/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | ClientHello.pm | 32 $self->{client_version} = 0; 50 my ($client_version) = unpack('n', $self->data); 83 $self->client_version($client_version); 96 print " Client Version:".$client_version."\n"; 137 $data = pack('n', $self->client_version); 168 sub client_version subroutine 172 $self->{client_version} = shift; 174 return $self->{client_version};
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 70-test_sslvertol.t | 60 my $client_version = TLSProxy::Record::VERS_TLS_1_4; 78 $client_version = TLSProxy::Record::VERS_TLS_1_3; 79 $previous_version = tls_version_below($client_version); 97 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1; 121 $message->client_version($client_version);
|
H A D | 70-test_renegotiation.t | 72 $chversion = $message->client_version; 74 if ($chversion == $message->client_version) {
|
H A D | 70-test_sslversions.t | 184 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
|
/freebsd/crypto/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 76 unsigned int client_version; member 268 if (prsactx->client_version <= 0) { in rsa_decrypt() 275 prsactx->client_version, prsactx->alt_version); in rsa_decrypt() 397 if (p != NULL && !OSSL_PARAM_set_uint(p, prsactx->client_version)) in rsa_get_ctx_params() 537 unsigned int client_version; in rsa_set_ctx_params() local 539 if (!OSSL_PARAM_get_uint(p, &client_version)) in rsa_set_ctx_params() 541 prsactx->client_version = client_version; in rsa_set_ctx_params()
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_server_read.c | 180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello() 182 conn->client_version >> 8, in tls_process_client_hello() 183 conn->client_version & 0xff); in tls_process_client_hello() 184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello() 186 conn->client_version >> 8, in tls_process_client_hello() 187 conn->client_version & 0xff); in tls_process_client_hello() 197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello() 200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
|
H A D | tlsv1_server_i.h | 48 u16 client_version; member
|
/freebsd/crypto/openssh/ |
H A D | kexgex.c | 49 const struct sshbuf *client_version, in kexgex_hash() argument 69 if ((r = sshbuf_put_stringb(b, client_version)) < 0 || in kexgex_hash()
|
H A D | ssh_api.c | 266 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next() 461 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 462 r = _ssh_read_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner() 468 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 469 r = _ssh_send_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner() 475 sshbuf_len(ssh->kex->client_version) != 0) { in _ssh_exchange_banner()
|
H A D | kexgen.c | 50 const struct sshbuf *client_version, in kex_gen_hash() argument 67 if ((r = sshbuf_put_stringb(b, client_version)) != 0 || in kex_gen_hash() 213 kex->client_version, in input_kex_gen_reply() 343 kex->client_version, in input_kex_gen_init()
|
H A D | kexgexs.c | 170 kex->client_version, in input_kex_dh_gex_init()
|
H A D | kex.h | 159 struct sshbuf *client_version; member
|
H A D | kex.c | 677 (kex->client_version = sshbuf_new()) == NULL || in kex_new() 736 sshbuf_free(kex->client_version); in kex_free() 1243 ssh->kex->server_version : ssh->kex->client_version; in kex_exchange_identification() 1245 ssh->kex->client_version : ssh->kex->server_version; in kex_exchange_identification()
|
H A D | kexgexc.c | 192 kex->client_version, in input_kex_dh_gex_reply()
|
H A D | packet.c | 2361 (r = sshbuf_put_stringb(m, kex->client_version)) != 0 || in kex_to_blob() 2524 (r = sshbuf_get_stringb(m, kex->client_version)) != 0 || in kex_from_blob()
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 300 size_t flen, int client_version, in ossl_rsa_padding_check_PKCS1_type_2_TLS() argument 345 (client_version >> 8) & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS() 348 client_version & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 1764 int client_version = hello->legacy_version; in ssl_choose_server_version() local 1770 s->client_version = client_version; in ssl_choose_server_version() 1775 if (version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version() 1828 if (client_version <= SSL3_VERSION) in ssl_choose_server_version() 1864 if (version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version() 1865 client_version = TLS1_2_VERSION; in ssl_choose_server_version() 1875 version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version() 2158 s->client_version = ver_max; in ssl_set_client_hello_version()
|
H A D | statem_srvr.c | 1637 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1655 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1690 s->version = s->client_version; in tls_early_post_process_client_hello() 2915 (unsigned int *)&s->client_version); in tls_process_cke_rsa()
|
H A D | statem_clnt.c | 1180 if (!WPACKET_put_bytes_u16(pkt, s->client_version) in tls_construct_client_hello() 2855 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa() 2856 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | rsa.h | 89 size_t flen, int client_version,
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_local.h | 378 ((!SSL_IS_DTLS(s) && s->client_version >= TLS1_2_VERSION) || \ 379 (SSL_IS_DTLS(s) && DTLS_VERSION_GE(s->client_version, DTLS1_2_VERSION))) 1565 int client_version; member
|
H A D | d1_lib.c | 216 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
|
H A D | ssl_lib.c | 615 s->client_version = s->version; in SSL_clear() 4344 return s->client_version; in SSL_client_version()
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 15177 not contain client_version: Instead of aborting with an error, 15192 (sent using the client's version number) if client_version is 15850 first two bytes of the ClientHello message, i.e. client_version. 17900 * Use client_version from client hello to select the protocol
|