Lines Matching +full:0 +full:x1000011

88         0x30, 0x5F,              /* SEQUENCE, length 0x5F */
89 0x02, 0x01, 0x01, /* INTEGER, SSL_SESSION_ASN1_VERSION */
90 0x02, 0x02, 0x01, 0x00, /* INTEGER, DTLS1_BAD_VER */
91 0x04, 0x02, 0x00, 0x2F, /* OCTET_STRING, AES128-SHA */
92 0x04, 0x20, /* OCTET_STRING, session id */
94 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
95 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
96 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
97 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
98 0x04, 0x30, /* OCTET_STRING, master secret */
100 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
101 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
102 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
103 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
104 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
105 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
122 int cookie_found = 0;
123 unsigned int u = 0;
125 if ((len = BIO_get_mem_data(wbio, (char **)&data)) < 0)
126 return 0;
128 return 0;
132 return 0;
135 return 0;
138 return 0;
142 return 0;
145 return 0;
149 return 0;
153 return 0;
158 return 0;
162 return 0;
165 return 0;
171 return 0;
175 return 0;
179 return 0;
183 return 0;
188 return 0;
198 0x16, /* Handshake */
199 0x01, 0x00, /* DTLS1_BAD_VER */
200 0x00, 0x00, /* Epoch 0 */
201 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* Seq# 0 */
202 0x00, 0x23, /* Length */
203 0x03, /* Hello Verify */
204 0x00, 0x00, 0x17, /* Length */
205 0x00, 0x00, /* Seq# 0 */
206 0x00, 0x00, 0x00, /* Fragment offset */
207 0x00, 0x00, 0x17, /* Fragment length */
208 0x01, 0x00, /* DTLS1_BAD_VER */
209 0x14, /* Cookie length */
211 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
212 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
213 0x00, 0x00, 0x00, 0x00,
226 0x16, /* Handshake */
227 0x01, 0x00, /* DTLS1_BAD_VER */
228 0x00, 0x00, /* Epoch 0 */
229 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, /* Seq# 1 */
230 0x00, 0x52, /* Length */
231 0x02, /* Server Hello */
232 0x00, 0x00, 0x46, /* Length */
233 0x00, 0x01, /* Seq# */
234 0x00, 0x00, 0x00, /* Fragment offset */
235 0x00, 0x00, 0x46, /* Fragment length */
236 0x01, 0x00, /* DTLS1_BAD_VER */
238 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
239 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
240 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
241 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
242 0x20, /* Session ID length */
244 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
245 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
246 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
247 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
248 0x00, 0x2f, /* Cipher suite AES128-SHA */
249 0x00, /* Compression null */
252 0x14, /* Change Cipher Spec */
253 0x01, 0x00, /* DTLS1_BAD_VER */
254 0x00, 0x00, /* Epoch 0 */
255 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, /* Seq# 2 */
256 0x00, 0x03, /* Length */
257 0x01, 0x00, 0x02, /* Message */
265 return 0;
280 static unsigned char epoch[2] = { 0x00, 0x01 };
281 static unsigned char seq[6] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
282 static unsigned char ver[2] = { 0x01, 0x00 }; /* DTLS1_BAD_VER */
291 int ret = 0;
293 seq[0] = (seqnr >> 40) & 0xff;
294 seq[1] = (seqnr >> 32) & 0xff;
295 seq[2] = (seqnr >> 24) & 0xff;
296 seq[3] = (seqnr >> 16) & 0xff;
297 seq[4] = (seqnr >> 8) & 0xff;
298 seq[5] = seqnr & 0xff;
303 return 0;
312 params[0] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
313 "SHA1", 0);
315 lenbytes[0] = (unsigned char)(len >> 8);
334 if (!TEST_int_gt(RAND_bytes(iv, sizeof(iv)), 0)
338 || !TEST_int_ge(EVP_Cipher(enc_ctx, enc, enc, len), 0))
346 lenbytes[0] = (unsigned char)((len + sizeof(iv)) >> 8);
365 0x14, /* Finished */
366 0x00, 0x00, 0x0c, /* Length */
367 0x00, 0x03, /* Seq# 3 */
368 0x00, 0x00, 0x00, /* Fragment offset */
369 0x00, 0x00, 0x0c, /* Fragment length */
382 return 0;
386 NULL, 0,
389 return send_record(rbio, SSL3_RT_HANDSHAKE, 0,
401 if (len < 0)
402 return 0;
405 return 0;
409 return 0;
412 return 0;
415 return 0;
419 return 0;
422 if (!PACKET_get_net_2(&pkt, &u) || u != 0x0002)
423 return 0;
427 return 0;
429 return 0;
432 if (!PACKET_get_net_2(&pkt, &u) || u != 0x0001)
433 return 0;
444 #define NODROP(x) { x##UL, 0 }
452 NODROP(0x1234), NODROP(0x1230), NODROP(0x1235),
453 NODROP(0xffff), NODROP(0x10001), NODROP(0xfffe), NODROP(0x10000),
454 DROP(0x10001), DROP(0xff), NODROP(0x100000), NODROP(0x800000), NODROP(0x7fffe1),
455 NODROP(0xffffff), NODROP(0x1000000), NODROP(0xfffffe), DROP(0xffffff), NODROP(0x1000010),
456 NODROP(0xfffffd), NODROP(0x1000011), DROP(0x12), NODROP(0x1000012),
457 NODROP(0x1ffffff), NODROP(0x2000000), DROP(0x1ff00fe), NODROP(0x2000001),
458 NODROP(0x20fffff), NODROP(0x2105500), DROP(0x20ffffe), NODROP(0x21054ff),
459 NODROP(0x211ffff), DROP(0x2110000), NODROP(0x2120000)
470 time_t now = 0;
471 int testresult = 0;
534 if (!TEST_int_le(ret, 0)
541 if (!TEST_int_le(ret, 0)
548 if (!TEST_int_le(ret, 0)
554 if (!TEST_int_gt(ret, 0)
561 before, and in fact was broken even for a basic 0, 2, 1 test case
563 for (i = 0; i < (int)OSSL_NELEM(tests); i++) {
568 TEST_error("Failed to send data seq #0x%x%08x (%d)\n",
578 TEST_error("SSL_read failed or wrong size on seq#0x%x%08x (%d)\n",
582 if (!TEST_true(recv_buf[0] == tests[i].seq))