Searched refs:renegotiation (Results 1 - 6 of 6) sorted by relevance
/third_party/node/test/parallel/ |
H A D | test-https-client-renegotiation-limit.js | 61 assert.match(err.message, /TLS session renegotiation attack/); 99 // Simulate renegotiation attack
|
H A D | test-tls-client-renegotiation-limit.js | 59 assert.match(err.message, /TLS session renegotiation attack/); 90 // Simulate renegotiation attack
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_client2.c | 157 " cid_renego=%%d Disable (0) or enable (1) the use of the DTLS Connection ID extension during renegotiation.\n" \ 161 " cid_val_renego=%%s The CID to use for incoming messages (in hex, without 0x) after renegotiation.\n" \ 308 " renegotiation=%%d default: 0 (disabled)\n" \ 499 int renegotiation; /* enable / disable renegotiation */ member 500 int allow_legacy; /* allow legacy renegotiation */ 501 int renegotiate; /* attempt renegotiation? */ 502 int renego_delay; /* delay before enforcing renegotiation */ 535 * during renegotiation */ 542 * after renegotiation */ [all...] |
H A D | ssl_server2.c | 229 " cid_renego=%%d Disable (0) or enable (1) the use of the DTLS Connection ID extension during renegotiation.\n" \ 233 " cid_val_renego=%%s The CID to use for incoming messages (in hex, without 0x) after renegotiation.\n" \ 410 " renegotiation=%%d default: 0 (disabled)\n" \ 646 int renegotiation; /* enable / disable renegotiation */ member 647 int allow_legacy; /* allow legacy renegotiation */ 648 int renegotiate; /* attempt renegotiation? */ 649 int renego_delay; /* delay before enforcing renegotiation */ 650 uint64_t renego_period; /* period for automatic renegotiation */ 690 * during renegotiation */ [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 131 /** Unexpected message at ServerHello in renegotiation. */ 453 * Length of the verify data for secure renegotiation 460 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF /**< renegotiation info ext */ 1262 * changes during renegotiation, mitigating the triple handshake attack. */ 1445 uint8_t MBEDTLS_PRIVATE(disable_renegotiation); /*!< disable renegotiation? */ 1654 int MBEDTLS_PRIVATE(renego_max_records); /*!< grace period for renegotiation */ 1656 that triggers renegotiation */ 1905 * Secure renegotiation 1909 secure renegotiation */ 2297 * (for a renegotiation handshak [all...] |
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 1573 /* Reset renegotiation state */ in mbedtls_ssl_session_reset_int() 2983 void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation) in mbedtls_ssl_conf_renegotiation() argument 2985 conf->disable_renegotiation = renegotiation; in mbedtls_ssl_conf_renegotiation() 4625 * Write HelloRequest to request renegotiation on server 4696 * or request renegotiation on server 4726 * On client, either start the renegotiation process or, in mbedtls_ssl_renegotiate() 7520 /* If renegotiation is not enforced, retransmit until we would reach max in mbedtls_ssl_resend_hello_request() 7815 /* During client-side renegotiation, check that the server's in ssl_parse_certificate_chain() 7819 MBEDTLS_SSL_DEBUG_MSG(3, ("Check that peer CRT hasn't changed during renegotiation")); in ssl_parse_certificate_chain() 7823 MBEDTLS_SSL_DEBUG_MSG(1, ("new server cert during renegotiation")); in ssl_parse_certificate_chain() [all...] |
Completed in 18 milliseconds