Home
last modified time | relevance | path

Searched refs:alert (Results 1 – 25 of 37) sorted by relevance

12

/openssl-master/doc/man3/
A DSSL_alert_type_string.pod20 type of the alert specified by B<value>.
26 describing the reason of the alert specified by B<value>.
29 of the alert specified by B<value>.
34 a special situation, it sends an alert. The alert is sent as a special message
39 "close notify" alert is sent as a warning alert. Other examples for
44 alert on it discretion.
46 Several alert messages must be sent as fatal alert messages as specified
62 This indicates that no support is available for this alert type.
63 Probably B<value> does not contain a correct alert message.
74 The connection shall be closed. This is a warning alert.
[all …]
A DSSL_shutdown.pod16 close_notify shutdown alert to the peer.
18 SSL_shutdown() tries to send the close_notify shutdown alert to the peer.
28 shutdown alert, and reception of the peer's close_notify shutdown alert.
69 to wait for the peer's close_notify alert.
74 state but not actually send the close_notify alert messages,
80 data has been received and doesn't wait for the close_notify alert
94 alert, SSL_shutdown() will only send the alert and then set the
103 to send back a close_notify alert.
109 When it is done sending data, it will send the close_notify alert.
116 If the peer already sent the close_notify alert B<and> it was
[all …]
A DSSL_set_shutdown.pod33 A close_notify shutdown alert was sent to the peer, the connection is being
38 A shutdown alert was received form the peer, either a normal close_notify
51 alert but to not wait for the peer's answer, when the underlying connection
54 close alert to the peer (see L<SSL_shutdown(3)>).
A DSSL_CTX_set_info_callback.pod45 an alert appears, or an error occurs.
50 If an alert is handled, SSL_CB_ALERT is set and B<ret> specifies the alert
79 Callback has been called due to an alert being sent or received.
138 BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", str,
A DSSL_CTX_set_quiet_shutdown.pod36 close_notify alert messages using L<SSL_shutdown(3)>
44 The session is thus considered to be shutdown, but no close_notify alert
A DSSL_CTX_set_options.pod189 Some TLS implementations do not send the mandatory close_notify alert on
190 shutdown. If the application tries to wait for the close_notify alert but the
192 option is enabled the peer does not need to send the close_notify alert and a
193 closed connection will be treated as if the close_notify alert was received.
378 server with a B<no_renegotiation> warning alert if TLS v1.0 is used or a fatal
379 B<handshake_failure> alert in SSL v3.0.
382 B<handshake_failure> alert is sent. This is because the server code may be
A DSSL_CTX_set_tlsext_servername_callback.pod47 handshake will be aborted. The value of the alert to be used should be stored in
54 However, the handshake will continue and send a warning alert instead. The value
55 of the alert should be stored in the location pointed to by the B<al> parameter
A DSSL_CTX_set_verify.pod87 immediately terminated with an alert message containing the reason for
95 immediately terminated with an alert message containing the reason for
102 handshake is immediately terminated with a "handshake failure" alert.
175 SSL_VERIFY_PEER is set, a verification failure alert is sent to the peer and
187 alert message, if SSL_VERIFY_PEER is set.
A DSSL_extension_supported.pod120 alert value specified in B<*al>.
165 using the TLS alert value specified in B<*al>.
260 B<decode_error> alert is sent and the handshake aborts. If a custom extension
262 the ClientHello a fatal B<unsupported_extension> alert is sent and the
A DSSL_CTX_set_cert_cb.pod27 fatal internal error alert. A negative return value will suspend the handshake
A DSSL_get_error.pod30 Some TLS implementations do not send a close_notify alert on shutdown.
51 close_notify alert.
/openssl-master/test/recipes/
A D70-test_tls13alerts.t41 my $alert = TLSProxy::Message->alert();
42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecryp…
A D70-test_tls13downgrade.t70 my $alert = TLSProxy::Message->alert();
72 && !$alert->server()
73 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
A D70-test_sslrecords.t351 my $alert = pack('CC', TLSProxy::Message::AL_LEVEL_FATAL,
353 my $alertlen = length $alert;
362 $alert,
363 $alert
/openssl-master/test/ssl-tests/
A D09-alpn.cnf8 test-3 = 3-alpn-alert-on-mismatch
116 [3-alpn-alert-on-mismatch]
117 ssl_conf = 3-alpn-alert-on-mismatch-ssl
119 [3-alpn-alert-on-mismatch-ssl]
120 server = 3-alpn-alert-on-mismatch-server
121 client = 3-alpn-alert-on-mismatch-client
123 [3-alpn-alert-on-mismatch-server]
128 [3-alpn-alert-on-mismatch-client]
139 [3-alpn-alert-on-mismatch-server-extra]
142 [3-alpn-alert-on-mismatch-client-extra]
[all …]
A D09-alpn.cnf.in68 name => "alpn-alert-on-mismatch",
264 name => "alpn-alert-on-mismatch-resumption",
/openssl-master/util/perl/TLSProxy/
A DMessage.pm148 my $alert;
161 $alert = undef;
291 $alert = TLSProxy::Alert->new(
413 sub alert subroutine
415 return $alert;
A DRecord.pm396 my ($level, $alert) = unpack('CC', $self->decrypt_data);
397 return $alert if ($level == 2);
/openssl-master/test/
A DREADME.ssltest.md69 * ExpectedClientAlert, ExpectedServerAlert - expected alert. See
70 `test/helpers/ssl_test_ctx.c` for known values. Note: the expected alert is currently
71 matched against the _last_ received alert (i.e., a fatal alert or a
72 `close_notify`). Warning alert expectations are not yet supported. (A warning
73 alert will not be correctly matched, if followed by a `close_notify` or
74 another alert.)
A Dssl_test.c29 static const char *print_alert(int alert) in print_alert() argument
31 return alert ? SSL_alert_desc_string_long(alert) : "no alert"; in print_alert()
/openssl-master/ssl/record/
A Drec_layer_d1.c556 PACKET alert; in dtls1_read_bytes() local
558 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) in dtls1_read_bytes()
559 || !PACKET_get_1(&alert, &alert_level) in dtls1_read_bytes()
560 || !PACKET_get_1(&alert, &alert_descr) in dtls1_read_bytes()
561 || PACKET_remaining(&alert) != 0) { in dtls1_read_bytes()
A Drec_layer_s3.c1534 PACKET alert; in ssl3_read_bytes() local
1536 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) in ssl3_read_bytes()
1537 || !PACKET_get_1(&alert, &alert_level) in ssl3_read_bytes()
1538 || !PACKET_get_1(&alert, &alert_descr) in ssl3_read_bytes()
1539 || PACKET_remaining(&alert) != 0) { in ssl3_read_bytes()
/openssl-master/test/helpers/
A Dssl_test_ctx.c133 __owur static int parse_alert(int *alert, const char *value) in parse_alert() argument
135 return parse_enum(ssl_alerts, OSSL_NELEM(ssl_alerts), alert, value); in parse_alert()
148 const char *ssl_alert_name(int alert) in ssl_alert_name() argument
150 return enum_name(ssl_alerts, OSSL_NELEM(ssl_alerts), alert); in ssl_alert_name()
A Dssl_test_ctx.h234 const char *ssl_alert_name(int alert);
/openssl-master/doc/internal/man3/
A Dossl_cmp_print_log.pod57 ossl_cmp_debug() output a simple alert/error/warning/info/debug message

Completed in 190 milliseconds

12