Home
last modified time | relevance | path

Searched refs:clienthello (Results 1 – 16 of 16) sorted by relevance

/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
H A D05-sni.conf11 test-6 = 6-SNI-bad-clienthello-sni-ignore-mismatch
12 test-7 = 7-SNI-bad-clienthello-sni-reject-mismatch
13 test-8 = 8-SNI-clienthello-disable-v12
209 [6-SNI-bad-clienthello-sni-ignore-mismatch]
210 ssl_conf = 6-SNI-bad-clienthello-sni-ignore-mismatch-ssl
212 [6-SNI-bad-clienthello-sni-ignore-mismatch-ssl]
213 server = 6-SNI-bad-clienthello-sni-ignore-mismatch-server
214 client = 6-SNI-bad-clienthello-sni-ignore-mismatch-client
215 server2 = 6-SNI-bad-clienthello-sni-ignore-mismatch-server
217 [6-SNI-bad-clienthello-sni-ignore-mismatch-server]
[all …]
H A D05-sni.conf.in114 name => "SNI-bad-clienthello-sni-ignore-mismatch",
131 name => "SNI-bad-clienthello-sni-reject-mismatch",
151 name => "SNI-clienthello-disable-v12",
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/
H A D05-sni.cnf11 test-6 = 6-SNI-bad-clienthello-sni-ignore-mismatch
12 test-7 = 7-SNI-bad-clienthello-sni-reject-mismatch
13 test-8 = 8-SNI-clienthello-disable-v12
209 [6-SNI-bad-clienthello-sni-ignore-mismatch]
210 ssl_conf = 6-SNI-bad-clienthello-sni-ignore-mismatch-ssl
212 [6-SNI-bad-clienthello-sni-ignore-mismatch-ssl]
213 server = 6-SNI-bad-clienthello-sni-ignore-mismatch-server
214 client = 6-SNI-bad-clienthello-sni-ignore-mismatch-client
215 server2 = 6-SNI-bad-clienthello-sni-ignore-mismatch-server
217 [6-SNI-bad-clienthello-sni-ignore-mismatch-server]
[all …]
H A D05-sni.cnf.in116 name => "SNI-bad-clienthello-sni-ignore-mismatch",
133 name => "SNI-bad-clienthello-sni-reject-mismatch",
153 name => "SNI-clienthello-disable-v12",
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/statem/
H A Dstatem_srvr.c1380 CLIENTHELLO_MSG *clienthello = NULL; in tls_process_client_hello() local
1399 clienthello = OPENSSL_zalloc(sizeof(*clienthello)); in tls_process_client_hello()
1400 if (clienthello == NULL) { in tls_process_client_hello()
1408 clienthello->isv2 = RECORD_LAYER_is_sslv2_record(&s->rlayer); in tls_process_client_hello()
1411 if (clienthello->isv2) { in tls_process_client_hello()
1447 if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) { in tls_process_client_hello()
1453 if (clienthello->isv2) { in tls_process_client_hello()
1474 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, in tls_process_client_hello()
1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello()
1483 clienthello->session_id_len = session_id_len; in tls_process_client_hello()
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/statem/
H A Dstatem_srvr.c1388 CLIENTHELLO_MSG *clienthello = NULL; in tls_process_client_hello() local
1408 clienthello = OPENSSL_zalloc(sizeof(*clienthello)); in tls_process_client_hello()
1409 if (clienthello == NULL) { in tls_process_client_hello()
1418 clienthello->isv2 = RECORD_LAYER_is_sslv2_record(&s->rlayer); in tls_process_client_hello()
1421 if (clienthello->isv2) { in tls_process_client_hello()
1459 if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) { in tls_process_client_hello()
1466 if (clienthello->isv2) { in tls_process_client_hello()
1489 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, in tls_process_client_hello()
1491 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello()
1499 clienthello->session_id_len = session_id_len; in tls_process_client_hello()
[all …]
H A Dextensions.c1739 if (s->server && sent && s->clienthello != NULL in final_psk()
1740 && !s->clienthello->pre_proc_exts[TLSEXT_IDX_psk_kex_modes].present) { in final_psk()
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D70-test_sslrecords.t340 my $clienthello;
374 $clienthello =
388 vec($clienthello, 1, 8) = 0x00;
389 vec($clienthello, 2, 8) = 0x02;
392 my $chlen = length $clienthello;
402 $clienthello,
403 $clienthello
409 $clienthello =
429 my $frag1 = substr $clienthello, 0, 6;
430 my $frag2 = substr $clienthello, 6, 32;
[all …]
H A D70-test_key_share.t265 my $clienthello = $proxy->message_list->[0];
267 && !defined $clienthello->extension_data->{TLSProxy::Message::EXT_KEY_SHARE},
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D70-test_sslrecords.t318 my $clienthello;
352 $clienthello =
366 vec($clienthello, 1, 8) = 0x00;
367 vec($clienthello, 2, 8) = 0x02;
370 my $chlen = length $clienthello;
380 $clienthello,
381 $clienthello
387 $clienthello =
407 my $frag1 = substr $clienthello, 0, 6;
408 my $frag2 = substr $clienthello, 6, 32;
[all …]
H A D70-test_key_share.t211 my $clienthello = $proxy->message_list->[0];
213 && !defined $clienthello->extension_data->{TLSProxy::Message::EXT_KEY_SHARE},
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/
H A Dssl_lib.c1209 if (s->clienthello != NULL) in SSL_free()
1210 OPENSSL_free(s->clienthello->pre_proc_exts); in SSL_free()
1211 OPENSSL_free(s->clienthello); in SSL_free()
5135 if (s->clienthello == NULL) in SSL_client_hello_isv2()
5137 return s->clienthello->isv2; in SSL_client_hello_isv2()
5142 if (s->clienthello == NULL) in SSL_client_hello_get0_legacy_version()
5144 return s->clienthello->legacy_version; in SSL_client_hello_get0_legacy_version()
5149 if (s->clienthello == NULL) in SSL_client_hello_get0_random()
5152 *out = s->clienthello->random; in SSL_client_hello_get0_random()
5158 if (s->clienthello == NULL) in SSL_client_hello_get0_session_id()
[all …]
H A Dssl_local.h1373 CLIENTHELLO_MSG *clienthello; member
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/
H A Dssl_local.h1689 CLIENTHELLO_MSG *clienthello; member
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/err/
H A Dopenssl.txt1301 SSL_R_CLIENTHELLO_TLSEXT:226:clienthello tlsext
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/err/
H A Dopenssl.txt2664 SSL_R_CLIENTHELLO_TLSEXT:226:clienthello tlsext