• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/openssl/ssl/statem/

Lines Matching refs:pkt

44 static int tls_construct_encrypted_extensions(SSL *s, WPACKET *pkt);
1018 int ossl_statem_server_construct_message(SSL *s, WPACKET *pkt,
1182 MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt)
1195 return tls_process_client_hello(s, pkt);
1198 return tls_process_end_of_early_data(s, pkt);
1201 return tls_process_client_certificate(s, pkt);
1204 return tls_process_client_key_exchange(s, pkt);
1207 return tls_process_cert_verify(s, pkt);
1211 return tls_process_next_proto(s, pkt);
1215 return tls_process_change_cipher_spec(s, pkt);
1218 return tls_process_finished(s, pkt);
1221 return tls_process_key_update(s, pkt);
1285 int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie,
1289 if (!WPACKET_put_bytes_u16(pkt, DTLS1_VERSION)
1290 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len))
1296 int dtls_construct_hello_verify_request(SSL *s, WPACKET *pkt)
1309 if (!dtls_raw_hello_verify_request(pkt, s->d1->cookie,
1383 MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt)
1446 if (!PACKET_get_1(pkt, &mt)
1459 if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) {
1475 if (!PACKET_get_net_2(pkt, &ciphersuite_len)
1476 || !PACKET_get_net_2(pkt, &session_id_len)
1477 || !PACKET_get_net_2(pkt, &challenge_len)) {
1489 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites,
1491 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len)
1492 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len)
1494 || PACKET_remaining(pkt) != 0) {
1522 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE)
1523 || !PACKET_get_length_prefixed_1(pkt, &session_id)
1533 if (!PACKET_get_length_prefixed_1(pkt, &cookie)) {
1558 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
1564 if (!PACKET_get_length_prefixed_1(pkt, &compression)) {
1571 if (PACKET_remaining(pkt) == 0) {
1574 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->extensions)
1575 || PACKET_remaining(pkt) != 0) {
2365 int tls_construct_server_hello(SSL *s, WPACKET *pkt)
2374 if (!WPACKET_put_bytes_u16(pkt, version)
2379 || !WPACKET_memcpy(pkt,
2435 if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl)
2436 || !s->method->put_cipher_by_char(s->s3->tmp.new_cipher, pkt, &len)
2437 || !WPACKET_put_bytes_u8(pkt, compm)) {
2443 if (!tls_construct_extensions(s, pkt,
2477 int tls_construct_server_done(SSL *s, WPACKET *pkt)
2488 int tls_construct_server_key_exchange(SSL *s, WPACKET *pkt)
2506 if (!WPACKET_get_total_written(pkt, &paramoffset)) {
2686 || !WPACKET_sub_memcpy_u16(pkt, s->cert->psk_identity_hint,
2702 res = WPACKET_start_sub_packet_u8(pkt);
2705 res = WPACKET_start_sub_packet_u16(pkt);
2724 if (!WPACKET_allocate_bytes(pkt, len, &binval)) {
2734 if (!WPACKET_allocate_bytes(pkt, BN_num_bytes(r[i]), &binval)
2735 || !WPACKET_close(pkt)) {
2753 if (!WPACKET_put_bytes_u8(pkt, NAMED_CURVE_TYPE)
2754 || !WPACKET_put_bytes_u8(pkt, 0)
2755 || !WPACKET_put_bytes_u8(pkt, curve_id)
2756 || !WPACKET_sub_memcpy_u8(pkt, encodedPoint, encodedlen)) {
2783 if (!WPACKET_get_length(pkt, &paramlen)) {
2790 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
2803 if (!WPACKET_sub_reserve_bytes_u16(pkt, siglen, &sigbytes1)
2828 if (rv <= 0 || !WPACKET_sub_allocate_bytes_u16(pkt, siglen, &sigbytes2)
2850 int tls_construct_certificate_request(SSL *s, WPACKET *pkt)
2865 || !WPACKET_sub_memcpy_u8(pkt, s->pha_context,
2878 if (!WPACKET_put_bytes_u8(pkt, 0)) {
2886 if (!tls_construct_extensions(s, pkt,
2896 if (!WPACKET_start_sub_packet_u8(pkt)
2897 || !ssl3_get_req_cert_type(s, pkt) || !WPACKET_close(pkt)) {
2907 if (!WPACKET_start_sub_packet_u16(pkt)
2908 || !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH)
2909 || !tls12_copy_sigalgs(s, pkt, psigs, nl)
2910 || !WPACKET_close(pkt)) {
2918 if (!construct_ca_names(s, get_ca_names(s), pkt)) {
2929 static int tls_process_cke_psk_preamble(SSL *s, PACKET *pkt)
2936 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) {
2997 static int tls_process_cke_rsa(SSL *s, PACKET *pkt)
3018 enc_premaster = *pkt;
3020 if (!PACKET_get_length_prefixed_2(pkt, &enc_premaster)
3021 || PACKET_remaining(pkt) != 0) {
3168 static int tls_process_cke_dhe(SSL *s, PACKET *pkt)
3179 if (!PACKET_get_net_2(pkt, &i) || PACKET_remaining(pkt) != i) {
3191 if (PACKET_remaining(pkt) == 0L) {
3196 if (!PACKET_get_bytes(pkt, &data, i)) {
3237 static int tls_process_cke_ecdhe(SSL *s, PACKET *pkt)
3244 if (PACKET_remaining(pkt) == 0L) {
3259 if (!PACKET_get_1(pkt, &i) || !PACKET_get_bytes(pkt, &data, i)
3260 || PACKET_remaining(pkt) != 0) {
3304 static int tls_process_cke_srp(SSL *s, PACKET *pkt)
3310 if (!PACKET_get_net_2(pkt, &i)
3311 || !PACKET_get_bytes(pkt, &data, i)) {
3348 static int tls_process_cke_gost(SSL *s, PACKET *pkt)
3401 ptr = PACKET_data(pkt);
3404 pKX = d2i_GOST_KX_MESSAGE(NULL, &ptr, PACKET_remaining(pkt));
3413 if (!PACKET_forward(pkt, ptr - PACKET_data(pkt))) {
3419 if (PACKET_remaining(pkt) != 0) {
3458 MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt)
3465 if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) {
3472 if (PACKET_remaining(pkt) != 0) {
3484 if (!tls_process_cke_rsa(s, pkt)) {
3489 if (!tls_process_cke_dhe(s, pkt)) {
3494 if (!tls_process_cke_ecdhe(s, pkt)) {
3499 if (!tls_process_cke_srp(s, pkt)) {
3504 if (!tls_process_cke_gost(s, pkt)) {
3591 MSG_PROCESS_RETURN tls_process_client_certificate(SSL *s, PACKET *pkt)
3616 if (SSL_IS_TLS13(s) && (!PACKET_get_length_prefixed_1(pkt, &context)
3625 if (!PACKET_get_length_prefixed_3(pkt, &spkt)
3626 || PACKET_remaining(pkt) != 0) {
3793 int tls_construct_server_certificate(SSL *s, WPACKET *pkt)
3807 if (SSL_IS_TLS13(s) && !WPACKET_put_bytes_u8(pkt, 0)) {
3812 if (!ssl3_output_cert_chain(s, pkt, cpk)) {
3820 static int create_ticket_prequel(SSL *s, WPACKET *pkt, uint32_t age_add,
3829 if (!WPACKET_put_bytes_u32(pkt,
3838 if (!WPACKET_put_bytes_u32(pkt, age_add)
3839 || !WPACKET_sub_memcpy_u8(pkt, tick_nonce, TICKET_NONCE_SIZE)) {
3847 if (!WPACKET_start_sub_packet_u16(pkt)) {
3856 static int construct_stateless_ticket(SSL *s, WPACKET *pkt, uint32_t age_add,
3946 if (!WPACKET_put_bytes_u32(pkt, 0)
3947 || !WPACKET_put_bytes_u16(pkt, 0)) {
3982 if (!create_ticket_prequel(s, pkt, age_add, tick_nonce)) {
3987 if (!WPACKET_get_total_written(pkt, &macoffset)
3989 || !WPACKET_memcpy(pkt, key_name, sizeof(key_name))
3991 || !WPACKET_memcpy(pkt, iv, iv_len)
3992 || !WPACKET_reserve_bytes(pkt, slen + EVP_MAX_BLOCK_LENGTH,
3996 || !WPACKET_allocate_bytes(pkt, len, &encdata2)
3999 || !WPACKET_allocate_bytes(pkt, lenfinal, &encdata2)
4002 || !WPACKET_get_total_written(pkt, &macendoffset)
4006 || !WPACKET_reserve_bytes(pkt, EVP_MAX_MD_SIZE, &macdata1)
4009 || !WPACKET_allocate_bytes(pkt, hlen, &macdata2)
4017 if (!WPACKET_close(pkt)) {
4031 static int construct_stateful_ticket(SSL *s, WPACKET *pkt, uint32_t age_add,
4034 if (!create_ticket_prequel(s, pkt, age_add, tick_nonce)) {
4039 if (!WPACKET_memcpy(pkt, s->session->session_id,
4041 || !WPACKET_close(pkt)) {
4050 int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt)
4154 if (!construct_stateful_ticket(s, pkt, age_add_u.age_add, tick_nonce)) {
4158 } else if (!construct_stateless_ticket(s, pkt, age_add_u.age_add,
4165 if (!tls_construct_extensions(s, pkt,
4190 int tls_construct_cert_status_body(SSL *s, WPACKET *pkt)
4192 if (!WPACKET_put_bytes_u8(pkt, s->ext.status_type)
4193 || !WPACKET_sub_memcpy_u24(pkt, s->ext.ocsp.resp,
4203 int tls_construct_cert_status(SSL *s, WPACKET *pkt)
4205 if (!tls_construct_cert_status_body(s, pkt)) {
4218 MSG_PROCESS_RETURN tls_process_next_proto(SSL *s, PACKET *pkt)
4230 if (!PACKET_get_length_prefixed_1(pkt, &next_proto)
4231 || !PACKET_get_length_prefixed_1(pkt, &padding)
4232 || PACKET_remaining(pkt) > 0) {
4251 static int tls_construct_encrypted_extensions(SSL *s, WPACKET *pkt)
4253 if (!tls_construct_extensions(s, pkt, SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS,
4262 MSG_PROCESS_RETURN tls_process_end_of_early_data(SSL *s, PACKET *pkt)
4264 if (PACKET_remaining(pkt) != 0) {