/openssl-master/doc/man3/ |
A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 18 unsigned char *cookie, 23 const unsigned char *cookie, 29 *cookie, 46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero 51 ClientHello cookie is valid. The cookie data is pointed to by B<cookie> and is of 53 communicates that the cookie is valid. The integrity of the entire cookie, 59 as a response to a ClientHello with a missing or invalid cookie. 62 cookie cannot be generated, a zero return value can be used to abort the 66 determine whether the cookie in a ClientHello is valid. The cookie data is 68 from app_verify_cookie_cb() communicates that the cookie is valid. The [all …]
|
A D | DTLSv1_listen.pod | 20 ClientHello is received that does not contain a cookie, then they respond with a 21 request for a new ClientHello that does contain a cookie. If a ClientHello is 22 received with a cookie that is verified then the function returns in order to 42 As a countermeasure to this issue TLSv1.3 and DTLS include a stateless cookie 45 TLSv1.3) or a HelloVerifyRequest (in DTLS) which contains a unique cookie. The 46 client then resends the ClientHello, but this time includes the cookie in the 57 When a ClientHello is received that contains a cookie that has been verified, 67 Prior to calling DTLSv1_listen() user code must ensure that cookie generation
|
A D | OSSL_STORE_INFO.pod | 141 named C<cookie.pem>, and in that case, the returned B<OSSL_STORE_INFO_NAME> 142 object would have the URI C<file:/foo/bar/cookie.pem>, which can be 149 given and that path has the file C<cookie.pem>, the name 150 C</foo/bar/cookie.pem> will be returned.
|
A D | OSSL_PARAM_int.pod | 387 if ((p = OSSL_PARAM_locate(params, "cookie")) != NULL) 388 OSSL_PARAM_set_utf8_ptr(p, "cookie value");
|
/openssl-master/test/ |
A D | dtlsv1listentest.c | 262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument 266 for (i = 0; i < COOKIE_LEN; i++, cookie++) in cookie_gen() 267 *cookie = i; in cookie_gen() 273 static int cookie_verify(SSL *ssl, const unsigned char *cookie, in cookie_verify() argument 281 for (i = 0; i < COOKIE_LEN; i++, cookie++) { in cookie_verify() 282 if (*cookie != i) in cookie_verify()
|
A D | bad_dtls_test.c | 55 static unsigned char cookie[20]; variable 164 if (!PACKET_equal(&pkt2, cookie, sizeof(cookie))) in validate_client_hello() 216 memcpy(hello_verify + HV_COOKIE_OFS, cookie, sizeof(cookie)); in send_hello_verify() 477 RAND_bytes(cookie, sizeof(cookie)); in test_bad_dtls()
|
A D | dtlstest.c | 275 static int generate_cookie_cb(SSL *ssl, unsigned char *cookie, in generate_cookie_cb() argument 278 memcpy(cookie, dummy_cookie, sizeof(dummy_cookie)); in generate_cookie_cb() 283 static int verify_cookie_cb(SSL *ssl, const unsigned char *cookie, in verify_cookie_cb() argument 286 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
|
A D | sslapitest.c | 5324 static int generate_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_cookie_callback() argument 5331 memcpy(cookie, cookie_magic_value, sizeof(cookie_magic_value) - 1); in generate_cookie_callback() 5337 static int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_cookie_callback() argument 5341 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback() 5347 static int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_stateless_cookie_callback() argument 5351 int res = generate_cookie_callback(ssl, cookie, &temp); in generate_stateless_cookie_callback() 5356 static int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_stateless_cookie_callback() argument 5359 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
|
/openssl-master/apps/include/ |
A D | s_apps.h | 51 int generate_cookie_callback(SSL *ssl, unsigned char *cookie, 53 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, 61 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, 63 int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie,
|
/openssl-master/test/recipes/ |
A D | 70-test_tls13cookie.t | 108 my $cookie = 111 return if !defined($cookie); 113 return if ($cookie cmp $ext) != 0;
|
/openssl-master/ssl/statem/ |
A D | extensions_srvr.c | 687 PACKET cookie, raw, chhash, appcookie; in tls_parse_ctos_cookie() local 700 if (!PACKET_as_length_prefixed_2(pkt, &cookie)) { in tls_parse_ctos_cookie() 705 raw = cookie; in tls_parse_ctos_cookie() 748 if (!PACKET_get_net_2(&cookie, &format)) { in tls_parse_ctos_cookie() 762 if (!PACKET_get_net_2(&cookie, &version)) { in tls_parse_ctos_cookie() 772 if (!PACKET_get_net_2(&cookie, &group_id)) { in tls_parse_ctos_cookie() 777 ciphdata = PACKET_data(&cookie); in tls_parse_ctos_cookie() 778 if (!PACKET_forward(&cookie, 2)) { in tls_parse_ctos_cookie() 793 if (!PACKET_get_1(&cookie, &key_share) in tls_parse_ctos_cookie() 794 || !PACKET_get_net_4(&cookie, &tm) in tls_parse_ctos_cookie() [all …]
