Home
last modified time | relevance | path

Searched refs:tls_version (Results 1 – 25 of 25) sorted by relevance

/external/scapy/scapy/layers/tls/crypto/
Dprf.py178 def __init__(self, hash_name="SHA256", tls_version=0x0303): argument
179 self.tls_version = tls_version
182 if tls_version < 0x0300: # SSLv2
184 elif tls_version == 0x0300: # SSLv3
186 elif (tls_version == 0x0301 or # TLS 1.0
187 tls_version == 0x0302): # TLS 1.1
189 elif tls_version == 0x0303: # TLS 1.2
206 if self.tls_version < 0x0300:
208 elif self.tls_version == 0x0300:
220 if self.tls_version <= 0x0300:
[all …]
Dsuites.py129 def __init__(self, tls_version=0x0303): argument
141 if tls_version <= 0x301:
/external/wpa_supplicant_8/src/tls/
Dtlsv1_client_write.c51 u16 tls_version = TLS_VERSION; in tls_send_client_hello() local
56 tls_version == TLS_VERSION_1_2) in tls_send_client_hello()
57 tls_version = TLS_VERSION_1_1; in tls_send_client_hello()
61 tls_version == TLS_VERSION_1_1) in tls_send_client_hello()
62 tls_version = TLS_VERSION_1; in tls_send_client_hello()
65 tls_version == TLS_VERSION_1) { in tls_send_client_hello()
71 tls_version_str(tls_version)); in tls_send_client_hello()
107 WPA_PUT_BE16(pos, tls_version); in tls_send_client_hello()
132 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_send_client_hello()
621 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_write_client_certificate_verify()
[all …]
Dtlsv1_client_read.c84 u16 tls_version; in tls_process_server_hello() local
126 tls_version = WPA_GET_BE16(pos); in tls_process_server_hello()
127 if (!tls_version_ok(tls_version) || in tls_process_server_hello()
128 tls_version_disabled(conn, tls_version)) { in tls_process_server_hello()
138 tls_version_str(tls_version)); in tls_process_server_hello()
139 conn->rl.tls_version = tls_version; in tls_process_server_hello()
730 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tlsv1_process_diffie_hellman()
754 conn->rl.tls_version, pos[0], in tlsv1_process_diffie_hellman()
764 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman()
774 if (tls_verify_signature(conn->rl.tls_version, in tlsv1_process_diffie_hellman()
[all …]
Dtlsv1_common.h262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
Dtlsv1_client.c65 if (tls_prf(conn->rl.tls_version, in tls_derive_keys()
80 if (conn->rl.tls_version == TLS_VERSION_1) in tls_derive_keys()
82 if (tls_prf(conn->rl.tls_version, in tls_derive_keys()
108 if (conn->rl.tls_version == TLS_VERSION_1) { in tls_derive_keys()
476 conn->rl.tls_version = TLS_VERSION; in tlsv1_client_init()
563 res = tls_prf(conn->rl.tls_version, in tlsv1_client_prf()
878 switch (conn->rl.tls_version) { in tlsv1_client_get_version()
Dtlsv1_server_write.c88 WPA_PUT_BE16(pos, conn->rl.tls_version); in tls_write_server_hello()
569 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_key_exchange()
572 conn->rl.tls_version, TLS_HASH_ALG_SHA256, in tls_write_server_key_exchange()
621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange()
846 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_finished()
887 if (tls_prf(conn->rl.tls_version, in tls_write_server_finished()
1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_server_send_alert()
Dtlsv1_server_read.c195 conn->rl.tls_version = TLS_VERSION_1; in tls_process_client_hello()
198 conn->rl.tls_version = TLS_VERSION_1_2; in tls_process_client_hello()
201 conn->rl.tls_version = TLS_VERSION_1_1; in tls_process_client_hello()
203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello()
