Home | History | Annotate | Download | only in runner

Lines Matching refs:dtls

5 // DTLS implementation.
7 // NOTE: This is a not even a remotely production-quality DTLS
44 return 0, nil, fmt.Errorf("dtls: exceeded maximum packet length")
52 // A real DTLS implementation should be tolerant of errors,
56 return 0, nil, errors.New("dtls: failed to read record header")
67 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, c.wireVersion))
73 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, expect))
85 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad epoch"))
89 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad sequence number"))
95 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: oversized record received with length %d", n))
102 // A real DTLS implementation would silently ignore bad records,
109 // TODO(nharper): Once DTLS 1.3 is defined, handle the extra
115 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: ChangeCipherSpec not packed together with Finished"))
203 // because OpenSSL's DTLS implementation will probably accept
268 // This is a test-only DTLS implementation, so there is no need to
361 // TODO(nharper): DTLS 1.3 will likely need to set this to
376 // DTLS records include an explicit sequence number.
438 return nil, errors.New("dtls: bad handshake record")
447 return nil, errors.New("dtls: fragment length too long")
453 return nil, errors.New("dtls: bad handshake sequence number")
463 // without the DTLS bits.
466 return nil, errors.New("dtls: bad handshake length")
471 return nil, errors.New("dtls: bad fragment offset")
474 return nil, errors.New("dtls: bad fragment length")
484 // DTLSServer returns a new DTLS server side connection
494 // DTLSClient returns a new DTLS client side connection