Home
last modified time | relevance | path

Searched refs:cookie (Results 1 – 25 of 26) sorted by relevance

12

/openssl-master/doc/man3/
A DSSL_CTX_set_stateless_cookie_generate_cb.pod18 unsigned char *cookie,
23 const unsigned char *cookie,
29 *cookie,
46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero
51 ClientHello cookie is valid. The cookie data is pointed to by B<cookie> and is of
53 communicates that the cookie is valid. The integrity of the entire cookie,
59 as a response to a ClientHello with a missing or invalid cookie.
62 cookie cannot be generated, a zero return value can be used to abort the
66 determine whether the cookie in a ClientHello is valid. The cookie data is
68 from app_verify_cookie_cb() communicates that the cookie is valid. The
[all …]
A DDTLSv1_listen.pod20 ClientHello is received that does not contain a cookie, then they respond with a
21 request for a new ClientHello that does contain a cookie. If a ClientHello is
22 received with a cookie that is verified then the function returns in order to
42 As a countermeasure to this issue TLSv1.3 and DTLS include a stateless cookie
45 TLSv1.3) or a HelloVerifyRequest (in DTLS) which contains a unique cookie. The
46 client then resends the ClientHello, but this time includes the cookie in the
57 When a ClientHello is received that contains a cookie that has been verified,
67 Prior to calling DTLSv1_listen() user code must ensure that cookie generation
A DOSSL_STORE_INFO.pod141 named C<cookie.pem>, and in that case, the returned B<OSSL_STORE_INFO_NAME>
142 object would have the URI C<file:/foo/bar/cookie.pem>, which can be
149 given and that path has the file C<cookie.pem>, the name
150 C</foo/bar/cookie.pem> will be returned.
A DOSSL_PARAM_int.pod387 if ((p = OSSL_PARAM_locate(params, "cookie")) != NULL)
388 OSSL_PARAM_set_utf8_ptr(p, "cookie value");
/openssl-master/test/
A Ddtlsv1listentest.c262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument
266 for (i = 0; i < COOKIE_LEN; i++, cookie++) in cookie_gen()
267 *cookie = i; in cookie_gen()
273 static int cookie_verify(SSL *ssl, const unsigned char *cookie, in cookie_verify() argument
281 for (i = 0; i < COOKIE_LEN; i++, cookie++) { in cookie_verify()
282 if (*cookie != i) in cookie_verify()
A Dbad_dtls_test.c55 static unsigned char cookie[20]; variable
164 if (!PACKET_equal(&pkt2, cookie, sizeof(cookie))) in validate_client_hello()
216 memcpy(hello_verify + HV_COOKIE_OFS, cookie, sizeof(cookie)); in send_hello_verify()
477 RAND_bytes(cookie, sizeof(cookie)); in test_bad_dtls()
A Ddtlstest.c275 static int generate_cookie_cb(SSL *ssl, unsigned char *cookie, in generate_cookie_cb() argument
278 memcpy(cookie, dummy_cookie, sizeof(dummy_cookie)); in generate_cookie_cb()
283 static int verify_cookie_cb(SSL *ssl, const unsigned char *cookie, in verify_cookie_cb() argument
286 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
A Dsslapitest.c5324 static int generate_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_cookie_callback() argument
5331 memcpy(cookie, cookie_magic_value, sizeof(cookie_magic_value) - 1); in generate_cookie_callback()
5337 static int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_cookie_callback() argument
5341 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback()
5347 static int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_stateless_cookie_callback() argument
5351 int res = generate_cookie_callback(ssl, cookie, &temp); in generate_stateless_cookie_callback()
5356 static int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_stateless_cookie_callback() argument
5359 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
/openssl-master/apps/include/
A Ds_apps.h51 int generate_cookie_callback(SSL *ssl, unsigned char *cookie,
53 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie,
61 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie,
63 int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie,
/openssl-master/test/recipes/
A D70-test_tls13cookie.t108 my $cookie =
111 return if !defined($cookie);
113 return if ($cookie cmp $ext) != 0;
/openssl-master/ssl/statem/
A Dextensions_srvr.c687 PACKET cookie, raw, chhash, appcookie; in tls_parse_ctos_cookie() local
700 if (!PACKET_as_length_prefixed_2(pkt, &cookie)) { in tls_parse_ctos_cookie()
705 raw = cookie; in tls_parse_ctos_cookie()
748 if (!PACKET_get_net_2(&cookie, &format)) { in tls_parse_ctos_cookie()
762 if (!PACKET_get_net_2(&cookie, &version)) { in tls_parse_ctos_cookie()
