| /src/crypto/external/apache2/openssl/dist/include/openssl/ |
| prov_ssl.h | 30 #define DTLS1_BAD_VER 0x0100
|
| /src/crypto/external/bsd/openssl/dist/include/openssl/ |
| prov_ssl.h | 29 # define DTLS1_BAD_VER 0x0100
|
| /src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| dtls1.h | 23 # define DTLS1_BAD_VER 0x0100
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| s3_lib.c | 193 DTLS1_BAD_VER, 211 DTLS1_BAD_VER, 231 DTLS1_BAD_VER, 249 DTLS1_BAD_VER, 267 DTLS1_BAD_VER, 285 DTLS1_BAD_VER, 304 DTLS1_BAD_VER, 322 DTLS1_BAD_VER, 340 DTLS1_BAD_VER, 358 DTLS1_BAD_VER, [all...] |
| methods.c | 161 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1,
|
| ssl_asn1.c | 292 && as->ssl_version != DTLS1_BAD_VER) {
|
| d1_lib.c | 221 s->client_version = s->version = DTLS1_BAD_VER; 454 * Note: This check deliberately excludes DTLS1_BAD_VER because that version 457 * supported. DTLS1_BAD_VER must use cookies in a stateful manner (e.g. via
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| s3_lib.c | 139 DTLS1_BAD_VER, DTLS1_2_VERSION, 155 DTLS1_BAD_VER, DTLS1_2_VERSION, 172 DTLS1_BAD_VER, DTLS1_2_VERSION, 188 DTLS1_BAD_VER, DTLS1_2_VERSION, 204 DTLS1_BAD_VER, DTLS1_2_VERSION, 220 DTLS1_BAD_VER, DTLS1_2_VERSION, 237 DTLS1_BAD_VER, DTLS1_2_VERSION, 253 DTLS1_BAD_VER, DTLS1_2_VERSION, 269 DTLS1_BAD_VER, DTLS1_2_VERSION, 285 DTLS1_BAD_VER, DTLS1_2_VERSION [all...] |
| methods.c | 161 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1,
|
| ssl_asn1.c | 272 && as->ssl_version != DTLS1_BAD_VER) {
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| s3_lib.c | 138 DTLS1_BAD_VER, DTLS1_2_VERSION, 154 DTLS1_BAD_VER, DTLS1_2_VERSION, 171 DTLS1_BAD_VER, DTLS1_2_VERSION, 187 DTLS1_BAD_VER, DTLS1_2_VERSION, 203 DTLS1_BAD_VER, DTLS1_2_VERSION, 219 DTLS1_BAD_VER, DTLS1_2_VERSION, 236 DTLS1_BAD_VER, DTLS1_2_VERSION, 252 DTLS1_BAD_VER, DTLS1_2_VERSION, 268 DTLS1_BAD_VER, DTLS1_2_VERSION, 284 DTLS1_BAD_VER, DTLS1_2_VERSION [all...] |
| methods.c | 160 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1,
|
| ssl_asn1.c | 268 && as->ssl_version != DTLS1_BAD_VER) {
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| bad_dtls_test.c | 11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by 16 * which have frequently been affected by regressions in DTLS1_BAD_VER 21 * DTLS1_BAD_VER as a client. And secondly because even if that were 23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into 46 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */ 96 0x00, /* INTEGER, DTLS1_BAD_VER */ 215 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) 229 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) 279 0x00, /* DTLS1_BAD_VER */ 303 0x00, /* DTLS1_BAD_VER */ [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| bad_dtls_test.c | 11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by 16 * which have frequently been affected by regressions in DTLS1_BAD_VER 21 * DTLS1_BAD_VER as a client. And secondly because even if that were 23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into 46 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */ 90 0x02, 0x02, 0x01, 0x00, /* INTEGER, DTLS1_BAD_VER */ 134 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) 148 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) 199 0x01, 0x00, /* DTLS1_BAD_VER */ 208 0x01, 0x00, /* DTLS1_BAD_VER */ [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| bad_dtls_test.c | 11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by 16 * which have frequently been affected by regressions in DTLS1_BAD_VER 21 * DTLS1_BAD_VER as a client. And secondly because even if that were 23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into 44 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */ 88 0x02, 0x02, 0x01, 0x00, /* INTEGER, DTLS1_BAD_VER */ 131 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) 145 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) 196 0x01, 0x00, /* DTLS1_BAD_VER */ 205 0x01, 0x00, /* DTLS1_BAD_VER */ [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| ciphercommon_block.c | 159 case DTLS1_BAD_VER:
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
| ciphercommon_block.c | 176 case DTLS1_BAD_VER:
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_dtls.c | 295 if (frag_off == 0 && s->version != DTLS1_BAD_VER) { 422 if (s->version == DTLS1_BAD_VER) { 1011 if (s->version == DTLS1_BAD_VER) { 1143 /* For DTLS1_BAD_VER the header length is non-standard */ 1144 if (!ossl_assert(s->d1->w_msg_hdr.msg_len + ((s->version == DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
|
| statem_lib.c | 796 * unless we're using DTLS1_BAD_VER, which has an extra 2 bytes 799 if ((s->version == DTLS1_BAD_VER 801 || (s->version != DTLS1_BAD_VER 826 if (s->version == DTLS1_BAD_VER) 1884 { DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL }, 1887 { DTLS1_BAD_VER, NULL, NULL }, 2092 (version == DTLS1_BAD_VER) 2577 if (ver_max == DTLS1_BAD_VER) { 2580 * because we have asked for DTLS1_BAD_VER we will never negotiate
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_dtls.c | 278 if (frag_off == 0 && s->version != DTLS1_BAD_VER) { 404 if (s->version == DTLS1_BAD_VER) { 995 if (s->version == DTLS1_BAD_VER) { 1128 /* For DTLS1_BAD_VER the header length is non-standard */ 1131 DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
|
| statem_lib.c | 739 * unless we're using DTLS1_BAD_VER, which has an extra 2 bytes 742 if ((s->version == DTLS1_BAD_VER 744 || (s->version != DTLS1_BAD_VER 771 if (s->version == DTLS1_BAD_VER) 1482 {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL}, 1485 {DTLS1_BAD_VER, NULL, NULL}, 1686 DTLS_VERSION_GE(version, DTLS1_BAD_VER);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_dtls.c | 282 if (frag_off == 0 && s->version != DTLS1_BAD_VER) { 376 if (s->version != DTLS1_BAD_VER) { 912 if (s->version == DTLS1_BAD_VER) { 1050 /* For DTLS1_BAD_VER the header length is non-standard */ 1053 DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
|
| statem_lib.c | 708 * unless we're using DTLS1_BAD_VER, which has an extra 2 bytes 711 if ((s->version == DTLS1_BAD_VER 713 || (s->version != DTLS1_BAD_VER 746 if (s->version == DTLS1_BAD_VER) 1468 {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL}, 1471 {DTLS1_BAD_VER, NULL, NULL}, 1682 DTLS_VERSION_GE(version, DTLS1_BAD_VER);
|
| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| recmethod_local.h | 399 || (rl)->version == DTLS1_BAD_VER \
|