1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
b0VIM 7.4 b��W��- �� jbp debian ~jbp/rustls/src/server_hs.rs utf-8
3210 #"! U tp h w i X � ] 8 p � X ad � h � x D � � � B �
�
�
b
!
� � h - � � � � � � � m Q P < . -
�
�
�
z
h
_
O
I
E
B
A
� � � H # � � � � � U 9 8 + � � � I H � � � S 4
� � } o h d c O � � � C B & � � � � � � k ; � � R N M 8 � � � payload: MessagePayload::Handshake( version: ProtocolVersion::TLSv1_2, typ: ContentType::Handshake, let sh = Message { } sess.handshake_data.session_id = sessid; .generate(); let sessid = sess.config.session_storage.lock().unwrap() if sess.handshake_data.session_id.is_empty() { let extensions = try!(process_extensions(sess, hello)); sess.handshake_data.generate_server_random(); fn emit_server_hello(sess: &mut ServerSessionImpl, hello: &ClientHelloPayload) -> Result<(), TLSError> { } Ok(ret) } ret.push(ServerExtension::make_empty_renegotiation_info()); if secure_reneg_offered { hello.cipher_suites.contains(&CipherSuite::TLS_EMPTY_RENEGOTIATION_INFO_SCSV); hello.find_extension(ExtensionType::RenegotiationInfo).is_some() || let secure_reneg_offered = * (We don't do reneg at all, but would support the secure version if we did.) */