Lines Matching defs:handshake
63 MBEDTLS_SSL_DEBUG_MSG(1, ("Receive unexpected handshake message."));
71 * Jump handshake header (4 bytes, see Section 4 of RFC 8446).
254 * certificates and decides to abort the handshake, then it MUST abort the
255 * handshake with an appropriate certificate-related alert
326 * If the verification fails, the receiver MUST terminate the handshake
360 (mbedtls_md_type_t) ssl->handshake->ciphersuite_info->mac,
370 MBEDTLS_SSL_DEBUG_BUF(3, "handshake hash", transcript, transcript_len);
449 mbedtls_ssl_handshake_params *handshake = ssl->handshake;
552 handshake->received_extensions = MBEDTLS_SSL_EXT_MASK_NONE;
590 handshake->received_extensions);
641 if (ssl->handshake->sni_authmode != MBEDTLS_SSL_VERIFY_UNSET) {
642 authmode = ssl->handshake->sni_authmode;
687 if (ssl->handshake->sni_ca_chain != NULL) {
688 ca_chain = ssl->handshake->sni_ca_chain;
689 ca_crl = ssl->handshake->sni_ca_crl;
869 ssl->handshake->certificate_request_context;
871 ssl->handshake->certificate_request_context_len;
920 3, MBEDTLS_SSL_HS_CERTIFICATE, ssl->handshake->sent_extensions);
1014 uint16_t *sig_alg = ssl->handshake->received_sig_algs;
1026 ssl, (mbedtls_md_type_t) ssl->handshake->ciphersuite_info->mac,
1032 MBEDTLS_SSL_DEBUG_BUF(3, "handshake hash",
1171 ssl->handshake->state_local.finished_in.digest,
1172 sizeof(ssl->handshake->state_local.finished_in.digest),
1173 &ssl->handshake->state_local.finished_in.digest_len,
1195 ssl->handshake->state_local.finished_in.digest;
1197 ssl->handshake->state_local.finished_in.digest_len;
1237 /* Preprocessing step: Compute handshake digest */
1266 /* Compute transcript of handshake up to now. */
1268 ssl->handshake->state_local.finished_out.digest,
1269 sizeof(ssl->handshake->state_local.finished_out.
1271 &ssl->handshake->state_local.finished_out.digest_len,
1288 size_t verify_data_len = ssl->handshake->state_local.finished_out.digest_len;
1296 memcpy(buf, ssl->handshake->state_local.finished_out.digest,
1334 MBEDTLS_SSL_DEBUG_MSG(3, ("=> handshake wrapup"));
1352 MBEDTLS_SSL_DEBUG_MSG(3, ("<= handshake wrapup"));
1383 if (ssl->handshake->ccs_sent) {
1399 ssl->handshake->ccs_sent = 1;
1463 * This function should be called only while an handshake is in progress
1513 * A few states of the handshake are preserved, including:
1524 ssl->handshake->ciphersuite_info;
1544 MBEDTLS_SSL_DEBUG_BUF(4, "Truncated handshake transcript",
1553 ret = ssl->handshake->update_checksum(ssl, hash_transcript, hash_len);
1570 mbedtls_ssl_handshake_params *handshake = ssl->handshake;
1581 if (peerkey_len > sizeof(handshake->xxdh_psa_peerkey)) {
1584 sizeof(handshake->xxdh_psa_peerkey)));
1587 memcpy(handshake->xxdh_psa_peerkey, p, peerkey_len);
1588 handshake->xxdh_psa_peerkey_len = peerkey_len;
1645 mbedtls_ssl_handshake_params *handshake = ssl->handshake;
1675 handshake->xxdh_psa_type = key_type;
1676 ssl->handshake->xxdh_psa_bits = bits;
1681 psa_set_key_type(&key_attributes, handshake->xxdh_psa_type);
1682 psa_set_key_bits(&key_attributes, handshake->xxdh_psa_bits);
1686 &handshake->xxdh_psa_privkey);
1695 status = psa_export_public_key(handshake->xxdh_psa_privkey,
1714 * not specified for the message in which it appears, it MUST abort the handshake
1739 ssl->handshake->received_extensions |= extension_mask;
1750 if ((ssl->handshake->sent_extensions & extension_mask) != 0) {