HomeSort by: relevance | last modified time | path
    Searched defs:hrr (Results 1 - 6 of 6) sorted by relevancy

  /src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_srvr.c 615 * If we set a group_id already, then we must have sent an HRR
639 * If we sent an HRR then the key_share sent back MUST be for the group
703 unsigned char hrr[MAX_HRR_SIZE]; local
829 * Reconstruct the HRR that we would have sent in response to the original
831 * Note: This won't work with custom HRR extensions
833 if (!WPACKET_init_static_len(&hrrpkt, hrr, sizeof(hrr), 0)) {
884 PACKET_remaining(&chhash), hrr,
1754 /* Is there a key_share extension present in this HRR? */
statem_clnt.c 548 * We only get here in TLSv1.3. We just received an HRR, so issue a
1335 /* ServerHello selected a different ciphersuite to that in the HRR */
1381 int hrr = 0; local
1405 hrr = 1;
1440 if (PACKET_remaining(pkt) == 0 && !hrr) {
1448 if (!hrr) {
1463 if (SSL_IS_TLS13(s) || hrr) {
1478 if (hrr) {
1758 * for HRR messages.
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
extensions_srvr.c 658 * If we set a group_id already, then we must have sent an HRR
684 * If we sent an HRR then the key_share sent back MUST be for the group
742 unsigned char hrr[MAX_HRR_SIZE]; local
879 * Reconstruct the HRR that we would have sent in response to the original
881 * Note: This won't work with custom HRR extensions
883 if (!WPACKET_init_static_len(&hrrpkt, hrr, sizeof(hrr), 0)) {
939 PACKET_remaining(&chhash), hrr,
1800 /* Is there a key_share extension present in this HRR? */
statem_clnt.c 551 * We only get here in TLSv1.3. We just received an HRR, so issue a
1359 /* ServerHello selected a different ciphersuite to that in the HRR */
1405 int hrr = 0; local
1431 hrr = 1;
1472 if (PACKET_remaining(pkt) == 0 && !hrr) {
1481 if (!hrr) {
1496 if (SSL_IS_TLS13(s) || hrr) {
1513 if (hrr) {
1806 * for HRR messages.
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_srvr.c 684 * If we sent an HRR then the key_share sent back MUST be for the group
714 * We have sent a HRR, and the key share we got back is
721 /* We have selected a key share group via HRR, hence we're done here */
877 * If we set a group_id already, then we must have sent an HRR
895 if (ks_extraction_result == EXTRACTION_SUCCESS_HRR) /* Successful HRR */
910 * --> Yes: memorize group_id for HRR, break
949 * (and report group_id_candidate 'upward' for HRR)
1014 unsigned char hrr[MAX_HRR_SIZE]; local
1146 * Reconstruct the HRR that we would have sent in response to the original
1148 * Note: This won't work with custom HRR extension
    [all...]
statem_clnt.c 595 * We only get here in TLSv1.3. We just received an HRR, so issue a
732 * This must be a second ClientHello after an HRR following an
1421 /* ServerHello selected a different ciphersuite to that in the HRR */
1471 int hrr = 0; local
1502 hrr = 1;
1537 if (PACKET_remaining(pkt) == 0 && !hrr) {
1545 if (!hrr) {
1560 if (SSL_CONNECTION_IS_TLS13(s) || hrr) {
1576 if (hrr) {
1892 * for HRR messages
    [all...]

Completed in 51 milliseconds