/freebsd/crypto/openssl/ssl/ |
H A D | s3_lib.c | 175 DTLS1_BAD_VER, DTLS1_2_VERSION, 191 DTLS1_BAD_VER, DTLS1_2_VERSION, 209 DTLS1_BAD_VER, DTLS1_2_VERSION, 225 DTLS1_BAD_VER, DTLS1_2_VERSION, 241 DTLS1_BAD_VER, DTLS1_2_VERSION, 257 DTLS1_BAD_VER, DTLS1_2_VERSION, 274 DTLS1_BAD_VER, DTLS1_2_VERSION, 290 DTLS1_BAD_VER, DTLS1_2_VERSION, 306 DTLS1_BAD_VER, DTLS1_2_VERSION, 322 DTLS1_BAD_VER, DTLS1_2_VERSION, [all …]
|
H A D | methods.c | 161 IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1, in IMPLEMENT_tls_meth_func()
|
H A D | ssl_asn1.c | 292 && as->ssl_version != DTLS1_BAD_VER) { in d2i_SSL_SESSION_ex()
|
H A D | d1_lib.c | 222 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
|
H A D | t1_trce.c | 73 {DTLS1_BAD_VER, "DTLS 1.0 (bad)"}
|
H A D | ssl_sess.c | 363 case DTLS1_BAD_VER: in ssl_generate_session_id()
|
H A D | ssl_lib.c | 462 if (min_version == DTLS1_BAD_VER in ssl_check_allowed_versions() 465 if (max_version == DTLS1_BAD_VER in ssl_check_allowed_versions() 3853 || (sc->version < TLS1_VERSION && sc->version != DTLS1_BAD_VER)) in SSL_export_keying_material() 5084 case DTLS1_BAD_VER: in ssl_protocol_to_string()
|
H A D | ssl_local.h | 57 # define dtls_ver_ordinal(v1) (((v1) == DTLS1_BAD_VER) ? 0xff00 : (v1))
|
/freebsd/crypto/openssl/test/ |
H A D | bad_dtls_test.c | 134 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) in validate_client_hello() 148 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) in validate_client_hello() 415 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) in validate_ccs() 432 if (!PACKET_get_net_2(&pkt, &u) || u != DTLS1_BAD_VER) in validate_ccs() 499 || !TEST_true(SSL_CTX_set_min_proto_version(ctx, DTLS1_BAD_VER)) in test_bad_dtls() 500 || !TEST_true(SSL_CTX_set_max_proto_version(ctx, DTLS1_BAD_VER)) in test_bad_dtls()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | prov_ssl.h | 30 # define DTLS1_BAD_VER 0x0100 macro
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_block.c | 159 case DTLS1_BAD_VER: in ossl_cipher_tlsunpadblock()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_dtls.c | 288 if (frag_off == 0 && s->version != DTLS1_BAD_VER) { in dtls1_do_write() 415 if (s->version == DTLS1_BAD_VER) { in dtls_get_message_body() 1011 if (s->version == DTLS1_BAD_VER) { in dtls_construct_change_cipher_spec() 1149 DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH) in dtls1_buffer_message()
|
H A D | statem_lib.c | 791 if ((s->version == DTLS1_BAD_VER in tls_process_change_cipher_spec() 793 || (s->version != DTLS1_BAD_VER in tls_process_change_cipher_spec() 818 if (s->version == DTLS1_BAD_VER) in tls_process_change_cipher_spec() 1877 {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL}, 1880 {DTLS1_BAD_VER, NULL, NULL}, 2088 (version == DTLS1_BAD_VER) in ssl_set_version_bound() 2571 if (ver_max == DTLS1_BAD_VER) { in ssl_set_client_hello_version()
|
H A D | statem.c | 418 (server || (s->version & 0xff00) != (DTLS1_BAD_VER & 0xff00))) { in state_machine()
|
H A D | statem_srvr.c | 916 if (s->version != DTLS1_BAD_VER && !ssl3_init_finished_mac(s)) { in ossl_statem_server_post_work() 2996 if (s->version == SSL3_VERSION || s->version == DTLS1_BAD_VER) { in tls_process_cke_rsa()
|
H A D | statem_clnt.c | 1070 if (s->version == DTLS1_BAD_VER) in ossl_statem_client_max_message_size()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_version.pod | 116 =item DTLS1_BAD_VER
|
/freebsd/crypto/openssl/ssl/record/methods/ |
H A D | recmethod_local.h | 400 || (rl)->version == DTLS1_BAD_VER \
|
H A D | dtls_meth.c | 676 case DTLS1_BAD_VER: in dtls_new_record_layer()
|
/freebsd/crypto/openssl/ssl/record/ |
H A D | rec_layer_d1.c | 664 && sc->max_proto_version != DTLS1_BAD_VER) in do_dtls1_write()
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | s_cb.c | 588 {"DTLS 1.0 (bad)", DTLS1_BAD_VER}, 670 version == DTLS1_VERSION || version == DTLS1_BAD_VER) { in msg_cb()
|