Searched refs:downgrade (Results 1 – 17 of 17) sorted by relevance
336 int downgrade; in ipsec_cachepolicy() local383 downgrade = 0; in ipsec_cachepolicy()385 if ((downgrade = INP_TRY_UPGRADE(inp)) == 0) in ipsec_cachepolicy()409 if (downgrade != 0) in ipsec_cachepolicy()446 int flags, downgrade; in ipsec_getpcbpolicy() local470 downgrade = 0; in ipsec_getpcbpolicy()472 if ((downgrade = INP_TRY_UPGRADE(inp)) == 0) in ipsec_getpcbpolicy()477 if (downgrade != 0) in ipsec_getpcbpolicy()
96 version; see draft-ietf-tls-downgrade-scsv-00 for details.100 in draft-ietf-tls-downgrade-scsv-00.
9 ssid->proto fields to avoid detecting downgrade attacks when the driver
50 * fix SAE H2E rejected groups validation to avoid downgrade attacks2381 * improved downgrade attack detection in IE verification of msg 3/4:
128 # Or in case of a downgrade to overwrite newer versions.
378 goto downgrade; in nfs_lock()383 goto downgrade; in nfs_lock()390 downgrade: in nfs_lock()
325 harden-algo-downgrade{COLON} { YDVAR(1, VAR_HARDEN_ALGO_DOWNGRADE) }
679 \ then this is an undue downgrade. We mark it by setting793 \ As a special case, in case of undue downgrade, we send a specific
558 # Harden against algorithm downgrade when multiple algorithms are561 # harden-algo-downgrade: no
1915 - Fix to support harden-algo-downgrade for ZONEMD dnssec checks.5323 - harden-algo-downgrade: no also makes unbound more lenient about6373 - Change default of harden-algo-downgrade to off. This is lenient6378 harden-algo-downgrade is turned off.6561 - Fix #644: harden-algo-downgrade option, if turned off, fixes the6580 - store caps_response with best response in case downgrade response8354 - DLV has downgrade protection again, because the RFC says so.10085 - fixup SHA256 DS downgrade, no longer possible to downgrade to SHA1.10086 - tests for sha256 support and downgrade resistance.
480 * draft-ietf-tls-downgrade-scsv-00 for details. DO NOT ENABLE THIS if your483 * draft-ietf-tls-downgrade-scsv-00.
1211 purge record-avail recursive refuse-downgrade \
36 * fix SAE H2E rejected groups validation to avoid downgrade attacks
1625 upstream: downgrade duplicate Subsystem directives from being a7982 than autoconf-2.71's copies, so this was effectively a downgrade.
7622 downgrade the RSA key length used to a value smaller than the server7794 downgrade to TLS 1.0 even if both the server and the client support a8687 downgrade the RSA key length used to a value smaller than the server9143 and servers: an attacker can use it in a ciphersuite downgrade attack.
57415 downgrade