/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | ClientHelloTest.java | 59 Arrays.equals(message.client_version, message_2.client_version));
|
/external/chromium/chrome/browser/sync/engine/net/ |
H A D | syncapi_server_connection_manager.h | 51 const std::string& client_version,
|
H A D | syncapi_server_connection_manager.cc | 85 const std::string& client_version, 87 : ServerConnectionManager(server, port, use_ssl, client_version), 81 SyncAPIServerConnectionManager( const std::string& server, int port, bool use_ssl, const std::string& client_version, HttpPostProviderFactory* factory) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_i.h | 52 u16 client_version; member in struct:tlsv1_server
|
H A D | tlsv1_server_read.c | 82 /* ProtocolVersion client_version */ 85 conn->client_version = WPA_GET_BE16(pos); 87 conn->client_version >> 8, conn->client_version & 0xff); 88 if (conn->client_version < TLS_VERSION) { 498 * ProtocolVersion client_version; 529 if (WPA_GET_BE16(out) != conn->client_version) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_i.h | 46 u16 client_version; member in struct:tlsv1_server
|
H A D | tlsv1_server_read.c | 77 /* ProtocolVersion client_version */ 80 conn->client_version = WPA_GET_BE16(pos); 82 conn->client_version >> 8, conn->client_version & 0xff); 83 if (conn->client_version < TLS_VERSION_1) { 86 conn->client_version >> 8, 87 conn->client_version & 0xff); 97 else if (conn->client_version >= TLS_VERSION_1_2) 100 else if (conn->client_version > TLS_VERSION_1_1) 103 conn->rl.tls_version = conn->client_version; [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_i.h | 46 u16 client_version; member in struct:tlsv1_server
|
H A D | tlsv1_server_read.c | 77 /* ProtocolVersion client_version */ 80 conn->client_version = WPA_GET_BE16(pos); 82 conn->client_version >> 8, conn->client_version & 0xff); 83 if (conn->client_version < TLS_VERSION_1) { 86 conn->client_version >> 8, 87 conn->client_version & 0xff); 97 else if (conn->client_version >= TLS_VERSION_1_2) 100 else if (conn->client_version > TLS_VERSION_1_1) 103 conn->rl.tls_version = conn->client_version; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_i.h | 46 u16 client_version; member in struct:tlsv1_server
|
H A D | tlsv1_server_read.c | 77 /* ProtocolVersion client_version */ 80 conn->client_version = WPA_GET_BE16(pos); 82 conn->client_version >> 8, conn->client_version & 0xff); 83 if (conn->client_version < TLS_VERSION_1) { 86 conn->client_version >> 8, 87 conn->client_version & 0xff); 97 else if (conn->client_version >= TLS_VERSION_1_2) 100 else if (conn->client_version > TLS_VERSION_1_1) 103 conn->rl.tls_version = conn->client_version; [all...] |
/external/openssl/ssl/ |
H A D | s23_clnt.c | 402 s->client_version = version; 653 if (!(s->client_version == SSL2_VERSION)) 775 if (!(s->client_version == SSL2_VERSION))
|
H A D | tls1.h | 178 ((s->client_version >> 8) == TLS1_VERSION_MAJOR ? s->client_version : 0)
|
H A D | s3_srvr.c | 952 s->client_version=(((int)p[0])<<8)|(int)p[1]; 955 if ((s->version == DTLS1_VERSION && s->client_version > s->version) || 956 (s->version != DTLS1_VERSION && s->client_version < s->version)) 959 if ((s->client_version>>8) == SSL3_VERSION_MAJOR) 962 s->version = s->client_version; 2221 if ((al == -1) && !((p[0] == (s->client_version>>8)) && (p[1] == (s->client_version & 0xff)))) 2253 p[0] = s->client_version >> 8; 2254 p[1] = s->client_version & 0xff; 2480 if (!((pms[0] == (s->client_version>> [all...] |
H A D | s3_clnt.c | 746 * an SSLv2/v3 compatible client hello). The client_version 771 * client_version in client hello and not resetting it to 777 s->client_version=s->version; 779 *(p++)=s->client_version>>8; 780 *(p++)=s->client_version&0xff; 2326 tmp_buf[0]=s->client_version>>8; 2327 tmp_buf[1]=s->client_version&0xff; 2456 tmp_buf[0]=s->client_version>>8; 2457 tmp_buf[1]=s->client_version&0xff;
|
H A D | d1_clnt.c | 820 s->client_version=s->version; 1007 tmp_buf[0]=s->client_version>>8; 1008 tmp_buf[1]=s->client_version&0xff;
|
H A D | s23_srvr.c | 251 * 9/10 client_version / 345 /* We must look at client_version inside the Client Hello message 370 v[1]=p[10]; /* minor version according to client_version */ 486 /* client_version */ 625 s->client_version=(v[0]<<8)|v[1];
|
H A D | ssl.h | 1272 int client_version; /* what was passed, used for member in struct:ssl_st
|
H A D | t1_lib.c | 369 if (s->client_version == SSL3_VERSION
|
H A D | ssl_lib.c | 222 s->client_version=s->version;
|
/external/webkit/Source/ThirdParty/ANGLE/src/libEGL/ |
H A D | libEGL.cpp | 778 EGLint client_version = 1; local 785 client_version = attribute[1]; 794 if (client_version != 2)
|
/external/openssl/include/openssl/ |
H A D | tls1.h | 178 ((s->client_version >> 8) == TLS1_VERSION_MAJOR ? s->client_version : 0)
|
H A D | ssl.h | 1272 int client_version; /* what was passed, used for member in struct:ssl_st
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | SFTPv3Client.java | 832 final int client_version = 3; 834 log.debug("Sending SSH_FXP_INIT (" + client_version + ")..."); 836 tw.writeUINT32(client_version);
|