/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/packages/vms/ |
H A D | report_openssl_version.c | 47 const char * (*ssl_version)(int t); 57 ssl_version = (const char * (*)(int))dlsym(libptr, "SSLeay_version"); 58 if ((void *)ssl_version == NULL) { 59 ssl_version = (const char * (*)(int))dlsym(libptr, "ssleay_version"); 60 if ((void *)ssl_version == NULL) { 61 ssl_version = (const char * (*)(int))dlsym(libptr, "SSLEAY_VERSION"); 67 if ((void *)ssl_version == NULL) { 72 version = ssl_version(SSLEAY_VERSION);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_txt.c | 115 if (x->ssl_version == SSL2_VERSION) 117 else if (x->ssl_version == SSL3_VERSION) 119 else if (x->ssl_version == TLS1_2_VERSION) 121 else if (x->ssl_version == TLS1_1_VERSION) 123 else if (x->ssl_version == TLS1_VERSION) 125 else if (x->ssl_version == DTLS1_VERSION) 127 else if (x->ssl_version == DTLS1_2_VERSION) 129 else if (x->ssl_version == DTLS1_BAD_VER)
|
H A D | ssl_asn1.c | 94 ASN1_INTEGER ssl_version; member in struct:ssl_session_asn1_st 159 a.ssl_version.length = LSIZE2; 160 a.ssl_version.type = V_ASN1_INTEGER; 161 a.ssl_version.data = ibuf2; 162 ASN1_INTEGER_set(&(a.ssl_version), in->ssl_version); 171 if (in->ssl_version == SSL2_VERSION) { 275 M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); 328 M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); 384 int ssl_version local [all...] |
H A D | ssl_sess.c | 427 ss->ssl_version = SSL2_VERSION; 430 ss->ssl_version = SSL3_VERSION; 433 ss->ssl_version = TLS1_VERSION; 436 ss->ssl_version = TLS1_1_VERSION; 439 ss->ssl_version = TLS1_2_VERSION; 442 ss->ssl_version = DTLS1_BAD_VER; 445 ss->ssl_version = DTLS1_VERSION; 448 ss->ssl_version = DTLS1_2_VERSION; 538 ss->ssl_version = s->version; 608 data.ssl_version [all...] |
H A D | s23_clnt.c | 739 s->session->ssl_version = s->version;
|
H A D | ssl_ciph.c | 642 if (s->ssl_version >> 8 != TLS1_VERSION_MAJOR || 643 s->ssl_version < TLS1_VERSION)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_txt.c | 115 if (x->ssl_version == SSL2_VERSION) 117 else if (x->ssl_version == SSL3_VERSION) 119 else if (x->ssl_version == TLS1_2_VERSION) 121 else if (x->ssl_version == TLS1_1_VERSION) 123 else if (x->ssl_version == TLS1_VERSION) 125 else if (x->ssl_version == DTLS1_VERSION) 127 else if (x->ssl_version == DTLS1_2_VERSION) 129 else if (x->ssl_version == DTLS1_BAD_VER)
|
H A D | ssl_asn1.c | 94 ASN1_INTEGER ssl_version; member in struct:ssl_session_asn1_st 159 a.ssl_version.length = LSIZE2; 160 a.ssl_version.type = V_ASN1_INTEGER; 161 a.ssl_version.data = ibuf2; 162 ASN1_INTEGER_set(&(a.ssl_version), in->ssl_version); 171 if (in->ssl_version == SSL2_VERSION) { 275 M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); 328 M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); 384 int ssl_version local [all...] |
H A D | ssl_sess.c | 427 ss->ssl_version = SSL2_VERSION; 430 ss->ssl_version = SSL3_VERSION; 433 ss->ssl_version = TLS1_VERSION; 436 ss->ssl_version = TLS1_1_VERSION; 439 ss->ssl_version = TLS1_2_VERSION; 442 ss->ssl_version = DTLS1_BAD_VER; 445 ss->ssl_version = DTLS1_VERSION; 448 ss->ssl_version = DTLS1_2_VERSION; 538 ss->ssl_version = s->version; 608 data.ssl_version [all...] |
H A D | s23_clnt.c | 739 s->session->ssl_version = s->version;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_asn1.c | 69 ASN1_INTEGER ssl_version; member in struct:ssl_session_asn1_st 106 a.ssl_version.length=LSIZE2; 107 a.ssl_version.type=V_ASN1_INTEGER; 108 a.ssl_version.data=ibuf2; 109 ASN1_INTEGER_set(&(a.ssl_version),in->ssl_version); 118 if (in->ssl_version == SSL2_VERSION) 183 M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); 206 M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); 232 int version,ssl_version local [all...] |
