Home
last modified time | relevance | path

Searched refs:client_version (Results 1 – 20 of 20) sorted by relevance

/third_party/openssl/util/perl/TLSProxy/
DClientHello.pm32 $self->{client_version} = 0;
50 my ($client_version) = unpack('n', $self->data);
83 $self->client_version($client_version);
96 print " Client Version:".$client_version."\n";
137 $data = pack('n', $self->client_version);
168 sub client_version subroutine
172 $self->{client_version} = shift;
174 return $self->{client_version};
/third_party/openssl/test/recipes/
D70-test_sslvertol.t60 my $client_version = TLSProxy::Record::VERS_TLS_1_4;
78 $client_version = TLSProxy::Record::VERS_TLS_1_3;
79 $previous_version = tls_version_below($client_version);
97 $client_version = TLSProxy::Record::VERS_SSL_3_0 - 1;
121 $message->client_version($client_version);
D70-test_renegotiation.t68 $chversion = $message->client_version;
70 if ($chversion == $message->client_version) {
D70-test_sslversions.t179 $message->client_version(TLSProxy::Record::VERS_SSL_3_0);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dtlsv1_server_read.c180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello()
182 conn->client_version >> 8, in tls_process_client_hello()
183 conn->client_version & 0xff); in tls_process_client_hello()
184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello()
186 conn->client_version >> 8, in tls_process_client_hello()
187 conn->client_version & 0xff); in tls_process_client_hello()
197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello()
200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello()
203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello()
665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
Dtlsv1_server_i.h48 u16 client_version; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dtlsv1_server_read.c180 conn->client_version = WPA_GET_BE16(pos); in tls_process_client_hello()
182 conn->client_version >> 8, in tls_process_client_hello()
183 conn->client_version & 0xff); in tls_process_client_hello()
184 if (conn->client_version < TLS_VERSION_1) { in tls_process_client_hello()
186 conn->client_version >> 8, in tls_process_client_hello()
187 conn->client_version & 0xff); in tls_process_client_hello()
197 else if (conn->client_version >= TLS_VERSION_1_2) in tls_process_client_hello()
200 else if (conn->client_version > TLS_VERSION_1_1) in tls_process_client_hello()
203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello()
665 if (!use_random && WPA_GET_BE16(out) != conn->client_version) { in tls_process_client_key_exchange_rsa()
Dtlsv1_server_i.h48 u16 client_version; member
/third_party/openssl/ssl/statem/
Dstatem_lib.c1760 int client_version = hello->legacy_version; in ssl_choose_server_version() local
1766 s->client_version = client_version; in ssl_choose_server_version()
1771 if (version_cmp(s, client_version, s->version) < 0) in ssl_choose_server_version()
1824 if (client_version <= SSL3_VERSION) in ssl_choose_server_version()
1860 if (version_cmp(s, client_version, TLS1_3_VERSION) >= 0) in ssl_choose_server_version()
1861 client_version = TLS1_2_VERSION; in ssl_choose_server_version()
1871 version_cmp(s, client_version, vent->version) < 0) in ssl_choose_server_version()
2163 s->client_version = ver_max; in ssl_set_client_hello_version()
Dstatem_srvr.c1665 s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello()
1683 s->version = s->client_version = clienthello->legacy_version; in tls_early_post_process_client_hello()
1724 s->version = s->client_version; in tls_early_post_process_client_hello()
3107 (unsigned)(s->client_version >> 8)); in tls_process_cke_rsa()
3110 (unsigned)(s->client_version & 0xff)); in tls_process_cke_rsa()
Dstatem_clnt.c1187 if (!WPACKET_put_bytes_u16(pkt, s->client_version) in tls_construct_client_hello()
2998 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa()
2999 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
/third_party/boringssl/src/ssl/
Dhandshake_client.cc293 if (!CBB_add_u16(&body, hs->client_version) || in ssl_write_client_hello()
395 hs->client_version = in do_start_connect()
398 hs->client_version = in do_start_connect()
1322 pms[0] = hs->client_version >> 8; in do_send_client_key_exchange()
1323 pms[1] = hs->client_version & 0xff; in do_send_client_key_exchange()
Dhandshake_server.cc615 hs->client_version = client_hello.version; in do_read_client_hello()
1312 (unsigned)(hs->client_version >> 8)); in do_read_client_key_exchange()
1314 (unsigned)(hs->client_version & 0xff)); in do_read_client_key_exchange()
Dinternal.h1777 uint16_t client_version = 0;
/third_party/grpc/src/core/tsi/alts/handshaker/
Dalts_handshaker_client.cc497 grpc_gcp_RpcProtocolVersions* client_version = in get_serialized_start_client() local
501 client_version, arena.ptr(), &client->options->rpc_versions); in get_serialized_start_client()
/third_party/openssl/ssl/
Dssl_local.h356 ((!SSL_IS_DTLS(s) && s->client_version >= TLS1_2_VERSION) || \
357 (SSL_IS_DTLS(s) && DTLS_VERSION_GE(s->client_version, DTLS1_2_VERSION)))
1249 int client_version; member
Dd1_lib.c199 s->client_version = s->version = DTLS1_BAD_VER; in dtls1_clear()
Dssl_lib.c608 s->client_version = s->version; in SSL_clear()
4043 return s->client_version; in SSL_client_version()
/third_party/python/Lib/urllib/
Drequest.py426 client_version = "Python-urllib/%s" % __version__
427 self.addheaders = [('User-agent', client_version)]
/third_party/openssl/
DCHANGES9635 not contain client_version: Instead of aborting with an error,
9648 (sent using the client's version number) if client_version is
10208 first two bytes of the ClientHello message, i.e. client_version.
12011 *) Use client_version from client hello to select the protocol