| /src/external/bsd/ppp/dist/pppd/ |
| tls.c | 292 long tls_version = TLS1_2_VERSION; local 294 long tls_version = TLS1_1_VERSION; 296 long tls_version = TLS1_VERSION; 302 tls_version = TLS1_VERSION; 305 tls_version = TLS1_1_VERSION; 309 tls_version = TLS1_2_VERSION; 312 tls_version = TLS_1_1_VERSION; 317 tls_version = TLS1_3_VERSION; 324 dbglog("Setting max protocol version to 0x%X", tls_version); 325 if (!SSL_CTX_set_max_proto_version(ctx, tls_version)) { [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client.c | 43 u16 tls_version = TLS_VERSION; local 48 tls_version == TLS_VERSION_1_2) 49 tls_version = TLS_VERSION_1_1; 53 tls_version == TLS_VERSION_1_1) 54 tls_version = TLS_VERSION_1; 57 tls_version == TLS_VERSION_1) 60 return tls_version; 89 if (tls_prf(conn->rl.tls_version, 104 if (conn->rl.tls_version == TLS_VERSION_1 [all...] |
| tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
| tlsv1_common.h | 18 #define TLS_VERSION TLS_VERSION_1_2 21 #define TLS_VERSION TLS_VERSION_1_1 23 #define TLS_VERSION TLS_VERSION_1 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 272 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
| tlsv1_client_write.c | 51 u16 tls_version = tls_client_highest_ver(conn); local 53 if (!tls_version) { 59 tls_version_str(tls_version)); 95 WPA_PUT_BE16(pos, tls_version); 120 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 609 if (conn->rl.tls_version == TLS_VERSION_1_2) { 674 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 782 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 823 if (tls_prf(conn->rl.tls_version, 979 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version [all...] |
| tlsv1_client_read.c | 84 u16 tls_version; local 126 tls_version = WPA_GET_BE16(pos); 127 if (!tls_version_ok(tls_version) || 128 tls_version_disabled(conn, tls_version)) { 138 tls_version_str(tls_version)); 139 conn->rl.tls_version = tls_version; 738 if (conn->rl.tls_version == TLS_VERSION_1_2) { 762 conn->rl.tls_version, pos[0], 772 conn->rl.tls_version, conn->client_random [all...] |
| tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
| tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 416 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 468 if (tls_version >= TLS_VERSION_1_2) {
|
| tlsv1_server_read.c | 194 if (TLS_VERSION == TLS_VERSION_1) 195 conn->rl.tls_version = TLS_VERSION_1; 198 conn->rl.tls_version = TLS_VERSION_1_2; 201 conn->rl.tls_version = TLS_VERSION_1_1; 203 conn->rl.tls_version = conn->client_version; 205 tls_version_str(conn->rl.tls_version)); 959 if (conn->rl.tls_version == TLS_VERSION_1_2) { 1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, 1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 1234 if (tls_prf(conn->rl.tls_version, [all...] |
| tlsv1_server_write.c | 88 WPA_PUT_BE16(pos, conn->rl.tls_version); 569 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 572 conn->rl.tls_version, TLS_HASH_ALG_SHA256, 621 conn->rl.tls_version, conn->client_random, 846 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 887 if (tls_prf(conn->rl.tls_version, 1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : 1076 TLS_VERSION);
|
| tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, 87 if (tls_prf(conn->rl.tls_version, 511 res = tls_prf(conn->rl.tls_version,
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| HelloVerifyRequest.pm | 66 print " Server Version:".$TLSProxy::Record::tls_version{$server_version}."\n";
|
| Record.pm | 50 our %tls_version = ( 108 print " Version: $tls_version{$version}\n";
|
| ClientHello.pm | 119 print " Client Version:".$TLSProxy::Record::tls_version{$client_version}."\n";
|
| ServerHello.pm | 133 print " Server Version:".$TLSProxy::Record::tls_version{$server_version}."\n";
|
| /src/external/mpl/bind/dist/tests/isc/ |
| proxyheader_test.c | 47 isc_region_t tls_version; member in struct:dummy_handler_cbarg 64 arg->tls_version = *data; 273 assert_true(cbarg->tls_version.length == 7); 274 assert_true(memcmp(cbarg->tls_version.base, "TLSv1.2", 7) == 0); 312 assert_true(cbarg->tls_version.length == 7); 313 assert_true(memcmp(cbarg->tls_version.base, "TLSv1.2", 7) == 0); 565 const char *tls_version = "TLSv1.3"; local 661 &sslbuf, ISC_PROXY2_TLV_SUBTYPE_TLS_VERSION, tls_version); 676 strlen(tls_version) + strlen(tls_cn); 697 assert_true(cbarg.tls_version.length == strlen(tls_version)) 940 const char *tls_version = "TLSv1.3"; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| rpktest.c | 108 int tls_version; local 206 tls_version = TLS1_3_VERSION; 214 tls_version = TLS1_2_VERSION; 229 tls_version, tls_version, 352 if (tls_version != TLS1_3_VERSION) {
|
| sslapitest.c | 1140 int tls_version, const char *cipher) 1170 tls_version, tls_version, 1174 if (tls_version == TLS1_3_VERSION) { 1249 tls_version == TLS1_3_VERSION ? "TLS 1.3" : "TLS 1.2", cipher); 1311 static int execute_test_ktls_sendfile(int tls_version, const char *cipher, 1345 tls_version, tls_version, 1349 if (tls_version == TLS1_3_VERSION) { 1381 tls_version == TLS1_3_VERSION ? "TLS 1.3" : "TLS 1.2", cipher) 1455 int tls_version; member in struct:ktls_test_cipher [all...] |
| /src/external/bsd/nsd/dist/ |
| xfrd-tcp.h | 255 char** key_id, char** cert_algorithm, char** tls_version);
|
| xfrd-tcp.c | 40 char** key_id, char** cert_algorithm, char** tls_version) 56 *tls_version = NULL; 115 *tls_version = region_strdup(region, version_name); 120 *tls_version = region_strdup(region, version_buffer);
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Record.pm | 47 my %tls_version = ( 84 print " Version: $tls_version{$version}\n";
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Record.pm | 47 my %tls_version = ( 84 print " Version: $tls_version{$version}\n";
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| list.c | 1745 unsigned int tls_version = TLS1_3_VERSION; local 1747 unsigned int tls_version = TLS1_2_VERSION; local 1865 tls_version = TLS1_2_VERSION; 1870 tls_version = TLS1_3_VERSION; 1997 MAYBE_ADD_NL(list_tls_groups(tls_version, all_tls_groups));
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| sslapitest.c | 1165 int tls_version, const char *cipher) 1190 tls_version, tls_version, 1194 if (tls_version == TLS1_3_VERSION) { 1245 rx_supported = (tls_version != TLS1_3_VERSION); 1265 tls_version == TLS1_3_VERSION ? "TLS 1.3" : 1297 static int execute_test_ktls_sendfile(int tls_version, const char *cipher) 1329 tls_version, tls_version, 1333 if (tls_version == TLS1_3_VERSION) 1429 int tls_version; member in struct:ktls_test_cipher [all...] |
| evp_test.c | 539 int tls_version; member in struct:cipher_data_st 669 cdat->tls_version = (int)strtol(value, &endptr, 0); 857 if (expected->tls_version) { 861 &expected->tls_version); 971 if (expected->tls_version >= TLS1_1_VERSION
|