/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_client.c | 43 u16 tls_version = TLS_VERSION; in tls_client_highest_ver() local 48 tls_version == TLS_VERSION_1_2) in tls_client_highest_ver() 49 tls_version = TLS_VERSION_1_1; in tls_client_highest_ver() 53 tls_version == TLS_VERSION_1_1) in tls_client_highest_ver() 54 tls_version = TLS_VERSION_1; in tls_client_highest_ver() 57 tls_version == TLS_VERSION_1) in tls_client_highest_ver() 60 return tls_version; in tls_client_highest_ver() 89 if (tls_prf(conn->rl.tls_version, in tls_derive_keys() 104 if (conn->rl.tls_version == TLS_VERSION_1) in tls_derive_keys() 106 if (tls_prf(conn->rl.tls_version, in tls_derive_keys() [all …]
|
H A D | tlsv1_client_write.c | 51 u16 tls_version = tls_client_highest_ver(conn); in tls_send_client_hello() local 53 if (!tls_version) { in tls_send_client_hello() 59 tls_version_str(tls_version)); in tls_send_client_hello() 95 WPA_PUT_BE16(pos, tls_version); in tls_send_client_hello() 120 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_send_client_hello() 609 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_write_client_certificate_verify() 674 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_client_certificate_verify() 782 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_client_finished() 823 if (tls_prf(conn->rl.tls_version, in tls_write_client_finished() 979 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_client_send_alert()
|
H A D | tlsv1_client_read.c | 84 u16 tls_version; in tls_process_server_hello() local 126 tls_version = WPA_GET_BE16(pos); in tls_process_server_hello() 127 if (!tls_version_ok(tls_version) || in tls_process_server_hello() 128 tls_version_disabled(conn, tls_version)) { in tls_process_server_hello() 138 tls_version_str(tls_version)); in tls_process_server_hello() 139 conn->rl.tls_version = tls_version; in tls_process_server_hello() 738 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tlsv1_process_diffie_hellman() 762 conn->rl.tls_version, pos[0], in tlsv1_process_diffie_hellman() 772 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman() 783 if (tls_verify_signature(conn->rl.tls_version, in tlsv1_process_diffie_hellman() [all …]
|
H A D | tlsv1_common.h | 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 272 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_server_write.c | 88 WPA_PUT_BE16(pos, conn->rl.tls_version); in tls_write_server_hello() 569 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_key_exchange() 572 conn->rl.tls_version, TLS_HASH_ALG_SHA256, in tls_write_server_key_exchange() 621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange() 846 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_finished() 887 if (tls_prf(conn->rl.tls_version, in tls_write_server_finished() 1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_server_send_alert()
|
H A D | tlsv1_server_read.c | 195 conn->rl.tls_version = TLS_VERSION_1; in tls_process_client_hello() 198 conn->rl.tls_version = TLS_VERSION_1_2; in tls_process_client_hello() 201 conn->rl.tls_version = TLS_VERSION_1_1; in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 205 tls_version_str(conn->rl.tls_version)); in tls_process_client_hello() 959 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_process_certificate_verify() 1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, in tls_process_certificate_verify() 1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_process_client_finished() 1234 if (tls_prf(conn->rl.tls_version, in tls_process_client_finished()
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 416 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument 468 if (tls_version >= TLS_VERSION_1_2) { in tls_verify_signature()
|
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); in tlsv1_record_send() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 378 if (rl->tls_version >= TLS_VERSION_1_1) { in tlsv1_record_receive()
|
H A D | tlsv1_record.h | 32 u16 tls_version; member
|
H A D | tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() 87 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() 511 res = tls_prf(conn->rl.tls_version, in tlsv1_server_prf()
|
/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | Record.pm | 47 my %tls_version = ( 84 print " Version: $tls_version{$version}\n";
|
/freebsd/contrib/sendmail/cf/m4/ |
H A D | cfhead.m4 | 290 define(`_REC_TLS_', `(version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})… 291 define(`_REC_BY_', `$.by $j ($v/$Z)$?r with $r$. id $i$?{tls_version}') 320 define(`confMILTER_MACROS_HELO', ``{tls_version}, {cipher}, {cipher_bits}, {cert_subject}, {cert_is…
|
/freebsd/sys/dev/mlx5/mlx5_en/ |
H A D | mlx5_en_hw_tls.c | 365 MLX5_SET(sw_tls_cntx, ctx, param.tls_version, 2); /* v1.2 */ in mlx5e_tls_set_params() 367 MLX5_SET(sw_tls_cntx, ctx, param.tls_version, 3); /* v1.3 */ in mlx5e_tls_set_params()
|
H A D | mlx5_en_hw_tls_rx.c | 612 MLX5_SET(sw_tls_rx_cntx, ctx, param.tls_version, 2); /* v1.2 */ in mlx5e_tls_rx_set_params() 614 MLX5_SET(sw_tls_rx_cntx, ctx, param.tls_version, 3); /* v1.3 */ in mlx5e_tls_rx_set_params()
|
/freebsd/crypto/openssl/test/ |
H A D | sslapitest.c | 1165 int tls_version, const char *cipher) in execute_test_ktls() argument 1190 tls_version, tls_version, in execute_test_ktls() 1194 if (tls_version == TLS1_3_VERSION) { in execute_test_ktls() 1245 rx_supported = (tls_version != TLS1_3_VERSION); in execute_test_ktls() 1265 tls_version == TLS1_3_VERSION ? "TLS 1.3" : in execute_test_ktls() 1297 static int execute_test_ktls_sendfile(int tls_version, const char *cipher) in execute_test_ktls_sendfile() argument 1329 tls_version, tls_version, in execute_test_ktls_sendfile() 1333 if (tls_version == TLS1_3_VERSION) { in execute_test_ktls_sendfile() 1356 tls_version == TLS1_3_VERSION ? "TLS 1.3" : in execute_test_ktls_sendfile() 1429 int tls_version; member [all …]
|
H A D | evp_test.c | 539 int tls_version; member 669 cdat->tls_version = (int)strtol(value, &endptr, 0); in cipher_test_parse() 857 if (expected->tls_version) { in cipher_test_enc() 861 &expected->tls_version); in cipher_test_enc() 971 if (expected->tls_version >= TLS1_1_VERSION in cipher_test_enc()
|
/freebsd/contrib/sendmail/cf/cf/ |
H A D | submit.cf | 595 $.by $j ($v/$Z)$?r with $r$. id $i$?{tls_version} 596 (version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})$.$?u
|
/freebsd/contrib/sendmail/cf/ |
H A D | README | 3054 ${tls_version} the TLS/SSL version used for the connection, e.g., TLSv1, 3291 (version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify}) 4477 [{tls_version}, {cipher},
|
/freebsd/sys/dev/mlx5/ |
H A D | mlx5_ifc.h | 10847 u8 tls_version[0x4]; member
|
/freebsd/contrib/sendmail/ |
H A D | RELEASE_NOTES | 524 Store a more specific TLS protocol version in ${tls_version} 3369 STARTTLS has been used to "(version=${tls_version} 4089 ${tls_version}, ${cipher}, ${cipher_bits}, ${verify},
|