H A D | ssl_txt.c | 88 if (x->ssl_version == SSL2_VERSION) 90 else if (x->ssl_version == SSL3_VERSION) 92 else if (x->ssl_version == TLS1_VERSION)
|
H A D | ssl_sess.c | 195 ss->ssl_version=SSL2_VERSION; 200 ss->ssl_version=SSL3_VERSION; 205 ss->ssl_version=TLS1_VERSION; 210 ss->ssl_version=DTLS1_VERSION; 275 ss->ssl_version=s->version; 288 data.ssl_version=s->version; 374 if ((ret->ssl_version>>8) == SSL3_VERSION_MAJOR) 560 meth=s->ctx->method->get_ssl_method(session->ssl_version); 562 meth=s->method->get_ssl_method(session->ssl_version);
|
H A D | ssl_ciph.c | 586 static void ssl_cipher_apply_rule(unsigned long cipher_id, unsigned long ssl_version, argument 616 if (cipher_id && (cp->algorithms & SSL_SSL_MASK) == ssl_version) 767 unsigned long cipher_id = 0, ssl_version = 0; local 858 ssl_version = 0; 891 ssl_version = ca_list[j]->algorithms & SSL_SSL_MASK; 924 ssl_cipher_apply_rule(cipher_id, ssl_version, algorithms, mask,
|
H A D | ssl_lib.c | 388 * any new session built out of this id/id_len and the ssl_version in 395 r.ssl_version = ssl->version; 402 if((r.ssl_version == SSL2_VERSION) && 1326 if (a->ssl_version != b->ssl_version)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/um/drivers/ |
H A D | ssl.c | 23 static const int ssl_version = 1; variable 168 ssl_version);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/src/ |
H A D | tool_cfgable.h | 141 long ssl_version; member in struct:OperationConfig
|
H A D | tool_getparam.c | 1015 config->ssl_version = CURL_SSLVERSION_TLSv1; 1019 config->ssl_version = CURL_SSLVERSION_TLSv1_0; 1023 config->ssl_version = CURL_SSLVERSION_TLSv1_1; 1027 config->ssl_version = CURL_SSLVERSION_TLSv1_2; 1033 config->ssl_version = CURL_SSLVERSION_SSLv2; 1037 config->ssl_version = CURL_SSLVERSION_SSLv3;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | version.c | 288 NULL, /* ssl_version */ 308 version_info.ssl_version = ssl_buffer;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/ |
H A D | runtests.pl | 201 my $ssl_version; # set if libcurl is built with SSL support 2387 $ssl_version=1; 2536 logmsg sprintf(" libcurl SSL: %s\n", $ssl_version?"ON ":"OFF"); 2545 if($ssl_version) { 2781 if($ssl_version) { 2906 if(!$ssl_version) { 4212 if(!$ssl_version) { 4250 if(!$ssl_version) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/util/ |
H A D | mk1mf.pl | 15 $ssl_version=""; 30 VERSION => \$ssl_version, 71 die "Makefile is not the toplevel Makefile!\n" if $ssl_version eq "";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/packages/OS400/ |
H A D | ccsidcurl.c | 442 if(p->ssl_version) 443 n += strlen(p->ssl_version) + 1; 494 if(convert_version_info_string(&id->ssl_version, &cp, &n, ccsid))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/util/ |
H A D | mk1mf.pl | 10 $ssl_version=""; 21 $ssl_version=$1 if (/^VERSION=(.*)$/); 27 die "Makefile is not the toplevel Makefile!\n" if $ssl_version eq "";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/util/ |
H A D | mk1mf.pl | 15 $ssl_version=""; 30 VERSION => \$ssl_version, 71 die "Makefile is not the toplevel Makefile!\n" if $ssl_version eq "";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | axtls.c | 663 return snprintf(buffer, size, "axTLS/%s", ssl_version());
|