Home
last modified time | relevance | path

Searched refs:client_version (Results 1 – 25 of 31) sorted by relevance

12

/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslvertol.t59 my $client_version = TLSProxy::Record::VERS_TLS_1_4;
77 $client_version = TLSProxy::Record::VERS_TLS_1_3;
78 $previous_version = tls_version_below($client_version);
96 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1;
120 $message->client_version($client_version);
H A D70-test_renegotiation.t89 $chversion = $message->client_version;
91 if ($chversion == $message->client_version) {
H A D70-test_sslversions.t182 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DClientHello.pm43 $self->{client_version} = 0;
63 my ($client_version) = unpack('n', $self->data);
104 $self->client_version($client_version);
119 print " Client Version:".$TLSProxy::Record::tls_version{$client_version}."\n";
163 $data = pack('n', $self->client_version);
200 sub client_version subroutine
204 $self->{client_version} = shift;
206 return $self->{client_version};
/freebsd/crypto/openssl/providers/implementations/asymciphers/
H A Drsa_enc.c74 unsigned int client_version; member
296 if (prsactx->client_version <= 0) { in rsa_decrypt()
303 prsactx->client_version, prsactx->alt_version); in rsa_decrypt()
426 if (p != NULL && !OSSL_PARAM_set_uint(p, prsactx->client_version)) in rsa_get_ctx_params()
578 unsigned int client_version; in rsa_set_ctx_params() local
580 if (!OSSL_PARAM_get_uint(p, &client_version)) in rsa_set_ctx_params()
582 prsactx->client_version = client_version; in rsa_set_ctx_params()
/freebsd/crypto/openssh/
H A Dkexgex.c49 const struct sshbuf *client_version, in kexgex_hash() argument
69 if ((r = sshbuf_put_stringb(b, client_version)) < 0 || in kexgex_hash()
H A Dssh_api.c266 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next()
461 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner()
462 r = _ssh_read_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner()
468 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner()
469 r = _ssh_send_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner()
475 sshbuf_len(ssh->kex->client_version) != 0) { in _ssh_exchange_banner()
H A Dkexgen.c50 const struct sshbuf *client_version, in kex_gen_hash() argument
67 if ((r = sshbuf_put_stringb(b, client_version)) != 0 || in kex_gen_hash()
213 kex->client_version, in input_kex_gen_reply()
343 kex->client_version, in input_kex_gen_init()
H A Dkexgexs.c170 kex->client_version, in input_kex_dh_gex_init()
H A Dkex.h159 struct sshbuf *client_version; member
H A Dkex.c677 (kex->client_version = sshbuf_new()) == NULL || in kex_new()
736 sshbuf_free(kex->client_version); in kex_free()
1243 ssh->kex->server_version : ssh->kex->client_version; in kex_exchange_identification()
1245 ssh->kex->client_version : ssh->kex->server_version; in kex_exchange_identification()
H A Dkexgexc.c192 kex->client_version, in input_kex_dh_gex_reply()
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_server_read.c180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello()
182 conn->client_version >> 8, in tls_process_client_hello()
183 conn->client_version & 0xff); in tls_process_client_hello()
184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello()
186 conn->client_version >> 8, in tls_process_client_hello()
187 conn->client_version & 0xff); in tls_process_client_hello()
197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello()
200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello()
203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello()
665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
H A Dtlsv1_server_i.h48 u16 client_version; member
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_pk1.c549 size_t flen, int client_version, in ossl_rsa_padding_check_PKCS1_type_2_TLS() argument
593 (client_version >> 8) & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
595 client_version & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_lib.c2174 int client_version = hello->legacy_version; in ssl_choose_server_version() local
2180 s->client_version = client_version; in ssl_choose_server_version()
2185 if (ssl_version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version()
2238 if (client_version <= SSL3_VERSION) in ssl_choose_server_version()
2277 if (ssl_version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version()
2278 client_version = TLS1_2_VERSION; in ssl_choose_server_version()
2287 if (vent->smeth == NULL || ssl_version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version()
2593 s->client_version = ver_max; in ssl_set_client_hello_version()
H A Dextensions_clnt.c336 if (s->client_version < TLS1_2_VERSION in tls_construct_ctos_sig_algs()
341 if (DTLS_VERSION_LT(s->client_version, DTLS1_2_VERSION) in tls_construct_ctos_sig_algs()
H A Dstatem_srvr.c1769 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello()
1778 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello()
3054 (unsigned int *)&s->client_version); in tls_process_cke_rsa()
H A Dstatem_clnt.c1262 if (!WPACKET_put_bytes_u16(pkt, s->client_version) in tls_construct_client_hello()
3138 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa()
3139 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
/freebsd/crypto/openssl/include/crypto/
H A Drsa.h99 size_t flen, int client_version,
/freebsd/crypto/openssl/test/recipes/90-test_sslapi_data/
H A Dssltraceref-zlib.txt7 client_version=0x303 (TLS 1.2)
H A Dssltraceref.txt7 client_version=0x303 (TLS 1.2)
/freebsd/crypto/openssl/test/recipes/75-test_quicapi_data/
H A Dssltraceref-zlib.txt7 client_version=0x303 (TLS 1.2)
H A Dssltraceref.txt7 client_version=0x303 (TLS 1.2)
/freebsd/crypto/openssl/ssl/
H A Dd1_lib.c221 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()

12