Home
last modified time | relevance | path

Searched refs:cookie (Results 1 – 25 of 28) sorted by relevance

12

/openssl/doc/man3/
H A DSSL_CTX_set_stateless_cookie_generate_cb.pod18 unsigned char *cookie,
23 const unsigned char *cookie,
29 *cookie,
46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero
51 ClientHello cookie is valid. The cookie data is pointed to by B<cookie> and is of
53 communicates that the cookie is valid. The integrity of the entire cookie,
59 as a response to a ClientHello with a missing or invalid cookie.
62 cookie cannot be generated, a zero return value can be used to abort the
66 determine whether the cookie in a ClientHello is valid. The cookie data is
68 from app_verify_cookie_cb() communicates that the cookie is valid. The
[all …]
H A DDTLSv1_listen.pod20 ClientHello is received that does not contain a cookie, then they respond with a
21 request for a new ClientHello that does contain a cookie. If a ClientHello is
22 received with a cookie that is verified then the function returns in order to
42 As a countermeasure to this issue TLSv1.3 and DTLS include a stateless cookie
45 TLSv1.3) or a HelloVerifyRequest (in DTLS) which contains a unique cookie. The
46 client then resends the ClientHello, but this time includes the cookie in the
57 When a ClientHello is received that contains a cookie that has been verified,
84 Prior to calling DTLSv1_listen() user code must ensure that cookie generation
H A DOSSL_STORE_INFO.pod142 named C<cookie.pem>, and in that case, the returned B<OSSL_STORE_INFO_NAME>
143 object would have the URI C<file:/foo/bar/cookie.pem>, which can be
150 given and that path has the file C<cookie.pem>, the name
151 C</foo/bar/cookie.pem> will be returned.
H A DOSSL_PARAM_int.pod392 if ((p = OSSL_PARAM_locate(params, "cookie")) != NULL)
393 OSSL_PARAM_set_utf8_ptr(p, "cookie value");
/openssl/util/perl/TLSProxy/
H A DHelloVerifyRequest.pm45 $self->{cookie} = "";
58 my $cookie = substr($self->data, $ptr, $cookie_len);
62 $self->cookie($cookie);
85 $data .= $self->cookie;
107 sub cookie subroutine
111 $self->{cookie} = shift;
113 return $self->{cookie};
/openssl/test/
H A Ddtlsv1listentest.c262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument
266 for (i = 0; i < COOKIE_LEN; i++, cookie++) in cookie_gen()
267 *cookie = i; in cookie_gen()
273 static int cookie_verify(SSL *ssl, const unsigned char *cookie, in cookie_verify() argument
281 for (i = 0; i < COOKIE_LEN; i++, cookie++) { in cookie_verify()
282 if (*cookie != i) in cookie_verify()
H A Dbad_dtls_test.c55 static unsigned char cookie[20]; variable
164 if (!PACKET_equal(&pkt2, cookie, sizeof(cookie))) in validate_client_hello()
216 memcpy(hello_verify + HV_COOKIE_OFS, cookie, sizeof(cookie)); in send_hello_verify()
481 RAND_bytes(cookie, sizeof(cookie)); in test_bad_dtls()
H A Ddtlstest.c47 static int generate_cookie_cb(SSL *ssl, unsigned char *cookie, in generate_cookie_cb() argument
50 memcpy(cookie, dummy_cookie, sizeof(dummy_cookie)); in generate_cookie_cb()
55 static int verify_cookie_cb(SSL *ssl, const unsigned char *cookie, in verify_cookie_cb() argument
58 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
H A Dext_internal_test.c70 EXT_ENTRY(cookie),
/openssl/test/recipes/
H A D70-test_tls13cookie.t108 my $cookie =
111 return if !defined($cookie);
113 return if ($cookie cmp $ext) != 0;
/openssl/apps/include/
H A Ds_apps.h53 int generate_cookie_callback(SSL *ssl, unsigned char *cookie,
55 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie,
63 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie,
65 int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie,
/openssl/ssl/statem/
H A Dextensions_srvr.c730 PACKET cookie, raw, chhash, appcookie; in tls_parse_ctos_cookie() local
745 if (!PACKET_as_length_prefixed_2(pkt, &cookie)) { in tls_parse_ctos_cookie()
750 raw = cookie; in tls_parse_ctos_cookie()
793 if (!PACKET_get_net_2(&cookie, &format)) { in tls_parse_ctos_cookie()
807 if (!PACKET_get_net_2(&cookie, &version)) { in tls_parse_ctos_cookie()
817 if (!PACKET_get_net_2(&cookie, &group_id)) { in tls_parse_ctos_cookie()
822 ciphdata = PACKET_data(&cookie); in tls_parse_ctos_cookie()
