/openssl/ssl/record/methods/ |
H A D | dtls_meth.c | 88 if (rr->epoch == rl->epoch) in dtls_get_bitmap() 96 else if (rr->epoch == (unsigned long)(rl->epoch + 1) in dtls_get_bitmap() 97 && rl->unprocessed_rcds.epoch != rl->epoch in dtls_get_bitmap() 445 n2s(p, rr->epoch); in dtls_get_more_records() 626 int role, int direction, int level, uint16_t epoch, in dtls_new_record_layer() argument 658 (*retrl)->unprocessed_rcds.epoch = epoch + 1; in dtls_new_record_layer() 659 (*retrl)->processed_rcds.epoch = epoch; in dtls_new_record_layer() 662 (*retrl)->epoch = epoch; in dtls_new_record_layer()
|
H A D | recmethod_local.h | 78 uint16_t epoch; member 286 uint16_t *epoch, unsigned char *seq_num);
|
H A D | tls1_meth.c | 221 s2n(rl->epoch, p); in tls1_cipher() 465 s2n(rl->epoch, p); in tls1_mac()
|
H A D | tls_common.c | 939 uint16_t *epoch, unsigned char *seq_num) in tls_read_record() argument 975 *epoch = rec->epoch; in tls_read_record() 1163 int role, int direction, int level, uint16_t epoch, in tls_new_record_layer() argument
|
H A D | ktls_meth.c | 496 int role, int direction, int level, uint16_t epoch,
|
/openssl/test/helpers/ |
H A D | ssltestlib.c | 119 int rem, i, content, reclen, msglen, fragoff, fraglen, epoch; in dump_data() local 140 printf("** Record Epoch: %d\n", epoch); in dump_data() 152 if (epoch > 0) { in dump_data() 266 uint16_t epoch; member 350 unsigned int seq, offset, len, epoch; in mempacket_test_read() local 376 epoch = (rec[EPOCH_HI] << 8) | rec[EPOCH_LO]; in mempacket_test_read() 377 if (epoch != ctx->epoch) { in mempacket_test_read() 378 ctx->epoch = epoch; in mempacket_test_read() 423 unsigned int epoch; in mempacket_swap_epoch() local 440 epoch = (rec[EPOCH_HI] << 8) | rec[EPOCH_LO]; in mempacket_swap_epoch() [all …]
|
/openssl/test/recipes/15-test_mp_rsa_data/ |
H A D | plain_text | 3 it was the epoch of belief, it was the epoch of incredulity,
|
/openssl/ssl/record/ |
H A D | recordmethod.h | 128 uint16_t epoch, 247 uint16_t *epoch, unsigned char *seq_num);
|
H A D | record.h | 70 uint16_t epoch; member 87 uint16_t epoch; member 96 uint16_t epoch; member
|
H A D | record_local.h | 74 #define SSL3_RECORD_get_epoch(r) ((r)->epoch)
|
H A D | rec_layer_d1.c | 278 &rr->epoch, rr->seq_num)); in dtls1_read_bytes() 505 if (rr->epoch != sc->rlayer.d->r_epoch in dtls1_read_bytes()
|
H A D | rec_layer_s3.c | 1858 unsigned int epoch = 0;; in ssl_set_new_record_layer() local 1862 epoch = DTLS_RECORD_LAYER_get_r_epoch(&s->rlayer) + 1; /* new epoch */ in ssl_set_new_record_layer() 1878 direction, level, epoch, in ssl_set_new_record_layer()
|
/openssl/test/ |
H A D | dtlstest.c | 168 int epoch = 0; in test_dtls_drop_records() local 236 epoch = 1; in test_dtls_drop_records() 242 epoch = 1; in test_dtls_drop_records() 247 BIO_ctrl(mempackbio, MEMPACKET_CTRL_SET_DROP_EPOCH, epoch, NULL); in test_dtls_drop_records()
|
H A D | bad_dtls_test.c | 280 static unsigned char epoch[2] = { 0x00, 0x01 }; in send_record() local 318 || !EVP_MAC_update(ctx, epoch, 2) in send_record() 344 BIO_write(rbio, epoch, 2); in send_record()
|
/openssl/ssl/statem/ |
H A D | statem_dtls.c | 1096 frag->msg_header.saved_retransmit_state.epoch = in dtls1_buffer_message() 1163 saved_state.epoch = DTLS_RECORD_LAYER_get_w_epoch(&s->rlayer); in dtls1_retransmit_message() 1174 saved_retransmit_state.epoch); in dtls1_retransmit_message() 1184 DTLS_RECORD_LAYER_set_saved_w_epoch(&s->rlayer, saved_state.epoch); in dtls1_retransmit_message()
|
/openssl/include/openssl/ |
H A D | ct.h.in | 126 * Gets the time, in milliseconds since the Unix epoch, that will be used as the 133 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch. 217 * Returns the timestamp for the SCT (epoch time in milliseconds). 222 * Set the timestamp of an SCT (epoch time in milliseconds).
|
/openssl/ssl/ |
H A D | ssl_local.h | 1913 uint16_t epoch; member
|
/openssl/ |
H A D | CHANGES.md | 5300 attacker by sending a record for the next epoch (which does not have to 6501 attacker by sending a record for the next epoch (which does not have to 7059 sequence number but for the next epoch. The memory leak could be exploited 8124 sequence number but for the next epoch. The memory leak could be exploited 9782 * Records are buffered if they arrive with a future epoch to be
|