Home
last modified time | relevance | path

Searched refs:MIDDLEBOX_COMPAT (Results 1 – 10 of 10) sorted by relevance

/dports/security/s2n/s2n-tls-1.1.2/tls/
H A Ds2n_handshake_io.c370 [INITIAL | MIDDLEBOX_COMPAT | EARLY_CLIENT_CCS] = {
380 [INITIAL | HELLO_RETRY_REQUEST | MIDDLEBOX_COMPAT | EARLY_CLIENT_CCS] = {
399 [NEGOTIATED | MIDDLEBOX_COMPAT] = {
406 [NEGOTIATED | MIDDLEBOX_COMPAT | EARLY_CLIENT_CCS] = {
413 [NEGOTIATED | MIDDLEBOX_COMPAT | WITH_EARLY_DATA] = {
420 [NEGOTIATED | MIDDLEBOX_COMPAT | EARLY_CLIENT_CCS | WITH_EARLY_DATA] = {
436 [NEGOTIATED | HELLO_RETRY_REQUEST | MIDDLEBOX_COMPAT] = {
461 [NEGOTIATED | FULL_HANDSHAKE | MIDDLEBOX_COMPAT] = {
468 [NEGOTIATED | FULL_HANDSHAKE | MIDDLEBOX_COMPAT | EARLY_CLIENT_CCS] = {
484 [NEGOTIATED | FULL_HANDSHAKE | HELLO_RETRY_REQUEST | MIDDLEBOX_COMPAT] = {
[all …]
H A Ds2n_handshake_type.h51 ( s2n_handshake_type_check_tls13_flag(conn, MIDDLEBOX_COMPAT) )
82 MIDDLEBOX_COMPAT = 32, enumerator
/dports/security/s2n/s2n-tls-1.1.2/tests/saw/spec/handshake/
H A Ds2n_handshake_io.cry91 else MIDDLEBOX_COMPAT
334 if handshk == (INITIAL || MIDDLEBOX_COMPAT || EARLY_CLIENT_CCS)
358 if handshk == (NEGOTIATED || MIDDLEBOX_COMPAT)
364 if handshk == (NEGOTIATED || MIDDLEBOX_COMPAT || EARLY_CLIENT_CCS)
370 if handshk == (NEGOTIATED || MIDDLEBOX_COMPAT || WITH_EARLY_DATA)
390 if handshk == (NEGOTIATED || HELLO_RETRY_REQUEST || MIDDLEBOX_COMPAT)
412 if handshk == (NEGOTIATED || FULL_HANDSHAKE || MIDDLEBOX_COMPAT)
502 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || MIDDLEBOX_COMPAT)
738 ((conn.handshake.handshake_type && MIDDLEBOX_COMPAT) != zero))
767 MIDDLEBOX_COMPAT : [32]
[all …]
H A Drfc_handshake_tls13.cry100 …ebox_compat = ~conn.quic_enabled \/ ((conn.handshake.handshake_type && MIDDLEBOX_COMPAT) != zero)
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/
H A Ds2n_client_auth_handshake_test.c175 …rver_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT); in s2n_test_client_auth_message_by_message()
228 …ient_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT); in s2n_test_client_auth_message_by_message()
251 …ake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CERT | MIDDLEBOX_COMPAT); in s2n_test_client_auth_message_by_message()
253 …ient_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT); in s2n_test_client_auth_message_by_message()
274 …ake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CERT | MIDDLEBOX_COMPAT); in s2n_test_client_auth_message_by_message()
276 …rver_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT); in s2n_test_client_auth_message_by_message()
H A Ds2n_tls13_handshake_state_machine_test.c197 … if (!(handshake_type_original & NEGOTIATED) || (handshake_type_original & MIDDLEBOX_COMPAT)) { in main()
202 handshake_type_mc = handshake_type_original | MIDDLEBOX_COMPAT; in main()
280 if (!(handshake_type_original & MIDDLEBOX_COMPAT)) { in main()
605 conn->handshake.handshake_type = NEGOTIATED | FULL_HANDSHAKE | MIDDLEBOX_COMPAT; in main()
670 || !(handshake_type & MIDDLEBOX_COMPAT) in main()
730 if (!(handshake_type & NEGOTIATED) || !(handshake_type & MIDDLEBOX_COMPAT)) { in main()
785 …QUAL(conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT); in main()
923 | MIDDLEBOX_COMPAT | WITH_EARLY_DATA | EARLY_CLIENT_CCS; in main()
948 uint32_t test_handshake_type = NEGOTIATED | FULL_HANDSHAKE | MIDDLEBOX_COMPAT; in main()
H A Ds2n_self_talk_offload_signing_test.c148 uint32_t tls_13_handshake = (basic_handshake | MIDDLEBOX_COMPAT); in main()
H A Ds2n_client_early_data_indication_test.c250 EXPECT_EQUAL(conn->handshake.handshake_type, (MIDDLEBOX_COMPAT | EARLY_CLIENT_CCS)); in main()
H A Ds2n_tls13_handshake_test.c594 …XPECT_EQUAL(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | MIDDLEBOX_COMPAT); in main()
/dports/security/s2n/s2n-tls-1.1.2/tls/extensions/
H A Ds2n_client_early_data_indication.c47 RESULT_GUARD(s2n_handshake_type_set_tls13_flag(conn, MIDDLEBOX_COMPAT)); in s2n_setup_middlebox_compat_for_early_data()