Searched refs:tls_version (Results 1 - 25 of 31) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.h32 u16 tls_version; member in struct:tlsv1_record_layer
H A Dtlsv1_server_write.c85 WPA_PUT_BE16(pos, conn->rl.tls_version);
443 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
446 conn->rl.tls_version, conn->client_random,
494 conn->rl.tls_version, conn->client_random,
719 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
760 if (tls_prf(conn->rl.tls_version,
922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
H A Dtlsv1_client_read.c36 u16 tls_version; local
78 tls_version = WPA_GET_BE16(pos);
79 if (!tls_version_ok(tls_version)) {
89 tls_version_str(tls_version));
90 conn->rl.tls_version = tls_version;
513 if (conn->rl.tls_version == TLS_VERSION_1_2) {
536 conn->rl.tls_version, conn->client_random,
544 conn->rl.tls_version, conn->client_random,
554 if (tls_verify_signature(conn->rl.tls_version,
[all...]
H A Dtlsv1_common.h260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_client.c64 if (tls_prf(conn->rl.tls_version,
79 if (conn->rl.tls_version == TLS_VERSION_1)
81 if (tls_prf(conn->rl.tls_version,
107 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
540 return tls_prf(conn->rl.tls_version,
H A Dtlsv1_client_write.c474 if (conn->rl.tls_version == TLS_VERSION_1_2) {
539 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
647 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
688 if (tls_prf(conn->rl.tls_version,
842 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, argument
362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
450 if (tls_version >= TLS_VERSION_1_2) {
H A Dtlsv1_server_read.c114 conn->rl.tls_version = TLS_VERSION_1;
117 conn->rl.tls_version = TLS_VERSION_1_2;
120 conn->rl.tls_version = TLS_VERSION_1_1;
122 conn->rl.tls_version = conn->client_version;
124 tls_version_str(conn->rl.tls_version));
845 if (conn->rl.tls_version == TLS_VERSION_1_2) {
916 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1079 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1120 if (tls_prf(conn->rl.tls_version,
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.h32 u16 tls_version; member in struct:tlsv1_record_layer
H A Dtlsv1_server_write.c85 WPA_PUT_BE16(pos, conn->rl.tls_version);
443 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
446 conn->rl.tls_version, conn->client_random,
494 conn->rl.tls_version, conn->client_random,
719 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
760 if (tls_prf(conn->rl.tls_version,
922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
H A Dtlsv1_client_read.c36 u16 tls_version; local
78 tls_version = WPA_GET_BE16(pos);
79 if (!tls_version_ok(tls_version)) {
89 tls_version_str(tls_version));
90 conn->rl.tls_version = tls_version;
513 if (conn->rl.tls_version == TLS_VERSION_1_2) {
536 conn->rl.tls_version, conn->client_random,
544 conn->rl.tls_version, conn->client_random,
554 if (tls_verify_signature(conn->rl.tls_version,
[all...]
H A Dtlsv1_common.h260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_client.c64 if (tls_prf(conn->rl.tls_version,
79 if (conn->rl.tls_version == TLS_VERSION_1)
81 if (tls_prf(conn->rl.tls_version,
107 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
540 return tls_prf(conn->rl.tls_version,
H A Dtlsv1_client_write.c474 if (conn->rl.tls_version == TLS_VERSION_1_2) {
539 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
647 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
688 if (tls_prf(conn->rl.tls_version,
842 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, argument
362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
450 if (tls_version >= TLS_VERSION_1_2) {
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.h32 u16 tls_version; member in struct:tlsv1_record_layer
H A Dtlsv1_server_write.c85 WPA_PUT_BE16(pos, conn->rl.tls_version);
443 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
446 conn->rl.tls_version, conn->client_random,
494 conn->rl.tls_version, conn->client_random,
719 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
760 if (tls_prf(conn->rl.tls_version,
922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
H A Dtlsv1_client_read.c36 u16 tls_version; local
78 tls_version = WPA_GET_BE16(pos);
79 if (!tls_version_ok(tls_version)) {
89 tls_version_str(tls_version));
90 conn->rl.tls_version = tls_version;
513 if (conn->rl.tls_version == TLS_VERSION_1_2) {
536 conn->rl.tls_version, conn->client_random,
544 conn->rl.tls_version, conn->client_random,
554 if (tls_verify_signature(conn->rl.tls_version,
[all...]
H A Dtlsv1_common.h260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_client.c64 if (tls_prf(conn->rl.tls_version,
79 if (conn->rl.tls_version == TLS_VERSION_1)
81 if (tls_prf(conn->rl.tls_version,
107 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
540 return tls_prf(conn->rl.tls_version,
H A Dtlsv1_client_write.c474 if (conn->rl.tls_version == TLS_VERSION_1_2) {
539 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
647 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
688 if (tls_prf(conn->rl.tls_version,
842 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, argument
362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
450 if (tls_version >= TLS_VERSION_1_2) {

Completed in 212 milliseconds

12