Lines Matching full:s3
55 if (ilen != s->s3.previous_client_finished_len) {
60 if (memcmp(data, s->s3.previous_client_finished,
61 s->s3.previous_client_finished_len)) {
66 s->s3.send_connection_binding = 1;
418 s->s3.npn_seen = 1;
452 OPENSSL_free(s->s3.alpn_proposed);
453 s->s3.alpn_proposed = NULL;
454 s->s3.alpn_proposed_len = 0;
456 &s->s3.alpn_proposed, &s->s3.alpn_proposed_len)) {
588 if (s->s3.peer_tmp != NULL) {
613 if (s->s3.group_id != 0 && PACKET_remaining(&key_share_list) == 0) {
642 if (s->s3.group_id != 0
643 && (group_id != s->s3.group_id
668 if ((s->s3.peer_tmp = ssl_generate_param_group(s, group_id)) == NULL) {
674 s->s3.group_id = group_id;
678 if (tls13_set_encoded_pub_key(s->s3.peer_tmp,
709 || (s->s3.flags & TLS1_FLAGS_STATELESS) == 0)
794 if (group_id != s->s3.group_id
795 || s->s3.tmp.new_cipher
843 || !s->method->put_cipher_by_char(s->s3.tmp.new_cipher, &hrrpkt,
862 || !WPACKET_put_bytes_u16(&hrrpkt, s->s3.group_id)
939 s->s3.flags |= TLS1_FLAGS_RECEIVED_EXTMS;
1174 s->s3.tmp.new_cipher->algorithm2)))) {
1247 if (!s->s3.send_connection_binding)
1254 || !WPACKET_memcpy(pkt, s->s3.previous_client_finished,
1255 s->s3.previous_client_finished_len)
1256 || !WPACKET_memcpy(pkt, s->s3.previous_server_finished,
1257 s->s3.previous_server_finished_len)
1317 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
1318 unsigned long alg_a = s->s3.tmp.new_cipher->algorithm_auth;
1347 /* s->s3.group_id is non zero if we accepted a key_share */
1348 if (s->s3.group_id == 0)
1370 if (s->s3.group_id == group)
1464 int npn_seen = s->s3.npn_seen;
1466 s->s3.npn_seen = 0;
1478 s->s3.npn_seen = 1;
1489 if (s->s3.alpn_selected == NULL)
1496 || !WPACKET_sub_memcpy_u8(pkt, s->s3.alpn_selected,
1497 s->s3.alpn_selected_len)
1539 if (s->s3.tmp.new_cipher->algorithm_mac == SSL_AEAD
1540 || s->s3.tmp.new_cipher->algorithm_enc == SSL_RC4
1541 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT
1542 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT12
1543 || s->s3.tmp.new_cipher->algorithm_enc == SSL_MAGMA
1544 || s->s3.tmp.new_cipher->algorithm_enc == SSL_KUZNYECHIK) {
1561 if ((s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) == 0)
1600 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL;
1610 || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)
1637 || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)) {
1642 if ((ginf = tls1_group_id_lookup(s->ctx, s->s3.group_id)) == NULL) {
1675 s->s3.tmp.pkey = skey;
1688 * The generated pms is stored in `s->s3.tmp.pms` to be later used via
1713 if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) {
1718 s->s3.did_kex = 1;
1736 if ((s->s3.flags & TLS1_FLAGS_STATELESS) == 0)
1751 || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)
1752 || !s->method->put_cipher_by_char(s->s3.tmp.new_cipher, pkt,
1755 || !WPACKET_put_bytes_u8(pkt, s->s3.peer_tmp == NULL)
1862 if (((s->s3.tmp.new_cipher->id & 0xFFFF) != 0x80
1863 && (s->s3.tmp.new_cipher->id & 0xFFFF) != 0x81)