Lines Matching defs:clienthello
1380 CLIENTHELLO_MSG *clienthello = NULL;
1399 clienthello = OPENSSL_zalloc(sizeof(*clienthello));
1400 if (clienthello == NULL) {
1408 clienthello->isv2 = RECORD_LAYER_is_sslv2_record(&s->rlayer);
1411 if (clienthello->isv2) {
1447 if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) {
1453 if (clienthello->isv2) {
1474 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites,
1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len)
1483 clienthello->session_id_len = session_id_len;
1486 * here rather than sizeof(clienthello->random) because that is the limit
1488 * sizeof(clienthello->random) does.
1492 memset(clienthello->random, 0, SSL3_RANDOM_SIZE);
1494 clienthello->random + SSL3_RANDOM_SIZE -
1502 PACKET_null_init(&clienthello->extensions);
1505 if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE)
1507 || !PACKET_copy_all(&session_id, clienthello->session_id,
1509 &clienthello->session_id_len)) {
1519 if (!PACKET_copy_all(&cookie, clienthello->dtls_cookie,
1521 &clienthello->dtls_cookie_len)) {
1531 if (clienthello->dtls_cookie_len == 0) {
1532 OPENSSL_free(clienthello);
1538 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) {
1550 PACKET_null_init(&clienthello->extensions);
1552 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->extensions)
1560 if (!PACKET_copy_all(&compression, clienthello->compressions,
1562 &clienthello->compressions_len)) {
1568 extensions = clienthello->extensions;
1570 &clienthello->pre_proc_exts,
1571 &clienthello->pre_proc_exts_len, 1)) {
1575 s->clienthello = clienthello;
1580 if (clienthello != NULL)
1581 OPENSSL_free(clienthello->pre_proc_exts);
1582 OPENSSL_free(clienthello);
1600 CLIENTHELLO_MSG *clienthello = s->clienthello;
1621 memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE);
1625 if (clienthello->isv2) {
1626 if (clienthello->legacy_version == SSL2_VERSION
1627 || (clienthello->legacy_version & 0xff00)
1637 s->client_version = clienthello->legacy_version;
1644 protverr = ssl_choose_server_version(s, clienthello, &dgrd);
1646 DTLS_VERSION_LT((int)clienthello->legacy_version, s->version)) {
1655 s->version = s->client_version = clienthello->legacy_version;
1671 if (s->ctx->app_verify_cookie_cb(s, clienthello->dtls_cookie,
1672 clienthello->dtls_cookie_len) == 0) {
1679 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len
1680 || memcmp(clienthello->dtls_cookie, s->d1->cookie,
1688 protverr = ssl_choose_server_version(s, clienthello, &dgrd);
1699 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites,
1700 clienthello->isv2) ||
1701 !bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs,
1702 clienthello->isv2, 1)) {
1761 clienthello->pre_proc_exts, NULL, 0)) {
1782 if (clienthello->isv2 ||
1790 i = ssl_get_prev_session(s, clienthello);
1807 memcpy(s->tmp_session_id, s->clienthello->session_id,
1808 s->clienthello->session_id_len);
1809 s->tmp_session_id_len = s->clienthello->session_id_len;
1847 for (loop = 0; loop < clienthello->compressions_len; loop++) {
1848 if (clienthello->compressions[loop] == 0)
1852 if (loop >= clienthello->compressions_len) {
1859 ssl_check_for_safari(s, clienthello);
1863 clienthello->pre_proc_exts, NULL, 0, 1)) {
1937 if (clienthello->compressions_len != 1) {
1969 for (k = 0; k < clienthello->compressions_len; k++) {
1970 if (clienthello->compressions[k] == comp_id)
1973 if (k >= clienthello->compressions_len) {
1989 for (o = 0; o < clienthello->compressions_len; o++) {
1990 if (v == clienthello->compressions[o]) {
2042 OPENSSL_free(clienthello->pre_proc_exts);
2043 OPENSSL_free(s->clienthello);
2044 s->clienthello = NULL;
2049 OPENSSL_free(clienthello->pre_proc_exts);
2050 OPENSSL_free(s->clienthello);
2051 s->clienthello = NULL;