/openssl-master/doc/man3/ |
A D | SSL_alert_type_string.pod | 20 type of the alert specified by B<value>. 26 describing the reason of the alert specified by B<value>. 29 of the alert specified by B<value>. 34 a special situation, it sends an alert. The alert is sent as a special message 39 "close notify" alert is sent as a warning alert. Other examples for 44 alert on it discretion. 46 Several alert messages must be sent as fatal alert messages as specified 62 This indicates that no support is available for this alert type. 63 Probably B<value> does not contain a correct alert message. 74 The connection shall be closed. This is a warning alert. [all …]
|
A D | SSL_shutdown.pod | 16 close_notify shutdown alert to the peer. 18 SSL_shutdown() tries to send the close_notify shutdown alert to the peer. 28 shutdown alert, and reception of the peer's close_notify shutdown alert. 69 to wait for the peer's close_notify alert. 74 state but not actually send the close_notify alert messages, 80 data has been received and doesn't wait for the close_notify alert 94 alert, SSL_shutdown() will only send the alert and then set the 103 to send back a close_notify alert. 109 When it is done sending data, it will send the close_notify alert. 116 If the peer already sent the close_notify alert B<and> it was [all …]
|
A D | SSL_set_shutdown.pod | 33 A close_notify shutdown alert was sent to the peer, the connection is being 38 A shutdown alert was received form the peer, either a normal close_notify 51 alert but to not wait for the peer's answer, when the underlying connection 54 close alert to the peer (see L<SSL_shutdown(3)>).
|
A D | SSL_CTX_set_info_callback.pod | 45 an alert appears, or an error occurs. 50 If an alert is handled, SSL_CB_ALERT is set and B<ret> specifies the alert 79 Callback has been called due to an alert being sent or received. 138 BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", str,
|
A D | SSL_CTX_set_quiet_shutdown.pod | 36 close_notify alert messages using L<SSL_shutdown(3)> 44 The session is thus considered to be shutdown, but no close_notify alert
|
A D | SSL_CTX_set_options.pod | 189 Some TLS implementations do not send the mandatory close_notify alert on 190 shutdown. If the application tries to wait for the close_notify alert but the 192 option is enabled the peer does not need to send the close_notify alert and a 193 closed connection will be treated as if the close_notify alert was received. 378 server with a B<no_renegotiation> warning alert if TLS v1.0 is used or a fatal 379 B<handshake_failure> alert in SSL v3.0. 382 B<handshake_failure> alert is sent. This is because the server code may be
|
A D | SSL_CTX_set_tlsext_servername_callback.pod | 47 handshake will be aborted. The value of the alert to be used should be stored in 54 However, the handshake will continue and send a warning alert instead. The value 55 of the alert should be stored in the location pointed to by the B<al> parameter
|
A D | SSL_CTX_set_verify.pod | 87 immediately terminated with an alert message containing the reason for 95 immediately terminated with an alert message containing the reason for 102 handshake is immediately terminated with a "handshake failure" alert. 175 SSL_VERIFY_PEER is set, a verification failure alert is sent to the peer and 187 alert message, if SSL_VERIFY_PEER is set.
|
A D | SSL_extension_supported.pod | 120 alert value specified in B<*al>. 165 using the TLS alert value specified in B<*al>. 260 B<decode_error> alert is sent and the handshake aborts. If a custom extension 262 the ClientHello a fatal B<unsupported_extension> alert is sent and the
|
A D | SSL_CTX_set_cert_cb.pod | 27 fatal internal error alert. A negative return value will suspend the handshake
|
A D | SSL_get_error.pod | 30 Some TLS implementations do not send a close_notify alert on shutdown. 51 close_notify alert.
|
/openssl-master/test/recipes/ |
A D | 70-test_tls13alerts.t | 41 my $alert = TLSProxy::Message->alert(); 42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecryp…
|
A D | 70-test_tls13downgrade.t | 70 my $alert = TLSProxy::Message->alert(); 72 && !$alert->server() 73 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
|
A D | 70-test_sslrecords.t | 351 my $alert = pack('CC', TLSProxy::Message::AL_LEVEL_FATAL, 353 my $alertlen = length $alert; 362 $alert, 363 $alert
|
/openssl-master/test/ssl-tests/ |
A D | 09-alpn.cnf | 8 test-3 = 3-alpn-alert-on-mismatch 116 [3-alpn-alert-on-mismatch] 117 ssl_conf = 3-alpn-alert-on-mismatch-ssl 119 [3-alpn-alert-on-mismatch-ssl] 120 server = 3-alpn-alert-on-mismatch-server 121 client = 3-alpn-alert-on-mismatch-client 123 [3-alpn-alert-on-mismatch-server] 128 [3-alpn-alert-on-mismatch-client] 139 [3-alpn-alert-on-mismatch-server-extra] 142 [3-alpn-alert-on-mismatch-client-extra] [all …]
|
A D | 09-alpn.cnf.in | 68 name => "alpn-alert-on-mismatch", 264 name => "alpn-alert-on-mismatch-resumption",
|
/openssl-master/util/perl/TLSProxy/ |
A D | Message.pm | 148 my $alert; 161 $alert = undef; 291 $alert = TLSProxy::Alert->new( 413 sub alert subroutine 415 return $alert;
|
A D | Record.pm | 396 my ($level, $alert) = unpack('CC', $self->decrypt_data); 397 return $alert if ($level == 2);
|
/openssl-master/test/ |
A D | README.ssltest.md | 69 * ExpectedClientAlert, ExpectedServerAlert - expected alert. See 70 `test/helpers/ssl_test_ctx.c` for known values. Note: the expected alert is currently 71 matched against the _last_ received alert (i.e., a fatal alert or a 72 `close_notify`). Warning alert expectations are not yet supported. (A warning 73 alert will not be correctly matched, if followed by a `close_notify` or 74 another alert.)
|
A D | ssl_test.c | 29 static const char *print_alert(int alert) in print_alert() argument 31 return alert ? SSL_alert_desc_string_long(alert) : "no alert"; in print_alert()
|
/openssl-master/ssl/record/ |
A D | rec_layer_d1.c | 556 PACKET alert; in dtls1_read_bytes() local 558 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) in dtls1_read_bytes() 559 || !PACKET_get_1(&alert, &alert_level) in dtls1_read_bytes() 560 || !PACKET_get_1(&alert, &alert_descr) in dtls1_read_bytes() 561 || PACKET_remaining(&alert) != 0) { in dtls1_read_bytes()
|
A D | rec_layer_s3.c | 1534 PACKET alert; in ssl3_read_bytes() local 1536 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) in ssl3_read_bytes() 1537 || !PACKET_get_1(&alert, &alert_level) in ssl3_read_bytes() 1538 || !PACKET_get_1(&alert, &alert_descr) in ssl3_read_bytes() 1539 || PACKET_remaining(&alert) != 0) { in ssl3_read_bytes()
|
/openssl-master/test/helpers/ |
A D | ssl_test_ctx.c | 133 __owur static int parse_alert(int *alert, const char *value) in parse_alert() argument 135 return parse_enum(ssl_alerts, OSSL_NELEM(ssl_alerts), alert, value); in parse_alert() 148 const char *ssl_alert_name(int alert) in ssl_alert_name() argument 150 return enum_name(ssl_alerts, OSSL_NELEM(ssl_alerts), alert); in ssl_alert_name()
|
A D | ssl_test_ctx.h | 234 const char *ssl_alert_name(int alert);
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_print_log.pod | 57 ossl_cmp_debug() output a simple alert/error/warning/info/debug message
|