Searched refs:tls_version (Results 1 - 25 of 31) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.h32 u16 tls_version; member in struct:tlsv1_record_layer
H A Dtlsv1_client_write.c51 u16 tls_version = TLS_VERSION; local
56 tls_version == TLS_VERSION_1_2)
57 tls_version = TLS_VERSION_1_1;
61 tls_version == TLS_VERSION_1_1)
62 tls_version = TLS_VERSION_1;
65 tls_version == TLS_VERSION_1) {
71 tls_version_str(tls_version));
104 WPA_PUT_BE16(pos, tls_version);
129 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
618 if (conn->rl.tls_version
[all...]
H A Dtlsv1_common.h262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_client.c65 if (tls_prf(conn->rl.tls_version,
80 if (conn->rl.tls_version == TLS_VERSION_1)
82 if (tls_prf(conn->rl.tls_version,
108 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
541 return tls_prf(conn->rl.tls_version,
854 switch (conn->rl.tls_version) {
H A Dtlsv1_client_read.c84 u16 tls_version; local
126 tls_version = WPA_GET_BE16(pos);
127 if (!tls_version_ok(tls_version) ||
128 tls_version_disabled(conn, tls_version)) {
138 tls_version_str(tls_version));
139 conn->rl.tls_version = tls_version;
733 if (conn->rl.tls_version == TLS_VERSION_1_2) {
757 conn->rl.tls_version, pos[0],
767 conn->rl.tls_version, con
[all...]
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, argument
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
466 if (tls_version >= TLS_VERSION_1_2) {
H A Dtlsv1_server_read.c186 conn->rl.tls_version = TLS_VERSION_1;
189 conn->rl.tls_version = TLS_VERSION_1_2;
192 conn->rl.tls_version = TLS_VERSION_1_1;
194 conn->rl.tls_version = conn->client_version;
196 tls_version_str(conn->rl.tls_version));
931 if (conn->rl.tls_version == TLS_VERSION_1_2) {
1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1206 if (tls_prf(conn->rl.tls_version,
H A Dtlsv1_server_write.c85 WPA_PUT_BE16(pos, conn->rl.tls_version);
566 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
569 conn->rl.tls_version, TLS_HASH_ALG_SHA256,
618 conn->rl.tls_version, conn->client_random,
843 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
884 if (tls_prf(conn->rl.tls_version,
1072 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.h32 u16 tls_version; member in struct:tlsv1_record_layer
H A Dtlsv1_client_write.c51 u16 tls_version = TLS_VERSION; local
56 tls_version == TLS_VERSION_1_2)
57 tls_version = TLS_VERSION_1_1;
61 tls_version == TLS_VERSION_1_1)
62 tls_version = TLS_VERSION_1;
65 tls_version == TLS_VERSION_1) {
71 tls_version_str(tls_version));
104 WPA_PUT_BE16(pos, tls_version);
129 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
618 if (conn->rl.tls_version
[all...]
H A Dtlsv1_common.h262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_client.c65 if (tls_prf(conn->rl.tls_version,
80 if (conn->rl.tls_version == TLS_VERSION_1)
82 if (tls_prf(conn->rl.tls_version,
108 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
541 return tls_prf(conn->rl.tls_version,
854 switch (conn->rl.tls_version) {
H A Dtlsv1_client_read.c84 u16 tls_version; local
126 tls_version = WPA_GET_BE16(pos);
127 if (!tls_version_ok(tls_version) ||
128 tls_version_disabled(conn, tls_version)) {
138 tls_version_str(tls_version));
139 conn->rl.tls_version = tls_version;
733 if (conn->rl.tls_version == TLS_VERSION_1_2) {
757 conn->rl.tls_version, pos[0],
767 conn->rl.tls_version, con
[all...]
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, argument
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
466 if (tls_version >= TLS_VERSION_1_2) {
H A Dtlsv1_server_read.c186 conn->rl.tls_version = TLS_VERSION_1;
189 conn->rl.tls_version = TLS_VERSION_1_2;
192 conn->rl.tls_version = TLS_VERSION_1_1;
194 conn->rl.tls_version = conn->client_version;
196 tls_version_str(conn->rl.tls_version));
931 if (conn->rl.tls_version == TLS_VERSION_1_2) {
1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1206 if (tls_prf(conn->rl.tls_version,
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.h32 u16 tls_version; member in struct:tlsv1_record_layer
H A Dtlsv1_client_write.c51 u16 tls_version = TLS_VERSION; local
56 tls_version == TLS_VERSION_1_2)
57 tls_version = TLS_VERSION_1_1;
61 tls_version == TLS_VERSION_1_1)
62 tls_version = TLS_VERSION_1;
65 tls_version == TLS_VERSION_1) {
71 tls_version_str(tls_version));
104 WPA_PUT_BE16(pos, tls_version);
129 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
618 if (conn->rl.tls_version
[all...]
H A Dtlsv1_common.h262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
H A Dtlsv1_client.c65 if (tls_prf(conn->rl.tls_version,
80 if (conn->rl.tls_version == TLS_VERSION_1)
82 if (tls_prf(conn->rl.tls_version,
108 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
541 return tls_prf(conn->rl.tls_version,
854 switch (conn->rl.tls_version) {
H A Dtlsv1_client_read.c84 u16 tls_version; local
126 tls_version = WPA_GET_BE16(pos);
127 if (!tls_version_ok(tls_version) ||
128 tls_version_disabled(conn, tls_version)) {
138 tls_version_str(tls_version));
139 conn->rl.tls_version = tls_version;
733 if (conn->rl.tls_version == TLS_VERSION_1_2) {
757 conn->rl.tls_version, pos[0],
767 conn->rl.tls_version, con
[all...]
H A Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
H A Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, argument
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
466 if (tls_version >= TLS_VERSION_1_2) {
H A Dtlsv1_server_read.c186 conn->rl.tls_version = TLS_VERSION_1;
189 conn->rl.tls_version = TLS_VERSION_1_2;
192 conn->rl.tls_version = TLS_VERSION_1_1;
194 conn->rl.tls_version = conn->client_version;
196 tls_version_str(conn->rl.tls_version));
931 if (conn->rl.tls_version == TLS_VERSION_1_2) {
1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1206 if (tls_prf(conn->rl.tls_version,

Completed in 214 milliseconds

12