Home
last modified time | relevance | path

Searched refs:DTLS1_BAD_VER (Results 1 – 18 of 18) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Ds3_lib.c139 DTLS1_BAD_VER, DTLS1_2_VERSION,
155 DTLS1_BAD_VER, DTLS1_2_VERSION,
172 DTLS1_BAD_VER, DTLS1_2_VERSION,
188 DTLS1_BAD_VER, DTLS1_2_VERSION,
204 DTLS1_BAD_VER, DTLS1_2_VERSION,
220 DTLS1_BAD_VER, DTLS1_2_VERSION,
237 DTLS1_BAD_VER, DTLS1_2_VERSION,
253 DTLS1_BAD_VER, DTLS1_2_VERSION,
269 DTLS1_BAD_VER, DTLS1_2_VERSION,
285 DTLS1_BAD_VER, DTLS1_2_VERSION,
[all …]
H A Dmethods.c161 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1, in IMPLEMENT_tls_meth_func()
H A Dssl_asn1.c272 && as->ssl_version != DTLS1_BAD_VER) { in d2i_SSL_SESSION()
H A Dd1_lib.c216 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
H A Dt1_trce.c70 {DTLS1_BAD_VER, "DTLS 1.0 (bad)"}
H A Dssl_lib.c462 if (min_version == DTLS1_BAD_VER in ssl_check_allowed_versions()
465 if (max_version == DTLS1_BAD_VER in ssl_check_allowed_versions()
3174 || (s->version < TLS1_VERSION && s->version != DTLS1_BAD_VER)) in SSL_export_keying_material()
4040 case DTLS1_BAD_VER: in ssl_protocol_to_string()
H A Dssl_sess.c385 case DTLS1_BAD_VER: in ssl_generate_session_id()
H A Dssl_local.h141 # define dtls_ver_ordinal(v1) (((v1) == DTLS1_BAD_VER) ? 0xff00 : (v1))
/freebsd/crypto/openssl/test/
H A Dbad_dtls_test.c11 * Unit test for Cisco DTLS1_BAD_VER session resume, as used by
16 * which have frequently been affected by regressions in DTLS1_BAD_VER
21 * DTLS1_BAD_VER as a client. And secondly because even if that were
23 * are made in generic DTLS code which don't take DTLS1_BAD_VER into
46 /* For DTLS1_BAD_VER packets the MAC doesn't include the handshake header */
90 0x02, 0x02, 0x01, 0x00, /* INTEGER, DTLS1_BAD_VER */ in client_session()
134 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) in validate_client_hello()
148 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) in validate_client_hello()
199 0x01, 0x00, /* DTLS1_BAD_VER */ in send_hello_verify()
208 0x01, 0x00, /* DTLS1_BAD_VER */ in send_hello_verify()
[all...]
/freebsd/crypto/openssl/include/openssl/
H A Dprov_ssl.h29 # define DTLS1_BAD_VER 0x0100 macro
/freebsd/crypto/openssl/providers/implementations/ciphers/
H A Dciphercommon_block.c176 case DTLS1_BAD_VER: in ossl_cipher_tlsunpadblock()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_dtls.c278 if (frag_off == 0 && s->version != DTLS1_BAD_VER) { in dtls1_do_write()
404 if (s->version == DTLS1_BAD_VER) { in dtls_get_message_body()
995 if (s->version == DTLS1_BAD_VER) { in dtls_construct_change_cipher_spec()
1131 DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH) in dtls1_buffer_message()
H A Dstatem_lib.c742 if ((s->version == DTLS1_BAD_VER in tls_process_change_cipher_spec()
744 || (s->version != DTLS1_BAD_VER in tls_process_change_cipher_spec()
771 if (s->version == DTLS1_BAD_VER) in tls_process_change_cipher_spec()
1482 {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL},
1485 {DTLS1_BAD_VER, NULL, NULL},
1686 DTLS_VERSION_GE(version, DTLS1_BAD_VER); in ssl_set_version_bound()
H A Dstatem.c373 (server || (s->version & 0xff00) != (DTLS1_BAD_VER & 0xff00))) { in state_machine()
H A Dstatem_srvr.c833 if (s->version != DTLS1_BAD_VER && !ssl3_init_finished_mac(s)) { in ossl_statem_server_post_work()
2874 if (s->version == SSL3_VERSION || s->version == DTLS1_BAD_VER) { in tls_process_cke_rsa()
H A Dstatem_clnt.c994 if (s->version == DTLS1_BAD_VER) in ossl_statem_client_max_message_size()
/freebsd/crypto/openssl/apps/lib/
H A Ds_cb.c499 {"DTLS 1.0 (bad)", DTLS1_BAD_VER},
580 version == DTLS1_VERSION || version == DTLS1_BAD_VER) { in msg_cb()
/freebsd/crypto/openssl/ssl/record/
H A Drec_layer_d1.c860 s->max_proto_version != DTLS1_BAD_VER) { in do_dtls1_write()