Lines Matching defs:handshake
357 ssl->handshake->min_tls_version,
443 mbedtls_ssl_handshake_params *handshake = ssl->handshake;
455 (handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_2)
461 (handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_3)
481 * the handshake->randbytes buffer and are copied here into the output
485 memcpy(p, handshake->randbytes, MBEDTLS_CLIENT_HELLO_RANDOM_LEN);
527 if (handshake->cookie != NULL) {
529 handshake->cookie,
530 handshake->cookie_len);
531 cookie_len = handshake->cookie_len;
537 memcpy(p, handshake->cookie, cookie_len);
570 handshake->sent_extensions = MBEDTLS_SSL_EXT_MASK_NONE;
702 unsigned char *randbytes = ssl->handshake->randbytes;
751 if (ssl->handshake->resume != 0 &&
761 ssl->handshake->resume = 0;
773 ssl->handshake->min_tls_version = ssl->tls_version;
777 if (ssl->handshake->resume) {
779 ssl->handshake->min_tls_version = ssl->tls_version;
781 ssl->handshake->min_tls_version = ssl->conf->min_tls_version;
792 (ssl->handshake->cookie == NULL))
796 if (!ssl->handshake->hello_retry_request_flag)
821 ssl->handshake->resume == 0) {
885 ssl->handshake->resume) {
910 * Write ClientHello handshake message.
942 * set the handshake state to the next state at that point to ensure
968 ret = ssl->handshake->update_checksum(ssl, buf, msg_len - binders_len);
978 ret = ssl->handshake->update_checksum(ssl, buf + msg_len - binders_len,
998 if (ssl->handshake->min_tls_version <= MBEDTLS_SSL_VERSION_TLS1_3 &&
1007 3, MBEDTLS_SSL_HS_CLIENT_HELLO, ssl->handshake->sent_extensions);