HomeSort by: relevance | last modified time | path
    Searched refs:tls_version (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/external/bsd/ppp/dist/pppd/
tls.c 292 long tls_version = TLS1_2_VERSION; local
294 long tls_version = TLS1_1_VERSION;
296 long tls_version = TLS1_VERSION;
302 tls_version = TLS1_VERSION;
305 tls_version = TLS1_1_VERSION;
309 tls_version = TLS1_2_VERSION;
312 tls_version = TLS_1_1_VERSION;
317 tls_version = TLS1_3_VERSION;
324 dbglog("Setting max protocol version to 0x%X", tls_version);
325 if (!SSL_CTX_set_max_proto_version(ctx, tls_version)) {
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_client.c 43 u16 tls_version = TLS_VERSION; local
48 tls_version == TLS_VERSION_1_2)
49 tls_version = TLS_VERSION_1_1;
53 tls_version == TLS_VERSION_1_1)
54 tls_version = TLS_VERSION_1;
57 tls_version == TLS_VERSION_1)
60 return tls_version;
89 if (tls_prf(conn->rl.tls_version,
104 if (conn->rl.tls_version == TLS_VERSION_1
    [all...]
tlsv1_record.h 32 u16 tls_version; member in struct:tlsv1_record_layer
tlsv1_common.h 18 #define TLS_VERSION TLS_VERSION_1_2
21 #define TLS_VERSION TLS_VERSION_1_1
23 #define TLS_VERSION TLS_VERSION_1
262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
272 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
tlsv1_client_write.c 51 u16 tls_version = tls_client_highest_ver(conn); local
53 if (!tls_version) {
59 tls_version_str(tls_version));
95 WPA_PUT_BE16(pos, tls_version);
120 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
609 if (conn->rl.tls_version == TLS_VERSION_1_2) {
674 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
782 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
823 if (tls_prf(conn->rl.tls_version,
979 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version
    [all...]
tlsv1_client_read.c 84 u16 tls_version; local
126 tls_version = WPA_GET_BE16(pos);
127 if (!tls_version_ok(tls_version) ||
128 tls_version_disabled(conn, tls_version)) {
138 tls_version_str(tls_version));
139 conn->rl.tls_version = tls_version;
738 if (conn->rl.tls_version == TLS_VERSION_1_2) {
762 conn->rl.tls_version, pos[0],
772 conn->rl.tls_version, conn->client_random
    [all...]
tlsv1_record.c 167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
tlsv1_common.c 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg,
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
416 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
468 if (tls_version >= TLS_VERSION_1_2) {
tlsv1_server_read.c 194 if (TLS_VERSION == TLS_VERSION_1)
195 conn->rl.tls_version = TLS_VERSION_1;
198 conn->rl.tls_version = TLS_VERSION_1_2;
201 conn->rl.tls_version = TLS_VERSION_1_1;
203 conn->rl.tls_version = conn->client_version;
205 tls_version_str(conn->rl.tls_version));
959 if (conn->rl.tls_version == TLS_VERSION_1_2) {
1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1234 if (tls_prf(conn->rl.tls_version,
    [all...]
