/netbsd/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
H A D | ClientHello.pm | 32 $self->{client_version} = 0; 50 my ($client_version) = unpack('n', $self->data); 83 $self->client_version($client_version); 96 print " Client Version:".$client_version."\n"; 137 $data = pack('n', $self->client_version); 168 sub client_version subroutine 172 $self->{client_version} = shift; 174 return $self->{client_version};
|
/netbsd/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
H A D | ClientHello.pm | 32 $self->{client_version} = 0; 50 my ($client_version) = unpack('n', $self->data); 83 $self->client_version($client_version); 96 print " Client Version:".$client_version."\n"; 137 $data = pack('n', $self->client_version); 168 sub client_version subroutine 172 $self->{client_version} = shift; 174 return $self->{client_version};
|
/netbsd/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 70-test_sslvertol.t | 60 my $client_version = TLSProxy::Record::VERS_TLS_1_4; 78 $client_version = TLSProxy::Record::VERS_TLS_1_3; 79 $previous_version = tls_version_below($client_version); 97 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1; 121 $message->client_version($client_version);
|
H A D | 70-test_renegotiation.t | 68 $chversion = $message->client_version; 70 if ($chversion == $message->client_version) {
|
H A D | 70-test_sslversions.t | 179 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
|
/netbsd/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 70-test_sslvertol.t | 60 my $client_version = TLSProxy::Record::VERS_TLS_1_4; 78 $client_version = TLSProxy::Record::VERS_TLS_1_3; 79 $previous_version = tls_version_below($client_version); 97 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1; 121 $message->client_version($client_version);
|
H A D | 70-test_renegotiation.t | 72 $chversion = $message->client_version; 74 if ($chversion == $message->client_version) {
|
H A D | 70-test_sslversions.t | 184 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
|
/netbsd/crypto/external/bsd/openssl/dist/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 76 unsigned int client_version; member 268 if (prsactx->client_version <= 0) { in rsa_decrypt() 275 prsactx->client_version, prsactx->alt_version); in rsa_decrypt() 397 if (p != NULL && !OSSL_PARAM_set_uint(p, prsactx->client_version)) in rsa_get_ctx_params() 537 unsigned int client_version; in rsa_set_ctx_params() local 539 if (!OSSL_PARAM_get_uint(p, &client_version)) in rsa_set_ctx_params() 541 prsactx->client_version = client_version; in rsa_set_ctx_params()
|
/netbsd/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_server_read.c | 180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello() 182 conn->client_version >> 8, in tls_process_client_hello() 183 conn->client_version & 0xff); in tls_process_client_hello() 184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello() 186 conn->client_version >> 8, in tls_process_client_hello() 187 conn->client_version & 0xff); in tls_process_client_hello() 197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello() 200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
|
H A D | tlsv1_server_i.h | 48 u16 client_version; member
|
/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | ssh_api.c | 248 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next() 443 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 444 r = _ssh_read_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner() 450 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 451 r = _ssh_send_banner(ssh, ssh->kex->client_version); in _ssh_exchange_banner() 457 sshbuf_len(ssh->kex->client_version) != 0) { in _ssh_exchange_banner()
|
H A D | kexgen.c | 50 const struct sshbuf *client_version, in kex_gen_hash() argument 67 if ((r = sshbuf_put_stringb(b, client_version)) != 0 || in kex_gen_hash() 206 kex->client_version, in input_kex_gen_reply() 330 kex->client_version, in input_kex_gen_init()
|
H A D | kexgex.c | 46 const struct sshbuf *client_version, in kexgex_hash() argument 66 if ((r = sshbuf_put_stringb(b, client_version)) < 0 || in kexgex_hash()
|
H A D | kex.h | 147 struct sshbuf *client_version; member
|
H A D | kexgexs.c | 167 kex->client_version, in input_kex_dh_gex_init()
|
H A D | kex.c | 708 (kex->client_version = sshbuf_new()) == NULL || in kex_new() 765 sshbuf_free(kex->client_version); in kex_free() 1298 ssh->kex->server_version : ssh->kex->client_version; in kex_exchange_identification() 1300 ssh->kex->client_version : ssh->kex->server_version; in kex_exchange_identification()
|
H A D | kexgexc.c | 190 kex->client_version, in input_kex_dh_gex_reply()
|
/netbsd/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_pk1.c | 300 size_t flen, int client_version, in ossl_rsa_padding_check_PKCS1_type_2_TLS() argument 345 (client_version >> 8) & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS() 348 client_version & 0xff); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
|
/netbsd/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_lib.c | 1760 int client_version = hello->legacy_version; in ssl_choose_server_version() local 1766 s->client_version = client_version; in ssl_choose_server_version() 1771 if (version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version() 1824 if (client_version <= SSL3_VERSION) in ssl_choose_server_version() 1860 if (version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version() 1861 client_version = TLS1_2_VERSION; in ssl_choose_server_version() 1871 version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version() 2163 s->client_version = ver_max; in ssl_set_client_hello_version()
|
H A D | statem_srvr.c | 1665 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1683 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1724 s->version = s->client_version; in tls_early_post_process_client_hello() 3107 (unsigned)(s->client_version >> 8)); in tls_process_cke_rsa() 3110 (unsigned)(s->client_version & 0xff)); in tls_process_cke_rsa()
|
/netbsd/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_lib.c | 1760 int client_version = hello->legacy_version; in ssl_choose_server_version() local 1766 s->client_version = client_version; in ssl_choose_server_version() 1771 if (version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version() 1824 if (client_version <= SSL3_VERSION) in ssl_choose_server_version() 1860 if (version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version() 1861 client_version = TLS1_2_VERSION; in ssl_choose_server_version() 1871 version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version() 2154 s->client_version = ver_max; in ssl_set_client_hello_version()
|
H A D | statem_srvr.c | 1637 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1655 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1690 s->version = s->client_version; in tls_early_post_process_client_hello() 2916 (unsigned int *)&s->client_version); in tls_process_cke_rsa()
|
/netbsd/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | rsa.h | 89 size_t flen, int client_version,
|
/netbsd/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | ssl_local.h | 356 ((!SSL_IS_DTLS(s) && s->client_version >= TLS1_2_VERSION) || \ 357 (SSL_IS_DTLS(s) && DTLS_VERSION_GE(s->client_version, DTLS1_2_VERSION))) 1249 int client_version; member
|