OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:hrr
(Results
1 - 16
of
16
) sorted by relevancy
/src/crypto/external/apache2/openssl/dist/test/recipes/
70-test_tls13hrr.t
46
#
HRR
and the SH
59
# we end up selecting a different ciphersuite between
HRR
and the SH
72
# sends more than 1
HRR
82
ok($fatal_alert, "Server duplicated
HRR
");
86
# and not consider it when sending the
HRR
. We send brainpoolP512r1 in
88
# TLSv1.3. We expect the server to select P-521 in the
HRR
and the
99
ok(TLSProxy::Message->success(), "Invalid group with
HRR
");
102
#Test 5: A failure should occur if an
HRR
is sent without the supported_versions
113
ok($fatal_alert, "supported_versions missing from
HRR
");
120
# We're only interested in the
HRR
[
all
...]
/src/crypto/external/bsd/openssl/dist/test/recipes/
70-test_tls13hrr.t
46
#
HRR
and the SH
59
# we end up selecting a different ciphersuite between
HRR
and the SH
72
# sends more than 1
HRR
82
ok($fatal_alert, "Server duplicated
HRR
");
86
# and not consider it when sending the
HRR
. We send brainpoolP512r1 in
88
# TLSv1.3. We expect the server to select X25519 in the
HRR
and the
99
ok(TLSProxy::Message->success(), "Invalid group with
HRR
");
107
# We're only interested in the
HRR
112
my $
hrr
= ${$proxy->message_list}[1];
117
$
hrr
->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384)
[
all
...]
/src/crypto/external/bsd/openssl.old/dist/test/recipes/
70-test_tls13hrr.t
45
#
HRR
and the SH
54
# we end up selecting a different ciphersuite between
HRR
and the SH
63
# sends more than 1
HRR
73
ok($fatal_alert, "Server duplicated
HRR
");
80
# We're only interested in the
HRR
85
my $
hrr
= ${$proxy->message_list}[1];
90
$
hrr
->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
91
$
hrr
->repack();
96
# We're only interested in the
HRR
107
# Find ServerHello record (
HRR
actually) and insert after tha
[
all
...]
/src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
10-resumption.conf
69
test-64 = 64-resumption-with-
hrr
2411
[64-resumption-with-
hrr
]
2412
ssl_conf = 64-resumption-with-
hrr
-ssl
2414
[64-resumption-with-
hrr
-ssl]
2415
server = 64-resumption-with-
hrr
-server
2416
client = 64-resumption-with-
hrr
-client
2417
resume-server = 64-resumption-with-
hrr
-server
2418
resume-client = 64-resumption-with-
hrr
-resume-client
2420
[64-resumption-with-
hrr
-server]
2426
[64-resumption-with-
hrr
-client
[
all
...]
/src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_clnt.c
551
* We only get here in TLSv1.3. We just received an
HRR
, so issue a
1359
/* ServerHello selected a different ciphersuite to that in the
HRR
*/
1405
int
hrr
= 0;
local
1431
hrr
= 1;
1472
if (PACKET_remaining(pkt) == 0 && !
hrr
) {
1481
if (!
hrr
) {
1496
if (SSL_IS_TLS13(s) ||
hrr
) {
1513
if (
hrr
) {
1806
* for
HRR
messages.