772 if (!PACKET_get_net_2(&cookie, &group_id)) { in tls_parse_ctos_cookie()
777 ciphdata = PACKET_data(&cookie); in tls_parse_ctos_cookie()
778 if (!PACKET_forward(&cookie, 2)) { in tls_parse_ctos_cookie()
793 if (!PACKET_get_1(&cookie, &key_share) in tls_parse_ctos_cookie()
794 || !PACKET_get_net_4(&cookie, &tm) in tls_parse_ctos_cookie()
[all …]
A Dstatem_srvr.c1277 int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, in dtls_raw_hello_verify_request() argument
1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request()
1292 s->ctx->app_gen_cookie_cb(s, s->d1->cookie, in dtls_construct_hello_verify_request()
1300 if (!dtls_raw_hello_verify_request(pkt, s->d1->cookie, in dtls_construct_hello_verify_request()
1378 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local
1409 PACKET_null_init(&cookie); in tls_process_client_hello()
1515 if (!PACKET_get_length_prefixed_1(pkt, &cookie)) { in tls_process_client_hello()
1519 if (!PACKET_copy_all(&cookie, clienthello->dtls_cookie, in tls_process_client_hello()
1680 || memcmp(clienthello->dtls_cookie, s->d1->cookie, in tls_early_post_process_client_hello()
A Dextensions_clnt.c1869 PACKET cookie; in tls_parse_stoc_cookie() local
1871 if (!PACKET_as_length_prefixed_2(pkt, &cookie) in tls_parse_stoc_cookie()
1872 || !PACKET_memdup(&cookie, &s->ext.tls13_cookie, in tls_parse_stoc_cookie()
A Dstatem_clnt.c1221 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello()
1222 || !WPACKET_sub_memcpy_u8(pkt, s->d1->cookie, in tls_construct_client_hello()
1290 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify()
1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify()
/openssl-master/test/recipes/04-test_conf_data/
A Ddollarid_off.txt4 cookie = 0
A Ddollarid_on.txt4 cookie = 1
A Ddollarid_off.cnf5 cookie = ${foo}
A Ddollarid_on.cnf5 cookie = ${foo$bar}
/openssl-master/ssl/
A Dd1_lib.c86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new()
180 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
443 unsigned char cookie[DTLS1_COOKIE_LENGTH]; in DTLSv1_listen() local
692 s->ctx->app_gen_cookie_cb(s, cookie, &cookielen) == 0 || in DTLSv1_listen()
750 || !dtls_raw_hello_verify_request(&wpkt, cookie, cookielen) in DTLSv1_listen()
A Dssl_sess.c1334 unsigned char *cookie, in SSL_CTX_set_cookie_generate_cb() argument
1342 const unsigned char *cookie, in SSL_CTX_set_cookie_verify_cb() argument
1374 unsigned char *cookie, in SSL_CTX_set_stateless_cookie_generate_cb() argument
1383 const unsigned char *cookie, in SSL_CTX_set_stateless_cookie_verify_cb() argument
A Dssl_local.h922 int (*app_gen_cookie_cb) (SSL *ssl, unsigned char *cookie,
926 int (*app_verify_cookie_cb) (SSL *ssl, const unsigned char *cookie,
930 int (*gen_stateless_cookie_cb) (SSL *ssl, unsigned char *cookie,
934 int (*verify_stateless_cookie_cb) (SSL *ssl, const unsigned char *cookie,
1895 unsigned char cookie[DTLS1_COOKIE_LENGTH]; member
2566 __owur int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie,
/openssl-master/apps/lib/
A Ds_cb.c746 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_stateless_cookie_callback() argument
793 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback()
806 int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_stateless_cookie_callback() argument
817 && memcmp(result, cookie, resultlength) == 0) in verify_stateless_cookie_callback()
823 int generate_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_cookie_callback() argument
827 int res = generate_stateless_cookie_callback(ssl, cookie, &temp); in generate_cookie_callback()
834 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_cookie_callback() argument
837 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback()
/openssl-master/doc/man1/
A Dopenssl-s_server.pod.in726 Any ClientHellos that arrive will be checked to see if they have a cookie in
728 Any without a cookie will be responded to with a HelloVerifyRequest.
729 If a ClientHello with a cookie is received then this command will
/openssl-master/crypto/err/
A Dopenssl.txt1295 SSL_R_COOKIE_GEN_CALLBACK_FAILURE:400:cookie gen callback failure
1296 SSL_R_COOKIE_MISMATCH:308:cookie mismatch
1398 SSL_R_NO_COOKIE_CALLBACK_SET:287:no cookie callback set
1416 SSL_R_NO_VERIFY_COOKIE_CALLBACK:403:no verify cookie callback
/openssl-master/include/openssl/
A Dssl.h.in570 /* Maximum length of the application-controlled segment of a a TLSv1.3 cookie */
736 *cookie,
742 char *cookie,
749 unsigned char *cookie,
754 const unsigned char *cookie,

Completed in 90 milliseconds

12