject-mismatch 13 test-8 = 8-SNI-clienthello-disable-v12 209 [6-SNI-bad-clienthello-sni-ignore-mismatch] 210 ssl_conf = 6-SNI-bad-clienthello-sni-ignore-mismatch-ssl 212 [6-SNI-bad-clienthello-sni-ignore-mismatch-ssl] 213 server = 6-SNI-bad-clienthello-sni-ignore-mismatch-server 214 client = 6-SNI-bad-clienthello-sni-ignore-mismatch-client 215 server2 = 6-SNI-bad-clienthello-sni-ignore-mismatch-server 217 [6-SNI-bad-clienthello-sni-ignore-mismatch-server] [all …]
|
| H A D | 05-sni.cnf.in | 116 name => "SNI-bad-clienthello-sni-ignore-mismatch", 133 name => "SNI-bad-clienthello-sni-reject-mismatch", 153 name => "SNI-clienthello-disable-v12",
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 1509 CLIENTHELLO_MSG *clienthello = NULL; in tls_process_client_hello() local 1529 clienthello = OPENSSL_zalloc(sizeof(*clienthello)); in tls_process_client_hello() 1530 if (clienthello == NULL) { in tls_process_client_hello() 1538 clienthello->isv2 = RECORD_LAYER_is_sslv2_record(&s->rlayer); in tls_process_client_hello() 1541 if (clienthello->isv2) { in tls_process_client_hello() 1577 if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) { in tls_process_client_hello() 1583 if (clienthello->isv2) { in tls_process_client_hello() 1604 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, in tls_process_client_hello() 1606 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1613 clienthello->session_id_len = session_id_len; in tls_process_client_hello() [all …]
|
| H A D | extensions.c | 1712 if (s->server && sent && s->clienthello != NULL in final_psk() 1713 && !s->clienthello->pre_proc_exts[TLSEXT_IDX_psk_kex_modes].present) { in final_psk()
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 70-test_sslrecords.t | 455 my $clienthello; 489 $clienthello = 503 vec($clienthello, 1, 8) = 0x00; 504 vec($clienthello, 2, 8) = 0x02; 507 my $chlen = length $clienthello; 517 $clienthello, 518 $clienthello 524 $clienthello = 544 my $frag1 = substr $clienthello, 0, 6; 545 my $frag2 = substr $clienthello, 6, 32; [all …]
|
| H A D | 70-test_key_share.t | 263 my $clienthello = $proxy->message_list->[0]; 265 && !defined $clienthello->extension_data->{TLSProxy::Message::EXT_KEY_SHARE},
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_lib.c | 1502 if (s->clienthello != NULL) in ossl_ssl_connection_free() 1503 OPENSSL_free(s->clienthello->pre_proc_exts); in ossl_ssl_connection_free() 1504 OPENSSL_free(s->clienthello); in ossl_ssl_connection_free() 6737 if (sc->clienthello == NULL) in SSL_client_hello_isv2() 6739 return sc->clienthello->isv2; in SSL_client_hello_isv2() 6749 if (sc->clienthello == NULL) in SSL_client_hello_get0_legacy_version() 6751 return sc->clienthello->legacy_version; in SSL_client_hello_get0_legacy_version() 6761 if (sc->clienthello == NULL) in SSL_client_hello_get0_random() 6764 *out = sc->clienthello->random; in SSL_client_hello_get0_random() 6775 if (sc->clienthello == NULL) in SSL_client_hello_get0_session_id() [all …]
|
| H A D | ssl_local.h | 1743 CLIENTHELLO_MSG *clienthello; member
|
| /freebsd/crypto/openssl/crypto/err/ |
| H A D | openssl.txt | 1409 SSL_R_CLIENTHELLO_TLSEXT:226:clienthello tlsext
|