extensions_srvr.c
658
* If we set a group_id already, then we must have sent an
HRR
684
* If we sent an
HRR
then the key_share sent back MUST be for the group
742
unsigned char
hrr
[MAX_HRR_SIZE];
local
879
* Reconstruct the
HRR
that we would have sent in response to the original
881
* Note: This won't work with custom
HRR
extensions
883
if (!WPACKET_init_static_len(&hrrpkt,
hrr
, sizeof(
hrr
), 0)) {
939
PACKET_remaining(&chhash),
hrr
,
1800
/* Is there a key_share extension present in this
HRR
? */
statem_lib.c
30
/* Fixed value used in the ServerHello random field to identify an
HRR
*/
1309
* We defer feeding in the
HRR
until later. We'll do it as part of
1798
/* If we did an
HRR
then supported versions is mandatory */
2198
size_t hashlen, const unsigned char *
hrr
,
2234
* Now re-inject the
HRR
and current message if appropriate (we just deleted
2238
if (
hrr
!= NULL
2239
&& (!ssl3_finish_mac(s,
hrr
, hrrlen)
statem_local.h
60
size_t hashlen, const unsigned char *
hrr
,
/src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_srvr.c
615
* If we set a group_id already, then we must have sent an
HRR
639
* If we sent an
HRR
then the key_share sent back MUST be for the group
703
unsigned char
hrr
[MAX_HRR_SIZE];
local
829
* Reconstruct the
HRR
that we would have sent in response to the original
831
* Note: This won't work with custom
HRR
extensions
833
if (!WPACKET_init_static_len(&hrrpkt,
hrr
, sizeof(
hrr
), 0)) {
884
PACKET_remaining(&chhash),
hrr
,
1754
/* Is there a key_share extension present in this
HRR
? */
statem_lib.c
32
/* Fixed value used in the ServerHello random field to identify an
HRR
*/
1323
* We defer feeding in the
HRR
until later. We'll do it as part of
1802
/* If we did an
HRR
then supported versions is mandatory */
2191
size_t hashlen, const unsigned char *
hrr
,
2227
* Now re-inject the
HRR
and current message if appropriate (we just deleted
2231
if (
hrr
!= NULL
2232
&& (!ssl3_finish_mac(s,
hrr
, hrrlen)
statem_clnt.c
548
* We only get here in TLSv1.3. We just received an
HRR
, so issue a
1335
/* ServerHello selected a different ciphersuite to that in the
HRR
*/
1381
int
hrr
= 0;
local
1405
hrr
= 1;
1440
if (PACKET_remaining(pkt) == 0 && !
hrr
) {
1448
if (!
hrr
) {
1463
if (SSL_IS_TLS13(s) ||
hrr
) {
1478
if (
hrr
) {
1758
* for
HRR
messages.
statem_local.h
68
size_t hashlen, const unsigned char *
hrr
,
/src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_srvr.c
684
* If we sent an
HRR
then the key_share sent back MUST be for the group
714
* We have sent a
HRR
, and the key share we got back is
721
/* We have selected a key share group via
HRR
, hence we're done here */
877
* If we set a group_id already, then we must have sent an
HRR
895
if (ks_extraction_result == EXTRACTION_SUCCESS_HRR) /* Successful
HRR
*/
910
* --> Yes: memorize group_id for
HRR
, break
949
* (and report group_id_candidate 'upward' for
HRR
)
1014
unsigned char
hrr
[MAX_HRR_SIZE];
local
1146
* Reconstruct the
HRR
that we would have sent in response to the original
1148
* Note: This won't work with custom
HRR
extension
[
all
...]
statem_clnt.c
595
* We only get here in TLSv1.3. We just received an
HRR
, so issue a
732
* This must be a second ClientHello after an
HRR
following an
1421
/* ServerHello selected a different ciphersuite to that in the
HRR
*/
1471
int
hrr
= 0;
local
1502
hrr
= 1;
1537
if (PACKET_remaining(pkt) == 0 && !
hrr
) {
1545
if (!
hrr
) {
1560
if (SSL_CONNECTION_IS_TLS13(s) ||
hrr
) {
1576
if (
hrr
) {
1892
* for
HRR
messages
[
all
...]
statem_lib.c
34
/* Fixed value used in the ServerHello random field to identify an
HRR
*/
1715
* We defer feeding in the
HRR
until later. We'll do it as part of
2212
/* If we did an
HRR
then supported versions is mandatory */
2630
size_t hashlen, const unsigned char *
hrr
,
2666
* Now re-inject the
HRR
and current message if appropriate (we just deleted
2670
if (
hrr
!= NULL
2671
&& (!ssl3_finish_mac(s,
hrr
, hrrlen)
statem_local.h
72
size_t hashlen, const unsigned char *
hrr
,
Completed in 43 milliseconds
Indexes created Sun Mar 01 05:31:48 UTC 2026