HomeSort by: relevance | last modified time | path
    Searched refs:hrr (Results 1 - 16 of 16) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/test/recipes/
70-test_tls13hrr.t 46 # HRR and the SH
59 # we end up selecting a different ciphersuite between HRR and the SH
72 # sends more than 1 HRR
82 ok($fatal_alert, "Server duplicated HRR");
86 # and not consider it when sending the HRR. We send brainpoolP512r1 in
88 # TLSv1.3. We expect the server to select P-521 in the HRR and the
99 ok(TLSProxy::Message->success(), "Invalid group with HRR");
102 #Test 5: A failure should occur if an HRR is sent without the supported_versions
113 ok($fatal_alert, "supported_versions missing from HRR");
120 # We're only interested in the HRR
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
70-test_tls13hrr.t 46 # HRR and the SH
59 # we end up selecting a different ciphersuite between HRR and the SH
72 # sends more than 1 HRR
82 ok($fatal_alert, "Server duplicated HRR");
86 # and not consider it when sending the HRR. We send brainpoolP512r1 in
88 # TLSv1.3. We expect the server to select X25519 in the HRR and the
99 ok(TLSProxy::Message->success(), "Invalid group with HRR");
107 # We're only interested in the HRR
112 my $hrr = ${$proxy->message_list}[1];
117 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
70-test_tls13hrr.t 45 # HRR and the SH
54 # we end up selecting a different ciphersuite between HRR and the SH
63 # sends more than 1 HRR
73 ok($fatal_alert, "Server duplicated HRR");
80 # We're only interested in the HRR
85 my $hrr = ${$proxy->message_list}[1];
90 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
91 $hrr->repack();
96 # We're only interested in the HRR
107 # Find ServerHello record (HRR actually) and insert after tha
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
10-resumption.conf 69 test-64 = 64-resumption-with-hrr
2411 [64-resumption-with-hrr]
2412 ssl_conf = 64-resumption-with-hrr-ssl
2414 [64-resumption-with-hrr-ssl]
2415 server = 64-resumption-with-hrr-server
2416 client = 64-resumption-with-hrr-client
2417 resume-server = 64-resumption-with-hrr-server
2418 resume-client = 64-resumption-with-hrr-resume-client
2420 [64-resumption-with-hrr-server]
2426 [64-resumption-with-hrr-client
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_clnt.c 551 * We only get here in TLSv1.3. We just received an HRR, so issue a
1359 /* ServerHello selected a different ciphersuite to that in the HRR */
1405 int hrr = 0; local
1431 hrr = 1;
1472 if (PACKET_remaining(pkt) == 0 && !hrr) {
1481 if (!hrr) {
1496 if (SSL_IS_TLS13(s) || hrr) {
1513 if (hrr) {
1806 * for HRR messages.
extensions_srvr.c 658 * If we set a group_id already, then we must have sent an HRR
684 * If we sent an HRR then the key_share sent back MUST be for the group
742 unsigned char hrr[MAX_HRR_SIZE]; local
879 * Reconstruct the HRR that we would have sent in response to the original
881 * Note: This won't work with custom HRR extensions
883 if (!WPACKET_init_static_len(&hrrpkt, hrr, sizeof(hrr), 0)) {
939 PACKET_remaining(&chhash), hrr,
1800 /* Is there a key_share extension present in this HRR? */
statem_lib.c 30 /* Fixed value used in the ServerHello random field to identify an HRR */
1309 * We defer feeding in the HRR until later. We'll do it as part of
1798 /* If we did an HRR then supported versions is mandatory */
2198 size_t hashlen, const unsigned char *hrr,
2234 * Now re-inject the HRR and current message if appropriate (we just deleted
2238 if (hrr != NULL
2239 && (!ssl3_finish_mac(s, hrr, hrrlen)
statem_local.h 60 size_t hashlen, const unsigned char *hrr,
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_srvr.c 615 * If we set a group_id already, then we must have sent an HRR
639 * If we sent an HRR then the key_share sent back MUST be for the group
703 unsigned char hrr[MAX_HRR_SIZE]; local
829 * Reconstruct the HRR that we would have sent in response to the original
831 * Note: This won't work with custom HRR extensions
833 if (!WPACKET_init_static_len(&hrrpkt, hrr, sizeof(hrr), 0)) {
884 PACKET_remaining(&chhash), hrr,
1754 /* Is there a key_share extension present in this HRR? */
statem_lib.c 32 /* Fixed value used in the ServerHello random field to identify an HRR */
1323 * We defer feeding in the HRR until later. We'll do it as part of
1802 /* If we did an HRR then supported versions is mandatory */
2191 size_t hashlen, const unsigned char *hrr,
2227 * Now re-inject the HRR and current message if appropriate (we just deleted
2231 if (hrr != NULL
2232 && (!ssl3_finish_mac(s, hrr, hrrlen)
statem_clnt.c 548 * We only get here in TLSv1.3. We just received an HRR, so issue a
1335 /* ServerHello selected a different ciphersuite to that in the HRR */
1381 int hrr = 0; local
1405 hrr = 1;
1440 if (PACKET_remaining(pkt) == 0 && !hrr) {
1448 if (!hrr) {
1463 if (SSL_IS_TLS13(s) || hrr) {
1478 if (hrr) {
1758 * for HRR messages.
statem_local.h 68 size_t hashlen, const unsigned char *hrr,
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_srvr.c 684 * If we sent an HRR then the key_share sent back MUST be for the group
714 * We have sent a HRR, and the key share we got back is
721 /* We have selected a key share group via HRR, hence we're done here */
877 * If we set a group_id already, then we must have sent an HRR
895 if (ks_extraction_result == EXTRACTION_SUCCESS_HRR) /* Successful HRR */
910 * --> Yes: memorize group_id for HRR, break
949 * (and report group_id_candidate 'upward' for HRR)
1014 unsigned char hrr[MAX_HRR_SIZE]; local
1146 * Reconstruct the HRR that we would have sent in response to the original
1148 * Note: This won't work with custom HRR extension
    [all...]
statem_clnt.c 595 * We only get here in TLSv1.3. We just received an HRR, so issue a
732 * This must be a second ClientHello after an HRR following an
1421 /* ServerHello selected a different ciphersuite to that in the HRR */
1471 int hrr = 0; local
1502 hrr = 1;
1537 if (PACKET_remaining(pkt) == 0 && !hrr) {
1545 if (!hrr) {
1560 if (SSL_CONNECTION_IS_TLS13(s) || hrr) {
1576 if (hrr) {
1892 * for HRR messages
    [all...]
statem_lib.c 34 /* Fixed value used in the ServerHello random field to identify an HRR */
1715 * We defer feeding in the HRR until later. We'll do it as part of
2212 /* If we did an HRR then supported versions is mandatory */
2630 size_t hashlen, const unsigned char *hrr,
2666 * Now re-inject the HRR and current message if appropriate (we just deleted
2670 if (hrr != NULL
2671 && (!ssl3_finish_mac(s, hrr, hrrlen)
statem_local.h 72 size_t hashlen, const unsigned char *hrr,

Completed in 43 milliseconds