205 tls_version_str(conn->rl.tls_version)); in tls_process_client_hello()
959 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_process_certificate_verify()
1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, in tls_process_certificate_verify()
1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_process_client_finished()
1234 if (tls_prf(conn->rl.tls_version, in tls_process_client_finished()
Dtlsv1_common.c338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument
466 if (tls_version >= TLS_VERSION_1_2) { in tls_verify_signature()
Dtlsv1_record.c167 WPA_PUT_BE16(pos, rl->tls_version); in tlsv1_record_send()
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send()
378 if (rl->tls_version >= TLS_VERSION_1_1) { in tlsv1_record_receive()
Dtlsv1_record.h32 u16 tls_version; member
Dtlsv1_server.c71 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys()
87 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys()
511 res = tls_prf(conn->rl.tls_version, in tlsv1_server_prf()
/external/scapy/scapy/layers/tls/
Dhandshake.py358 self.tls_session.tls_version = self.version
387 tls_version=self.version)
391 tls_version=self.version)
417 s.tls_version = self.version
432 tls_version=self.version)
436 tls_version=self.version)
611 if tls_session and (tls_session.tls_version or 0) >= 0x0304:
855 if s.tls_version >= 0x0304:
872 if s.tls_version >= 0x0304:
956 if pkt.tls_session.tls_version == 0x0300:
[all …]
Dautomaton.py145 if self.cur_session.tls_version is None or \
146 self.cur_session.tls_version < 0x0304:
161 if self.cur_session.tls_version is None or \
162 self.cur_session.tls_version < 0x0304:
188 v = (self.cur_session.tls_version or
Dkeyexchange.py64 if not pkt.tls_session.tls_version:
66 return pkt.tls_session.tls_version < 0x0303
105 v = pkt.tls_session.tls_version
112 v = pkt.tls_session.tls_version
121 if s.tls_version and s.tls_version < 0x0300:
156 self.tls_session.tls_version and
157 self.tls_session.tls_version < 0x0303):
167 if self.tls_session.tls_version >= 0x0300:
193 if self.tls_session.tls_version >= 0x0300:
851 if s.tls_version >= 0x0301:
[all …]
Dbasefields.py74 v = pkt.tls_session.tls_version
84 v = pkt.tls_session.tls_version
121 if pkt.tls_session.tls_version >= 0x0302:
137 if pkt.tls_session.tls_version >= 0x0302:
Dsession.py72 tls_version=0x0303): argument
74 self.tls_version = tls_version
87 self.ciphersuite = ciphersuite(tls_version=tls_version)
98 if tls_version > 0x0200:
109 if tls_version >= 0x0304:
112 self.prf = PRF(ciphersuite.hash_alg.name, tls_version)
260 tls_version=self.tls_version)
421 self.tls_version = None
Dhandshake_sslv2.py192 s.tls_version = self.version
355 tls_version = s.tls_version or 0x0002
361 tls_version=tls_version)
366 tls_version=tls_version)
Drecord.py128 if (((pkt.tls_session.tls_version or 0x0303) > 0x0200) and
192 _tls_version_check(pkt.tls_session.tls_version, 0x0304) and
287 if s and _tls_version_check(s.tls_version, 0x0304):
Dautomaton_srv.py96 v = _tls_version[s.tls_version]
115 v = _tls_version[self.cur_session.tls_version]
Dautomaton_cli.py114 v = _tls_version[s.tls_version]
118 if s.tls_version >= 0x0304:
Dextensions.py584 v = pkt.tls_session.tls_version
/external/scapy/test/
Dsslv2.uts82 assert(t_enc.tls_session.pwcs.tls_version == 0x0002)
83 assert(t_enc.tls_session.prcs.tls_version == 0x0002)
Dtls.uts332 p = PRF(tls_version=0x303, hash_name=t.h)
341 f = PRF(tls_version=0x300)
359 f = PRF(tls_version=0x301)
898 assert(t.tls_version == 0x0303)
/external/python/cpython3/Lib/test/
Dtest_ssl.py4110 for name, tls_version, bits in ciphers: