Lines Matching refs:ssl

15 #include <openssl/ssl.h>
51 SSL *const ssl = hs->ssl;
52 if (ssl->s3->tmp.message_type != SSL3_MT_HELLO_RETRY_REQUEST) {
59 CBS_init(&cbs, ssl->init_msg, ssl->init_num);
66 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
81 ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
91 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
104 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
111 tls1_get_grouplist(ssl, &groups, &groups_len);
121 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
129 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
148 SSL *const ssl = hs->ssl;
151 if (!ssl->method->set_write_state(ssl, NULL) ||
161 SSL *const ssl = hs->ssl;
162 if (!ssl_check_message_type(ssl, SSL3_MT_SERVER_HELLO)) {
169 CBS_init(&cbs, ssl->init_msg, ssl->init_num);
175 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
180 if (server_wire_version != ssl->version) {
181 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
186 assert(ssl->s3->have_version);
187 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_random),
193 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
198 if (SSL_CIPHER_get_min_version(cipher) > ssl3_protocol_version(ssl) ||
199 SSL_CIPHER_get_max_version(cipher) < ssl3_protocol_version(ssl)) {
201 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
217 ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
223 if (ssl->session == NULL) {
225 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_UNSUPPORTED_EXTENSION);
231 ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
235 if (ssl->session->ssl_version != ssl->version) {
237 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
241 if (ssl->session->cipher->algorithm_prf != cipher->algorithm_prf) {
243 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
247 if (!ssl_session_is_context_valid(ssl, ssl->session)) {
251 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER);
255 ssl->s3->session_reused = 1;
257 hs->new_session = SSL_SESSION_dup(ssl->session, SSL_SESSION_DUP_AUTH_ONLY);
259 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
264 ssl_session_renew_timeout(ssl, hs->new_session,
265 ssl->session_ctx->session_psk_dhe_timeout);
267 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
280 if (ssl->s3->session_reused) {
292 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_MISSING_EXTENSION);
302 ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
314 !tls13_set_traffic_key(ssl, evp_aead_open, hs->server_handshake_secret,
322 !tls13_set_traffic_key(ssl, evp_aead_seal, hs->client_handshake_secret,
332 SSL *const ssl = hs->ssl;
333 if (!ssl_check_message_type(ssl, SSL3_MT_ENCRYPTED_EXTENSIONS)) {
338 CBS_init(&cbs, ssl->init_msg, ssl->init_num);
345 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
350 if (ssl->s3->alpn_selected != NULL) {
352 BUF_memdup(ssl->s3->alpn_selected, ssl->s3->alpn_selected_len);
354 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
357 hs->new_session->early_alpn_len = ssl->s3->alpn_selected_len;
360 if (ssl->early_data_accepted) {
361 if (ssl->session->cipher != hs->new_session->cipher ||
362 ssl->session->early_alpn_len != ssl->s3->alpn_selected_len ||
363 OPENSSL_memcmp(ssl->session->early_alpn, ssl->s3->alpn_selected,
364 ssl->s3->alpn_selected_len) != 0) {
368 if (ssl->s3->tlsext_channel_id_valid) {
375 if (ssl->s3->session_reused) {
376 ssl_set_session(ssl, NULL);
388 SSL *const ssl = hs->ssl;
390 if (ssl->s3->session_reused) {
396 if (ssl->s3->tmp.message_type != SSL3_MT_CERTIFICATE_REQUEST) {
402 CBS_init(&cbs, ssl->init_msg, ssl->init_num);
409 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
416 ssl_parse_client_CA_list(ssl, &alert, &cbs);
418 ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
426 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
435 ssl->ctx->x509_method->hs_flush_cached_ca_names(hs);
446 SSL *const ssl = hs->ssl;
447 if (!ssl_check_message_type(ssl, SSL3_MT_CERTIFICATE) ||
459 SSL *const ssl = hs->ssl;
460 if (!ssl_check_message_type(ssl, SSL3_MT_CERTIFICATE_VERIFY) ||
471 SSL *const ssl = hs->ssl;
472 if (!ssl_check_message_type(ssl, SSL3_MT_FINISHED) ||
481 ssl->method->received_flight(ssl);
487 SSL *const ssl = hs->ssl;
489 if (ssl->early_data_accepted &&
490 !ssl->method->add_alert(ssl, SSL3_AL_WARNING,
496 !tls13_set_traffic_key(ssl, evp_aead_seal, hs->client_handshake_secret,
506 SSL *const ssl = hs->ssl;
515 if (ssl->cert->cert_cb != NULL) {
516 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);
518 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
528 if (!ssl->ctx->x509_method->ssl_auto_chain_if_needed(ssl) ||
539 SSL *const ssl = hs->ssl;
541 if (!ssl_has_certificate(ssl)) {
564 SSL *const ssl = hs->ssl;
567 if (ssl->s3->tlsext_channel_id_valid) {
568 if (!ssl_do_channel_id_callback(ssl)) {
573 if (ssl->tlsext_channel_id_private == NULL) {
578 if (!ssl->method->init_message(ssl, &cbb, &body, SSL3_MT_CHANNEL_ID) ||
580 !ssl_add_message_cbb(ssl, &cbb)) {
592 if (!tls13_set_traffic_key(ssl, evp_aead_open, hs->server_traffic_secret_0,
594 !tls13_set_traffic_key(ssl, evp_aead_seal, hs->client_traffic_secret_0,
661 int tls13_process_new_session_ticket(SSL *ssl) {
663 SSL_SESSION *session = SSL_SESSION_dup(ssl->s3->established_session,
669 ssl_session_rebase_time(ssl, session);
673 CBS_init(&cbs, ssl->init_msg, ssl->init_num);
680 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
703 ssl3_send_alert(ssl, SSL3_AL_FATAL, alert);
707 if (have_early_data_info && ssl->ctx->enable_early_data) {
710 ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
719 if (ssl->ctx->new_session_cb != NULL &&
720 ssl->ctx->new_session_cb(ssl, session)) {