HomeSort by relevance Sort by last modified time
    Searched refs:tls_version (Results 1 - 12 of 12) sorted by null

  /external/wpa_supplicant_8/src/tls/
tlsv1_record.h 32 u16 tls_version; member in struct:tlsv1_record_layer
tlsv1_server_write.c 85 WPA_PUT_BE16(pos, conn->rl.tls_version);
443 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
446 conn->rl.tls_version, conn->client_random,
494 conn->rl.tls_version, conn->client_random,
719 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
760 if (tls_prf(conn->rl.tls_version,
922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
923 TLS_VERSION);
tlsv1_client_read.c 36 u16 tls_version; local
78 tls_version = WPA_GET_BE16(pos);
79 if (!tls_version_ok(tls_version)) {
89 tls_version_str(tls_version));
90 conn->rl.tls_version = tls_version;
510 if (conn->rl.tls_version == TLS_VERSION_1_2) {
533 conn->rl.tls_version, conn->client_random,
541 conn->rl.tls_version, conn->client_random,
551 if (tls_verify_signature(conn->rl.tls_version,
    [all...]
tlsv1_common.h 18 #define TLS_VERSION TLS_VERSION_1_2
21 #define TLS_VERSION TLS_VERSION_1_1
23 #define TLS_VERSION TLS_VERSION_1
260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
tlsv1_client.c 42 WPA_PUT_BE16(pre_master_secret, TLS_VERSION);
64 if (tls_prf(conn->rl.tls_version,
79 if (conn->rl.tls_version == TLS_VERSION_1)
81 if (tls_prf(conn->rl.tls_version,
107 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
540 return tls_prf(conn->rl.tls_version,
tlsv1_client_write.c 84 WPA_PUT_BE16(pos, TLS_VERSION);
475 if (conn->rl.tls_version == TLS_VERSION_1_2) {
545 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
653 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
694 if (tls_prf(conn->rl.tls_version,
848 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
849 TLS_VERSION);
tlsv1_record.c 167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
tlsv1_common.c 338 int tlsv12_key_x_server_params_hash(u16 tls_version,
362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
401 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
453 if (tls_version >= TLS_VERSION_1_2) {
tlsv1_server_read.c 113 if (TLS_VERSION == TLS_VERSION_1)
114 conn->rl.tls_version = TLS_VERSION_1;
117 conn->rl.tls_version = TLS_VERSION_1_2;
120 conn->rl.tls_version = TLS_VERSION_1_1;
122 conn->rl.tls_version = conn->client_version;
124 tls_version_str(conn->rl.tls_version));
846 if (conn->rl.tls_version == TLS_VERSION_1_2) {
922 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1085 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1126 if (tls_prf(conn->rl.tls_version,
    [all...]
tlsv1_server.c 71 if (tls_prf(conn->rl.tls_version,
87 if (tls_prf(conn->rl.tls_version,
486 return tls_prf(conn->rl.tls_version,
  /external/chromium_org/extensions/browser/api/sockets_tcp/
sockets_tcp_api.cc 506 if (params_->options.get() && params_->options->tls_version.get()) {
507 legacy_params.tls_version.reset(
509 if (params_->options->tls_version->min.get()) {
510 legacy_params.tls_version->min.reset(
511 new std::string(*params_->options->tls_version->min.get()));
513 if (params_->options->tls_version->max.get()) {
514 legacy_params.tls_version->max.reset(
515 new std::string(*params_->options->tls_version->max.get()));
  /external/chromium_org/extensions/browser/api/socket/
tls_socket.cc 248 if (options && options->tls_version.get()) {
251 options->tls_version.get();

Completed in 130 milliseconds