/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 51 u16 tls_version = TLS_VERSION; in tls_send_client_hello() local 56 tls_version == TLS_VERSION_1_2) in tls_send_client_hello() 57 tls_version = TLS_VERSION_1_1; in tls_send_client_hello() 61 tls_version == TLS_VERSION_1_1) in tls_send_client_hello() 62 tls_version = TLS_VERSION_1; in tls_send_client_hello() 65 tls_version == TLS_VERSION_1) { in tls_send_client_hello() 71 tls_version_str(tls_version)); in tls_send_client_hello() 107 WPA_PUT_BE16(pos, tls_version); in tls_send_client_hello() 132 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_send_client_hello() 835 if (tls_prf(conn->rl.tls_version, in tls_write_client_finished() [all …]
|
H A D | tlsv1_client_read.c | 84 u16 tls_version; in tls_process_server_hello() local 126 tls_version = WPA_GET_BE16(pos); in tls_process_server_hello() 127 if (!tls_version_ok(tls_version) || in tls_process_server_hello() 128 tls_version_disabled(conn, tls_version)) { in tls_process_server_hello() 138 tls_version_str(tls_version)); in tls_process_server_hello() 139 conn->rl.tls_version = tls_version; in tls_process_server_hello() 730 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tlsv1_process_diffie_hellman() 754 conn->rl.tls_version, pos[0], in tlsv1_process_diffie_hellman() 764 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman() 1373 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_process_server_finished() [all …]
|
H A D | tlsv1_client.c | 65 if (tls_prf(conn->rl.tls_version, in tls_derive_keys() 80 if (conn->rl.tls_version == TLS_VERSION_1) in tls_derive_keys() 82 if (tls_prf(conn->rl.tls_version, in tls_derive_keys() 108 if (conn->rl.tls_version == TLS_VERSION_1) { in tls_derive_keys() 476 conn->rl.tls_version = TLS_VERSION; in tlsv1_client_init() 563 res = tls_prf(conn->rl.tls_version, in tlsv1_client_prf() 878 switch (conn->rl.tls_version) { in tlsv1_client_get_version()
|
H A D | tlsv1_common.h | 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_server_write.c | 88 WPA_PUT_BE16(pos, conn->rl.tls_version); in tls_write_server_hello() 569 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_key_exchange() 572 conn->rl.tls_version, TLS_HASH_ALG_SHA256, in tls_write_server_key_exchange() 621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange() 846 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_finished() 887 if (tls_prf(conn->rl.tls_version, in tls_write_server_finished() 1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_server_send_alert()
|
H A D | tlsv1_server_read.c | 195 conn->rl.tls_version = TLS_VERSION_1; in tls_process_client_hello() 198 conn->rl.tls_version = TLS_VERSION_1_2; in tls_process_client_hello() 201 conn->rl.tls_version = TLS_VERSION_1_1; in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 205 tls_version_str(conn->rl.tls_version)); in tls_process_client_hello() 959 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_process_certificate_verify() 1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, in tls_process_certificate_verify() 1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_process_client_finished() 1234 if (tls_prf(conn->rl.tls_version, in tls_process_client_finished()
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument 466 if (tls_version >= TLS_VERSION_1_2) { in tls_verify_signature()
|
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); in tlsv1_record_send() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 378 if (rl->tls_version >= TLS_VERSION_1_1) { in tlsv1_record_receive()
|
H A D | tlsv1_record.h | 32 u16 tls_version; member
|
H A D | tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() 87 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() 511 res = tls_prf(conn->rl.tls_version, in tlsv1_server_prf()
|
/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_sigalgs.c | 200 ssl_sigalgs_for_version(uint16_t tls_version, const uint16_t **out_values, in ssl_sigalgs_for_version() argument 203 if (tls_version >= TLS1_3_VERSION) { in ssl_sigalgs_for_version() 244 ssl_sigalgs_build(uint16_t tls_version, CBB *cbb, int security_level) in ssl_sigalgs_build() argument 252 ssl_sigalgs_for_version(tls_version, &values, &len); in ssl_sigalgs_build()
|
H A D | ssl_asn1.c | 247 uint64_t version, tls_version, stime, timeout, verify_result, lifetime; in d2i_SSL_SESSION() local 276 if (!CBS_get_asn1_uint64(&session, &tls_version)) in d2i_SSL_SESSION() 278 if (tls_version > INT_MAX) in d2i_SSL_SESSION() 280 s->ssl_version = (int)tls_version; in d2i_SSL_SESSION()
|
H A D | ssl_tlsext.c | 556 uint16_t tls_version = s->s3->hs.negotiated_tls_version; in tlsext_sigalgs_client_build() local 560 tls_version = s->s3->hs.our_min_tls_version; in tlsext_sigalgs_client_build() 564 if (!ssl_sigalgs_build(tls_version, &sigalgs, SSL_get_security_level(s))) in tlsext_sigalgs_client_build() 2249 uint16_t tls_version; in tlsext_build() local 2252 tls_version = ssl_effective_tls_version(s); in tlsext_build() 2262 if (tls_version >= TLS1_3_VERSION && in tlsext_build() 2325 uint16_t tls_version; in tlsext_parse() local 2328 tls_version = ssl_effective_tls_version(s); in tlsext_parse() 2357 if (tls_version >= TLS1_3_VERSION && is_server && in tlsext_parse() 2365 if (tls_version >= TLS1_3_VERSION && in tlsext_parse()
|
H A D | ssl_sigalgs.h | 72 int ssl_sigalgs_build(uint16_t tls_version, CBB *cbb, int security_level);
|