/third_party/openssl/util/perl/TLSProxy/ |
D | ClientHello.pm | 32 $self->{client_version} = 0; 50 my ($client_version) = unpack('n', $self->data); 83 $self->client_version($client_version); 96 print " Client Version:".$client_version."\n"; 137 $data = pack('n', $self->client_version); 168 sub client_version subroutine 172 $self->{client_version} = shift; 174 return $self->{client_version};
|
/third_party/openssl/test/recipes/ |
D | 70-test_sslvertol.t | 60 my $client_version = TLSProxy::Record::VERS_TLS_1_4; 78 $client_version = TLSProxy::Record::VERS_TLS_1_3; 79 $previous_version = tls_version_below($client_version); 97 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1; 121 $message->client_version($client_version);
|
D | 70-test_renegotiation.t | 68 $chversion = $message->client_version; 70 if ($chversion == $message->client_version) {
|
D | 70-test_sslversions.t | 179 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_server_read.c | 180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello() 182 conn->client_version >> 8, in tls_process_client_hello() 183 conn->client_version & 0xff); in tls_process_client_hello() 184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello() 186 conn->client_version >> 8, in tls_process_client_hello() 187 conn->client_version & 0xff); in tls_process_client_hello() 197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello() 200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
|
D | tlsv1_server_i.h | 48 u16 client_version; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_server_read.c | 180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello() 182 conn->client_version >> 8, in tls_process_client_hello() 183 conn->client_version & 0xff); in tls_process_client_hello() 184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello() 186 conn->client_version >> 8, in tls_process_client_hello() 187 conn->client_version & 0xff); in tls_process_client_hello() 197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello() 200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
|
D | tlsv1_server_i.h | 48 u16 client_version; member
|
/third_party/openssl/ssl/statem/ |
D | statem_lib.c | 1760 int client_version = hello->legacy_version; in ssl_choose_server_version() local 1766 s->client_version = client_version; in ssl_choose_server_version() 1771 if (version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version() 1824 if (client_version <= SSL3_VERSION) in ssl_choose_server_version() 1860 if (version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version() 1861 client_version = TLS1_2_VERSION; in ssl_choose_server_version() 1871 version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version() 2163 s->client_version = ver_max; in ssl_set_client_hello_version()
|
D | statem_srvr.c | 1665 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1683 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello() 1724 s->version = s->client_version; in tls_early_post_process_client_hello() 3107 (unsigned)(s->client_version >> 8)); in tls_process_cke_rsa() 3110 (unsigned)(s->client_version & 0xff)); in tls_process_cke_rsa()
|
D | statem_clnt.c | 1187 if (!WPACKET_put_bytes_u16(pkt, s->client_version) in tls_construct_client_hello() 2998 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa() 2999 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
|
/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 293 if (!CBB_add_u16(&body, hs->client_version) || in ssl_write_client_hello() 395 hs->client_version = in do_start_connect() 398 hs->client_version = in do_start_connect() 1322 pms[0] = hs->client_version >> 8; in do_send_client_key_exchange() 1323 pms[1] = hs->client_version & 0xff; in do_send_client_key_exchange()
|
D | handshake_server.cc | 615 hs->client_version = client_hello.version; in do_read_client_hello() 1312 (unsigned)(hs->client_version >> 8)); in do_read_client_key_exchange() 1314 (unsigned)(hs->client_version & 0xff)); in do_read_client_key_exchange()
|
D | internal.h | 1777 uint16_t client_version = 0;
|
/third_party/grpc/src/core/tsi/alts/handshaker/ |
D | alts_handshaker_client.cc | 497 grpc_gcp_RpcProtocolVersions* client_version = in get_serialized_start_client() local 501 client_version, arena.ptr(), &client->options->rpc_versions); in get_serialized_start_client()
|
/third_party/openssl/ssl/ |
D | ssl_local.h | 356 ((!SSL_IS_DTLS(s) && s->client_version >= TLS1_2_VERSION) || \ 357 (SSL_IS_DTLS(s) && DTLS_VERSION_GE(s->client_version, DTLS1_2_VERSION))) 1249 int client_version; member
|
D | d1_lib.c | 199 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
|
D | ssl_lib.c | 608 s->client_version = s->version; in SSL_clear() 4043 return s->client_version; in SSL_client_version()
|
/third_party/python/Lib/urllib/ |
D | request.py | 426 client_version = "Python-urllib/%s" % __version__ 427 self.addheaders = [('User-agent', client_version)]
|
/third_party/openssl/ |
D | CHANGES | 9635 not contain client_version: Instead of aborting with an error, 9648 (sent using the client's version number) if client_version is 10208 first two bytes of the ClientHello message, i.e. client_version. 12011 *) Use client_version from client hello to select the protocol
|