tlsv1_server_write.c 88 WPA_PUT_BE16(pos, conn->rl.tls_version);
569 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
572 conn->rl.tls_version, TLS_HASH_ALG_SHA256,
621 conn->rl.tls_version, conn->client_random,
846 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
887 if (tls_prf(conn->rl.tls_version,
1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
1076 TLS_VERSION);
tlsv1_server.c 71 if (tls_prf(conn->rl.tls_version,
87 if (tls_prf(conn->rl.tls_version,
511 res = tls_prf(conn->rl.tls_version,
  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
HelloVerifyRequest.pm 66 print " Server Version:".$TLSProxy::Record::tls_version{$server_version}."\n";
Record.pm 50 our %tls_version = (
108 print " Version: $tls_version{$version}\n";
ClientHello.pm 119 print " Client Version:".$TLSProxy::Record::tls_version{$client_version}."\n";
ServerHello.pm 133 print " Server Version:".$TLSProxy::Record::tls_version{$server_version}."\n";
  /src/external/mpl/bind/dist/tests/isc/
proxyheader_test.c 47 isc_region_t tls_version; member in struct:dummy_handler_cbarg
64 arg->tls_version = *data;
273 assert_true(cbarg->tls_version.length == 7);
274 assert_true(memcmp(cbarg->tls_version.base, "TLSv1.2", 7) == 0);
312 assert_true(cbarg->tls_version.length == 7);
313 assert_true(memcmp(cbarg->tls_version.base, "TLSv1.2", 7) == 0);
565 const char *tls_version = "TLSv1.3"; local
661 &sslbuf, ISC_PROXY2_TLV_SUBTYPE_TLS_VERSION, tls_version);
676 strlen(tls_version) + strlen(tls_cn);
697 assert_true(cbarg.tls_version.length == strlen(tls_version))
940 const char *tls_version = "TLSv1.3"; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
rpktest.c 108 int tls_version; local
206 tls_version = TLS1_3_VERSION;
214 tls_version = TLS1_2_VERSION;
229 tls_version, tls_version,
352 if (tls_version != TLS1_3_VERSION) {
sslapitest.c 1140 int tls_version, const char *cipher)
1170 tls_version, tls_version,
1174 if (tls_version == TLS1_3_VERSION) {
1249 tls_version == TLS1_3_VERSION ? "TLS 1.3" : "TLS 1.2", cipher);
1311 static int execute_test_ktls_sendfile(int tls_version, const char *cipher,
1345 tls_version, tls_version,
1349 if (tls_version == TLS1_3_VERSION) {
1381 tls_version == TLS1_3_VERSION ? "TLS 1.3" : "TLS 1.2", cipher)
1455 int tls_version; member in struct:ktls_test_cipher
    [all...]
  /src/external/bsd/nsd/dist/
xfrd-tcp.h 255 char** key_id, char** cert_algorithm, char** tls_version);
xfrd-tcp.c 40 char** key_id, char** cert_algorithm, char** tls_version)
56 *tls_version = NULL;
115 *tls_version = region_strdup(region, version_name);
120 *tls_version = region_strdup(region, version_buffer);
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
Record.pm 47 my %tls_version = (
84 print " Version: $tls_version{$version}\n";
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
Record.pm 47 my %tls_version = (
84 print " Version: $tls_version{$version}\n";
  /src/crypto/external/apache2/openssl/dist/apps/
list.c 1745 unsigned int tls_version = TLS1_3_VERSION; local
1747 unsigned int tls_version = TLS1_2_VERSION; local
1865 tls_version = TLS1_2_VERSION;
1870 tls_version = TLS1_3_VERSION;
1997 MAYBE_ADD_NL(list_tls_groups(tls_version, all_tls_groups));
  /src/crypto/external/bsd/openssl/dist/test/
sslapitest.c 1165 int tls_version, const char *cipher)
1190 tls_version, tls_version,
1194 if (tls_version == TLS1_3_VERSION) {
1245 rx_supported = (tls_version != TLS1_3_VERSION);
1265 tls_version == TLS1_3_VERSION ? "TLS 1.3" :
1297 static int execute_test_ktls_sendfile(int tls_version, const char *cipher)
1329 tls_version, tls_version,
1333 if (tls_version == TLS1_3_VERSION)
1429 int tls_version; member in struct:ktls_test_cipher
    [all...]
evp_test.c 539 int tls_version; member in struct:cipher_data_st
669 cdat->tls_version = (int)strtol(value, &endptr, 0);
857 if (expected->tls_version) {
861 &expected->tls_version);
971 if (expected->tls_version >= TLS1_1_VERSION

Completed in 54 milliseconds

1 2