HomeSort by: relevance | last modified time | path
    Searched refs:DTLS1_BAD_VER (Results 1 - 25 of 55) sorted by relevancy

1 2 3

  /src/crypto/external/apache2/openssl/dist/include/openssl/
prov_ssl.h 30 #define DTLS1_BAD_VER 0x0100
  /src/crypto/external/bsd/openssl/dist/include/openssl/
prov_ssl.h 29 # define DTLS1_BAD_VER 0x0100
  /src/crypto/external/bsd/openssl.old/dist/include/openssl/
dtls1.h 23 # define DTLS1_BAD_VER 0x0100
  /src/crypto/external/apache2/openssl/dist/ssl/
s3_lib.c 193 DTLS1_BAD_VER,
211 DTLS1_BAD_VER,
231 DTLS1_BAD_VER,
249 DTLS1_BAD_VER,
267 DTLS1_BAD_VER,
285 DTLS1_BAD_VER,
304 DTLS1_BAD_VER,
322 DTLS1_BAD_VER,
340 DTLS1_BAD_VER,
358 DTLS1_BAD_VER,
    [all...]
methods.c 161 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1,
ssl_asn1.c 292 && as->ssl_version != DTLS1_BAD_VER) {
d1_lib.c 221 s->client_version = s->version = DTLS1_BAD_VER;
454 * Note: This check deliberately excludes DTLS1_BAD_VER because that version
457 * supported. DTLS1_BAD_VER must use cookies in a stateful manner (e.g. via
  /src/crypto/external/bsd/openssl/dist/ssl/
s3_lib.c 139 DTLS1_BAD_VER, DTLS1_2_VERSION,
155 DTLS1_BAD_VER, DTLS1_2_VERSION,
172 DTLS1_BAD_VER, DTLS1_2_VERSION,
188 DTLS1_BAD_VER, DTLS1_2_VERSION,
204 DTLS1_BAD_VER, DTLS1_2_VERSION,
220 DTLS1_BAD_VER, DTLS1_2_VERSION,
237 DTLS1_BAD_VER, DTLS1_2_VERSION,
253 DTLS1_BAD_VER, DTLS1_2_VERSION,
269 DTLS1_BAD_VER, DTLS1_2_VERSION,
285 DTLS1_BAD_VER, DTLS1_2_VERSION
    [all...]
methods.c 161 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1,
ssl_asn1.c 272 && as->ssl_version != DTLS1_BAD_VER) {
  /src/crypto/external/bsd/openssl.old/dist/ssl/
s3_lib.c 138 DTLS1_BAD_VER, DTLS1_2_VERSION,
154 DTLS1_BAD_VER, DTLS1_2_VERSION,
171 DTLS1_BAD_VER, DTLS1_2_VERSION,
187 DTLS1_BAD_VER, DTLS1_2_VERSION,
203 DTLS1_BAD_VER, DTLS1_2_VERSION,
219 DTLS1_BAD_VER, DTLS1_2_VERSION,
236 DTLS1_BAD_VER, DTLS1_2_VERSION,
252 DTLS1_BAD_VER, DTLS1_2_VERSION,
268 DTLS1_BAD_VER, DTLS1_2_VERSION,
284 DTLS1_BAD_VER, DTLS1_2_VERSION
    [all...]
methods.c 160 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1,
ssl_asn1.c 268 && as->ssl_version != DTLS1_BAD_VER) {
  /src/crypto/external/apache2/openssl/dist/test/
bad_dtls_test.c 11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by
16 * which have frequently been affected by regressions in DTLS1_BAD_VER
21 * DTLS1_BAD_VER as a client. And secondly because even if that were
23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into
46 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */
96 0x00, /* INTEGER, DTLS1_BAD_VER */
215 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER)
229 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER)
279 0x00, /* DTLS1_BAD_VER */
303 0x00, /* DTLS1_BAD_VER */
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
bad_dtls_test.c 11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by
16 * which have frequently been affected by regressions in DTLS1_BAD_VER
21 * DTLS1_BAD_VER as a client. And secondly because even if that were
23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into
46 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */
90 0x02, 0x02, 0x01, 0x00, /* INTEGER, DTLS1_BAD_VER */
134 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER)
148 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER)
199 0x01, 0x00, /* DTLS1_BAD_VER */
208 0x01, 0x00, /* DTLS1_BAD_VER */
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
bad_dtls_test.c 11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by
16 * which have frequently been affected by regressions in DTLS1_BAD_VER
21 * DTLS1_BAD_VER as a client. And secondly because even if that were
23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into
44 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */
88 0x02, 0x02, 0x01, 0x00, /* INTEGER, DTLS1_BAD_VER */
131 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER)
145 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER)
196 0x01, 0x00, /* DTLS1_BAD_VER */
205 0x01, 0x00, /* DTLS1_BAD_VER */
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/
ciphercommon_block.c 159 case DTLS1_BAD_VER:
  /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
ciphercommon_block.c 176 case DTLS1_BAD_VER:
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_dtls.c 295 if (frag_off == 0 && s->version != DTLS1_BAD_VER) {
422 if (s->version == DTLS1_BAD_VER) {
1011 if (s->version == DTLS1_BAD_VER) {
1143 /* For DTLS1_BAD_VER the header length is non-standard */
1144 if (!ossl_assert(s->d1->w_msg_hdr.msg_len + ((s->version == DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
statem_lib.c 796 * unless we're using DTLS1_BAD_VER, which has an extra 2 bytes
799 if ((s->version == DTLS1_BAD_VER
801 || (s->version != DTLS1_BAD_VER
826 if (s->version == DTLS1_BAD_VER)
1884 { DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL },
1887 { DTLS1_BAD_VER, NULL, NULL },
2092 (version == DTLS1_BAD_VER)
2577 if (ver_max == DTLS1_BAD_VER) {
2580 * because we have asked for DTLS1_BAD_VER we will never negotiate
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_dtls.c 278 if (frag_off == 0 && s->version != DTLS1_BAD_VER) {
404 if (s->version == DTLS1_BAD_VER) {
995 if (s->version == DTLS1_BAD_VER) {
1128 /* For DTLS1_BAD_VER the header length is non-standard */
1131 DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
statem_lib.c 739 * unless we're using DTLS1_BAD_VER, which has an extra 2 bytes
742 if ((s->version == DTLS1_BAD_VER
744 || (s->version != DTLS1_BAD_VER
771 if (s->version == DTLS1_BAD_VER)
1482 {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL},
1485 {DTLS1_BAD_VER, NULL, NULL},
1686 DTLS_VERSION_GE(version, DTLS1_BAD_VER);
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_dtls.c 282 if (frag_off == 0 && s->version != DTLS1_BAD_VER) {
376 if (s->version != DTLS1_BAD_VER) {
912 if (s->version == DTLS1_BAD_VER) {
1050 /* For DTLS1_BAD_VER the header length is non-standard */
1053 DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
statem_lib.c 708 * unless we're using DTLS1_BAD_VER, which has an extra 2 bytes
711 if ((s->version == DTLS1_BAD_VER
713 || (s->version != DTLS1_BAD_VER
746 if (s->version == DTLS1_BAD_VER)
1468 {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL},
1471 {DTLS1_BAD_VER, NULL, NULL},
1682 DTLS_VERSION_GE(version, DTLS1_BAD_VER);
  /src/crypto/external/apache2/openssl/dist/ssl/record/methods/
recmethod_local.h 399 || (rl)->version == DTLS1_BAD_VER \

Completed in 48 milliseconds

1 2 3