Home
last modified time | relevance | path

Searched refs:tls_version (Results 1 – 20 of 20) sorted by relevance

/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_client.c43 u16 tls_version = TLS_VERSION; in tls_client_highest_ver() local
48 tls_version == TLS_VERSION_1_2) in tls_client_highest_ver()
49 tls_version = TLS_VERSION_1_1; in tls_client_highest_ver()
53 tls_version == TLS_VERSION_1_1) in tls_client_highest_ver()
54 tls_version = TLS_VERSION_1; in tls_client_highest_ver()
57 tls_version == TLS_VERSION_1) in tls_client_highest_ver()
60 return tls_version; in tls_client_highest_ver()
89 if (tls_prf(conn->rl.tls_version, in tls_derive_keys()
104 if (conn->rl.tls_version == TLS_VERSION_1) in tls_derive_keys()
106 if (tls_prf(conn->rl.tls_version, in tls_derive_keys()
[all …]
H A Dtlsv1_client_write.c51 u16 tls_version = tls_client_highest_ver(conn); in tls_send_client_hello() local
53 if (!tls_version) { in tls_send_client_hello()
59 tls_version_str(tls_version)); in tls_send_client_hello()
95 WPA_PUT_BE16(pos, tls_version); in tls_send_client_hello()
120 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_send_client_hello()
609 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_write_client_certificate_verify()
674 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_client_certificate_verify()
782 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_client_finished()
823 if (tls_prf(conn->rl.tls_version, in tls_write_client_finished()
979 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_client_send_alert()
H A Dtlsv1_client_read.c84 u16 tls_version; in tls_process_server_hello() local
126 tls_version = WPA_GET_BE16(pos); in tls_process_server_hello()
127 if (!tls_version_ok(tls_version) || in tls_process_server_hello()
128 tls_version_disabled(conn, tls_version)) { in tls_process_server_hello()
138 tls_version_str(tls_version)); in tls_process_server_hello()
139 conn->rl.tls_version = tls_version; in tls_process_server_hello()
738 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tlsv1_process_diffie_hellman()
762 conn->rl.tls_version, pos[0], in tlsv1_process_diffie_hellman()
772 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
783 if (tls_verify_signature(conn->rl.tls_version, in tlsv1_process_diffie_hellman()
[all …]
H A Dtlsv1_common.h262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
272 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_server_write.c88 WPA_PUT_BE16(pos, conn->rl.tls_version); in tls_write_server_hello()
569 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_key_exchange()
572 conn->rl.tls_version, TLS_HASH_ALG_SHA256, in tls_write_server_key_exchange()
621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
846 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_finished()
887 if (tls_prf(conn->rl.tls_version, in tls_write_server_finished()
1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_server_send_alert()
H A Dtlsv1_server_read.c195 conn->rl.tls_version = TLS_VERSION_1; in tls_process_client_hello()
198 conn->rl.tls_version = TLS_VERSION_1_2; in tls_process_client_hello()
201 conn->rl.tls_version = TLS_VERSION_1_1; in tls_process_client_hello()
203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello()
205 tls_version_str(conn->rl.tls_version)); in tls_process_client_hello()
959 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_process_certificate_verify()
1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, in tls_process_certificate_verify()
1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_process_client_finished()
1234 if (tls_prf(conn->rl.tls_version, in tls_process_client_finished()
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument
416 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument
468 if (tls_version >= TLS_VERSION_1_2) { in tls_verify_signature()
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version); in tlsv1_record_send()
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send()
378 if (rl->tls_version >= TLS_VERSION_1_1) { in tlsv1_record_receive()
H A Dtlsv1_record.h32 u16 tls_version; member
H A Dtlsv1_server.c71 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys()
87 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys()
511 res = tls_prf(conn->rl.tls_version, in tlsv1_server_prf()
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DRecord.pm47 my %tls_version = (
84 print " Version: $tls_version{$version}\n";
/freebsd/contrib/sendmail/cf/m4/
H A Dcfhead.m4290 define(`_REC_TLS_', `(version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})…
291 define(`_REC_BY_', `$.by $j ($v/$Z)$?r with $r$. id $i$?{tls_version}')
320 define(`confMILTER_MACROS_HELO', ``{tls_version}, {cipher}, {cipher_bits}, {cert_subject}, {cert_is…
/freebsd/sys/dev/mlx5/mlx5_en/
H A Dmlx5_en_hw_tls.c365 MLX5_SET(sw_tls_cntx, ctx, param.tls_version, 2); /* v1.2 */ in mlx5e_tls_set_params()
367 MLX5_SET(sw_tls_cntx, ctx, param.tls_version, 3); /* v1.3 */ in mlx5e_tls_set_params()
H A Dmlx5_en_hw_tls_rx.c612 MLX5_SET(sw_tls_rx_cntx, ctx, param.tls_version, 2); /* v1.2 */ in mlx5e_tls_rx_set_params()
614 MLX5_SET(sw_tls_rx_cntx, ctx, param.tls_version, 3); /* v1.3 */ in mlx5e_tls_rx_set_params()
/freebsd/crypto/openssl/test/
H A Dsslapitest.c1165 int tls_version, const char *cipher) in execute_test_ktls() argument
1190 tls_version, tls_version, in execute_test_ktls()
1194 if (tls_version == TLS1_3_VERSION) { in execute_test_ktls()
1245 rx_supported = (tls_version != TLS1_3_VERSION); in execute_test_ktls()
1265 tls_version == TLS1_3_VERSION ? "TLS 1.3" : in execute_test_ktls()
1297 static int execute_test_ktls_sendfile(int tls_version, const char *cipher) in execute_test_ktls_sendfile() argument
1329 tls_version, tls_version, in execute_test_ktls_sendfile()
1333 if (tls_version == TLS1_3_VERSION) { in execute_test_ktls_sendfile()
1356 tls_version == TLS1_3_VERSION ? "TLS 1.3" : in execute_test_ktls_sendfile()
1429 int tls_version; member
[all …]
H A Devp_test.c539 int tls_version; member
669 cdat->tls_version = (int)strtol(value, &endptr, 0); in cipher_test_parse()
857 if (expected->tls_version) { in cipher_test_enc()
861 &expected->tls_version); in cipher_test_enc()
971 if (expected->tls_version >= TLS1_1_VERSION in cipher_test_enc()
/freebsd/contrib/sendmail/cf/cf/
H A Dsubmit.cf595 $.by $j ($v/$Z)$?r with $r$. id $i$?{tls_version}
596 (version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})$.$?u
/freebsd/contrib/sendmail/cf/
H A DREADME3054 ${tls_version} the TLS/SSL version used for the connection, e.g., TLSv1,
3291 (version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})
4477 [{tls_version}, {cipher},
/freebsd/sys/dev/mlx5/
H A Dmlx5_ifc.h10847 u8 tls_version[0x4]; member
/freebsd/contrib/sendmail/
H A DRELEASE_NOTES524 Store a more specific TLS protocol version in ${tls_version}
3369 STARTTLS has been used to "(version=${tls_version}
4089 ${tls_version}, ${cipher}, ${cipher_bits}, ${verify},