| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 70-test_sslvertol.t | 59 my $client_version = TLSProxy::Record::VERS_TLS_1_4; 77 $client_version = TLSProxy::Record::VERS_TLS_1_3; 78 $previous_version = tls_version_below($client_version); 96 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1; 120 $message->client_version($client_version);
|
| H A D | 70-test_renegotiation.t | 89 $chversion = $message->client_version; 91 if ($chversion == $message->client_version) {
|
| H A D | 70-test_sslversions.t | 182 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
|
| /freebsd/crypto/openssl/util/perl/TLSProxy/ |
| H A D | ClientHello.pm | 43 $self->{client_version} = 0; 63 my ($client_version) = unpack('n', $self->data); 104 $self->client_version($client_version); 119 print " Client Version:".$TLSProxy::Record::tls_version{$client_version}."\n"; 163 $data = pack('n', $self->client_version); 200 sub client_version subroutine 204 $self->{client_version} = shift; 206 return $self->{client_version};
|
| /freebsd/crypto/openssl/providers/implementations/asymciphers/ |
| H A D | rsa_enc.c | 74 unsigned int client_version; member 296 if (prsactx->client_version <= 0) { in rsa_decrypt() 303 prsactx->client_version, prsactx->alt_version); in rsa_decrypt() 426 if (p != NULL && !OSSL_PARAM_set_uint(p, prsactx->client_version)) in rsa_get_ctx_params() 578 unsigned int client_version; in rsa_set_ctx_params() local 580 if (!OSSL_PARAM_get_uint(p, &client_version)) in rsa_set_ctx_params() 582 prsactx->client_version = client_version; in rsa_set_ctx_params()
|
| /freebsd/crypto/openssh/ |
| H A D | kexgex.c | 49 const struct sshbuf *client_version, in kexgex_hash() argument 69 if ((r = sshbuf_put_stringb(b, client_version)) < 0 || in kexgex_hash()
|
| H A D | ssh_api.c | 266 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next() 461 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 462 r = _ssh_read_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner() 468 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 469 r = _ssh_send_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner() 475 sshbuf_len(ssh->kex->client_version) != 0) { in _ssh_exchange_banner()
|
| H A D | kexgen.c | 50 const struct sshbuf *client_version, in kex_gen_hash() argument 67 if ((r = sshbuf_put_stringb(b, client_version)) != 0 || in kex_gen_hash() 213 kex->client_version, in input_kex_gen_reply() 343 kex->client_version, in input_kex_gen_init()
|
| H A D | kexgexs.c | 170 kex->client_version, in input_kex_dh_gex_init()
|
| H A D | kex.h | 159 struct sshbuf *client_version; member
|
| H A D | kex.c | 677 (kex->client_version = sshbuf_new()) == NULL || in kex_new() 736 sshbuf_free(kex->client_version); in kex_free() 1243 ssh->kex->server_version : ssh->kex->client_version; in kex_exchange_identification() 1245 ssh->kex->client_version : ssh->kex->server_version; in kex_exchange_identification()
|
| H A D | kexgexc.c | 192 kex->client_version, in input_kex_dh_gex_reply()
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | tlsv1_server_read.c | 180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello() 182 conn->client_version >> 8, in tls_process_client_hello() 183 conn->client_version & 0xff); in tls_process_client_hello() 184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello() 186 conn->client_version >> 8, in tls_process_client_hello() 187 conn->client_version & 0xff); in tls_process_client_hello() 197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello() 200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
|
| H A D | tlsv1_server_i.h | 48 u16 client_version; member
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_pk1.c | 549 size_t flen, int client_version, in ossl_rsa_padding_check_PKCS1_type_2_TLS() argument 593 (client_version >> 8) & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS() 595 client_version & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_lib.c | 2174 int client_version = hello->legacy_version; in ssl_choose_server_version() local 2180 s->client_version = client_version; in ssl_choose_server_version() 2185 if (ssl_version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version() 2238 if (client_version <= SSL3_VERSION) in ssl_choose_server_version() 2277 if (ssl_version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version() 2278 client_version = TLS1_2_VERSION; in ssl_choose_server_version() 2287 if (vent->smeth == NULL || ssl_version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version() 2593 s->client_version = ver_max; in ssl_set_client_hello_version()
|
| H A D | extensions_clnt.c | 336 if (s->client_version < TLS1_2_VERSION in tls_construct_ctos_sig_algs() 341 if (DTLS_VERSION_LT(s->client_version, DTLS1_2_VERSION) in tls_construct_ctos_sig_algs()
|
| H A D | statem_srvr.c | 1769 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1778 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 3054 (unsigned int *)&s->client_version); in tls_process_cke_rsa()
|
| H A D | statem_clnt.c | 1262 if (!WPACKET_put_bytes_u16(pkt, s->client_version) in tls_construct_client_hello() 3138 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa() 3139 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | rsa.h | 99 size_t flen, int client_version,
|
| /freebsd/crypto/openssl/test/recipes/90-test_sslapi_data/ |
| H A D | ssltraceref-zlib.txt | 7 client_version=0x303 (TLS 1.2)
|
| H A D | ssltraceref.txt | 7 client_version=0x303 (TLS 1.2)
|
| /freebsd/crypto/openssl/test/recipes/75-test_quicapi_data/ |
| H A D | ssltraceref-zlib.txt | 7 client_version=0x303 (TLS 1.2)
|
| H A D | ssltraceref.txt | 7 client_version=0x303 (TLS 1.2)
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | d1_lib.c | 221 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
|