Home
last modified time | relevance | path

Searched refs:client_version (Results 1 – 24 of 24) sorted by relevance

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DClientHello.pm32 $self->{client_version} = 0;
50 my ($client_version) = unpack('n', $self->data);
83 $self->client_version($client_version);
96 print " Client Version:".$client_version."\n";
137 $data = pack('n', $self->client_version);
168 sub client_version subroutine
172 $self->{client_version} = shift;
174 return $self->{client_version};
/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslvertol.t60 my $client_version = TLSProxy::Record::VERS_TLS_1_4;
78 $client_version = TLSProxy::Record::VERS_TLS_1_3;
79 $previous_version = tls_version_below($client_version);
97 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1;
121 $message->client_version($client_version);
H A D70-test_renegotiation.t72 $chversion = $message->client_version;
74 if ($chversion == $message->client_version) {
H A D70-test_sslversions.t184 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
/freebsd/crypto/openssl/providers/implementations/asymciphers/
H A Drsa_enc.c76 unsigned int client_version; member
268 if (prsactx->client_version <= 0) { in rsa_decrypt()
275 prsactx->client_version, prsactx->alt_version); in rsa_decrypt()
397 if (p != NULL && !OSSL_PARAM_set_uint(p, prsactx->client_version)) in rsa_get_ctx_params()
537 unsigned int client_version; in rsa_set_ctx_params() local
539 if (!OSSL_PARAM_get_uint(p, &client_version)) in rsa_set_ctx_params()
541 prsactx->client_version = client_version; in rsa_set_ctx_params()
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_server_read.c180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello()
182 conn->client_version >> 8, in tls_process_client_hello()
183 conn->client_version & 0xff); in tls_process_client_hello()
184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello()
186 conn->client_version >> 8, in tls_process_client_hello()
187 conn->client_version & 0xff); in tls_process_client_hello()
197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello()
200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello()
203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello()
665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
H A Dtlsv1_server_i.h48 u16 client_version; member
/freebsd/crypto/openssh/
H A Dkexgex.c49 const struct sshbuf *client_version, in kexgex_hash() argument
69 if ((r = sshbuf_put_stringb(b, client_version)) < 0 || in kexgex_hash()
H A Dssh_api.c266 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next()
461 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner()
462 r = _ssh_read_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner()
468 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner()
469 r = _ssh_send_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner()
475 sshbuf_len(ssh->kex->client_version) != 0) { in _ssh_exchange_banner()
H A Dkexgen.c50 const struct sshbuf *client_version, in kex_gen_hash() argument
67 if ((r = sshbuf_put_stringb(b, client_version)) != 0 || in kex_gen_hash()
213 kex->client_version, in input_kex_gen_reply()
343 kex->client_version, in input_kex_gen_init()
H A Dkexgexs.c170 kex->client_version, in input_kex_dh_gex_init()
H A Dkex.h159 struct sshbuf *client_version; member
H A Dkex.c677 (kex->client_version = sshbuf_new()) == NULL || in kex_new()
736 sshbuf_free(kex->client_version); in kex_free()
1243 ssh->kex->server_version : ssh->kex->client_version; in kex_exchange_identification()
1245 ssh->kex->client_version : ssh->kex->server_version; in kex_exchange_identification()
H A Dkexgexc.c192 kex->client_version, in input_kex_dh_gex_reply()
H A Dpacket.c2361 (r = sshbuf_put_stringb(m, kex->client_version)) != 0 || in kex_to_blob()
2524 (r = sshbuf_get_stringb(m, kex->client_version)) != 0 || in kex_from_blob()
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_pk1.c300 size_t flen, int client_version, in ossl_rsa_padding_check_PKCS1_type_2_TLS() argument
345 (client_version >> 8) & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
348 client_version & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_lib.c1764 int client_version = hello->legacy_version; in ssl_choose_server_version() local
1770 s->client_version = client_version; in ssl_choose_server_version()
1775 if (version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version()
1828 if (client_version <= SSL3_VERSION) in ssl_choose_server_version()
1864 if (version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version()
1865 client_version = TLS1_2_VERSION; in ssl_choose_server_version()
1875 version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version()
2158 s->client_version = ver_max; in ssl_set_client_hello_version()
H A Dstatem_srvr.c1637 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello()
1655 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello()
1690 s->version = s->client_version; in tls_early_post_process_client_hello()
2915 (unsigned int *)&s->client_version); in tls_process_cke_rsa()
H A Dstatem_clnt.c1180 if (!WPACKET_put_bytes_u16(pkt, s->client_version) in tls_construct_client_hello()
2855 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa()
2856 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
/freebsd/crypto/openssl/include/crypto/
H A Drsa.h89 size_t flen, int client_version,
/freebsd/crypto/openssl/ssl/
H A Dssl_local.h378 ((!SSL_IS_DTLS(s) && s->client_version >= TLS1_2_VERSION) || \
379 (SSL_IS_DTLS(s) && DTLS_VERSION_GE(s->client_version, DTLS1_2_VERSION)))
1565 int client_version; member
H A Dd1_lib.c216 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
H A Dssl_lib.c615 s->client_version = s->version; in SSL_clear()
4344 return s->client_version; in SSL_client_version()
/freebsd/crypto/openssl/
H A DCHANGES.md15177 not contain client_version: Instead of aborting with an error,
15192 (sent using the client's version number) if client_version is
15850 first two bytes of the ClientHello message, i.e. client_version.
17900 * Use client_version from client hello to select the protocol