|
A D | statem_srvr.c | 1277 int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, in dtls_raw_hello_verify_request() argument 1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1292 s->ctx->app_gen_cookie_cb(s, s->d1->cookie, in dtls_construct_hello_verify_request() 1300 if (!dtls_raw_hello_verify_request(pkt, s->d1->cookie, in dtls_construct_hello_verify_request() 1378 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local 1409 PACKET_null_init(&cookie); in tls_process_client_hello() 1515 if (!PACKET_get_length_prefixed_1(pkt, &cookie)) { in tls_process_client_hello() 1519 if (!PACKET_copy_all(&cookie, clienthello->dtls_cookie, in tls_process_client_hello() 1680 || memcmp(clienthello->dtls_cookie, s->d1->cookie, in tls_early_post_process_client_hello()
|
A D | extensions_clnt.c | 1869 PACKET cookie; in tls_parse_stoc_cookie() local 1871 if (!PACKET_as_length_prefixed_2(pkt, &cookie) in tls_parse_stoc_cookie() 1872 || !PACKET_memdup(&cookie, &s->ext.tls13_cookie, in tls_parse_stoc_cookie()
|
A D | statem_clnt.c | 1221 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1222 || !WPACKET_sub_memcpy_u8(pkt, s->d1->cookie, in tls_construct_client_hello() 1290 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify()
|
/openssl-master/test/recipes/04-test_conf_data/ |
A D | dollarid_off.txt | 4 cookie = 0
|
A D | dollarid_on.txt | 4 cookie = 1
|
A D | dollarid_off.cnf | 5 cookie = ${foo}
|
A D | dollarid_on.cnf | 5 cookie = ${foo$bar}
|
/openssl-master/ssl/ |
A D | d1_lib.c | 86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 180 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear() 443 unsigned char cookie[DTLS1_COOKIE_LENGTH]; in DTLSv1_listen() local 692 s->ctx->app_gen_cookie_cb(s, cookie, &cookielen) == 0 || in DTLSv1_listen() 750 || !dtls_raw_hello_verify_request(&wpkt, cookie, cookielen) in DTLSv1_listen()
|
A D | ssl_sess.c | 1334 unsigned char *cookie, in SSL_CTX_set_cookie_generate_cb() argument 1342 const unsigned char *cookie, in SSL_CTX_set_cookie_verify_cb() argument 1374 unsigned char *cookie, in SSL_CTX_set_stateless_cookie_generate_cb() argument 1383 const unsigned char *cookie, in SSL_CTX_set_stateless_cookie_verify_cb() argument
|
A D | ssl_local.h | 922 int (*app_gen_cookie_cb) (SSL *ssl, unsigned char *cookie, 926 int (*app_verify_cookie_cb) (SSL *ssl, const unsigned char *cookie, 930 int (*gen_stateless_cookie_cb) (SSL *ssl, unsigned char *cookie, 934 int (*verify_stateless_cookie_cb) (SSL *ssl, const unsigned char *cookie, 1895 unsigned char cookie[DTLS1_COOKIE_LENGTH]; member 2566 __owur int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie,
|
/openssl-master/apps/lib/ |
A D | s_cb.c | 746 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_stateless_cookie_callback() argument 793 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback() 806 int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_stateless_cookie_callback() argument 817 && memcmp(result, cookie, resultlength) == 0) in verify_stateless_cookie_callback() 823 int generate_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_cookie_callback() argument 827 int res = generate_stateless_cookie_callback(ssl, cookie, &temp); in generate_cookie_callback() 834 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_cookie_callback() argument 837 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback()
|
/openssl-master/doc/man1/ |
A D | openssl-s_server.pod.in | 726 Any ClientHellos that arrive will be checked to see if they have a cookie in 728 Any without a cookie will be responded to with a HelloVerifyRequest. 729 If a ClientHello with a cookie is received then this command will
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 1295 SSL_R_COOKIE_GEN_CALLBACK_FAILURE:400:cookie gen callback failure 1296 SSL_R_COOKIE_MISMATCH:308:cookie mismatch 1398 SSL_R_NO_COOKIE_CALLBACK_SET:287:no cookie callback set 1416 SSL_R_NO_VERIFY_COOKIE_CALLBACK:403:no verify cookie callback
|
/openssl-master/include/openssl/ |
A D | ssl.h.in | 570 /* Maximum length of the application-controlled segment of a a TLSv1.3 cookie */ 736 *cookie, 742 char *cookie, 749 unsigned char *cookie, 754 const unsigned char *cookie,
|