823 if (!PACKET_forward(&cookie, 2)) { in tls_parse_ctos_cookie()
838 if (!PACKET_get_1(&cookie, &key_share) in tls_parse_ctos_cookie()
839 || !PACKET_get_net_8(&cookie, &tm) in tls_parse_ctos_cookie()
[all …]
H A Dstatem_srvr.c1368 int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, in dtls_raw_hello_verify_request() argument
1373 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request()
1386 || sctx->app_gen_cookie_cb(SSL_CONNECTION_GET_USER_SSL(s), s->d1->cookie, in dtls_construct_hello_verify_request()
1394 if (!dtls_raw_hello_verify_request(pkt, s->d1->cookie, in dtls_construct_hello_verify_request()
1474 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local
1505 PACKET_null_init(&cookie); in tls_process_client_hello()
1611 if (!PACKET_get_length_prefixed_1(pkt, &cookie)) { in tls_process_client_hello()
1615 if (!PACKET_copy_all(&cookie, clienthello->dtls_cookie, in tls_process_client_hello()
1770 || memcmp(clienthello->dtls_cookie, s->d1->cookie, in tls_early_post_process_client_hello()
H A Dextensions_clnt.c1973 PACKET cookie; in tls_parse_stoc_cookie() local
1975 if (!PACKET_as_length_prefixed_2(pkt, &cookie) in tls_parse_stoc_cookie()
1976 || !PACKET_memdup(&cookie, &s->ext.tls13_cookie, in tls_parse_stoc_cookie()
H A Dstatem_clnt.c1293 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello()
1294 || !WPACKET_sub_memcpy_u8(pkt, s->d1->cookie, in tls_construct_client_hello()
1364 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify()
1369 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify()
/openssl/test/recipes/04-test_conf_data/
H A Ddollarid_off.txt4 cookie = 0
H A Ddollarid_on.txt4 cookie = 1
H A Ddollarid_off.cnf5 cookie = ${foo}
H A Ddollarid_on.cnf5 cookie = ${foo$bar}
/openssl/ssl/
H A Dd1_lib.c87 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new()
202 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
421 unsigned char cookie[DTLS1_COOKIE_LENGTH]; in DTLSv1_listen() local
665 ssl->ctx->app_gen_cookie_cb(ssl, cookie, &cookielen) == 0 || in DTLSv1_listen()
724 || !dtls_raw_hello_verify_request(&wpkt, cookie, cookielen) in DTLSv1_listen()
H A Dssl_sess.c1405 unsigned char *cookie, in SSL_CTX_set_cookie_generate_cb() argument
1413 const unsigned char *cookie, in SSL_CTX_set_cookie_verify_cb() argument
1445 unsigned char *cookie, in SSL_CTX_set_stateless_cookie_generate_cb() argument
1454 const unsigned char *cookie, in SSL_CTX_set_stateless_cookie_verify_cb() argument
H A Dssl_local.h877 int (*app_gen_cookie_cb) (SSL *ssl, unsigned char *cookie,
881 int (*app_verify_cookie_cb) (SSL *ssl, const unsigned char *cookie,
885 int (*gen_stateless_cookie_cb) (SSL *ssl, unsigned char *cookie,
889 int (*verify_stateless_cookie_cb) (SSL *ssl, const unsigned char *cookie,
1923 unsigned char cookie[DTLS1_COOKIE_LENGTH]; member
2700 __owur int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie,
/openssl/apps/lib/
H A Ds_cb.c833 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_stateless_cookie_callback() argument
880 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback()
893 int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_stateless_cookie_callback() argument
904 && memcmp(result, cookie, resultlength) == 0) in verify_stateless_cookie_callback()
910 int generate_cookie_callback(SSL *ssl, unsigned char *cookie, in generate_cookie_callback() argument
914 int res = generate_stateless_cookie_callback(ssl, cookie, &temp); in generate_cookie_callback()
921 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, in verify_cookie_callback() argument
924 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback()
/openssl/doc/man1/
H A Dopenssl-s_server.pod.in756 Any ClientHellos that arrive will be checked to see if they have a cookie in
758 Any without a cookie will be responded to with a HelloVerifyRequest.
759 If a ClientHello with a cookie is received then this command will
/openssl/crypto/err/
H A Dopenssl.txt1390 SSL_R_COOKIE_GEN_CALLBACK_FAILURE:400:cookie gen callback failure
1391 SSL_R_COOKIE_MISMATCH:308:cookie mismatch
1505 SSL_R_NO_COOKIE_CALLBACK_SET:287:no cookie callback set
1525 SSL_R_NO_VERIFY_COOKIE_CALLBACK:403:no verify cookie callback

Completed in 119 milliseconds

12