/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 178 def __init__(self, hash_name="SHA256", tls_version=0x0303): argument 179 self.tls_version = tls_version 182 if tls_version < 0x0300: # SSLv2 184 elif tls_version == 0x0300: # SSLv3 186 elif (tls_version == 0x0301 or # TLS 1.0 187 tls_version == 0x0302): # TLS 1.1 189 elif tls_version == 0x0303: # TLS 1.2 206 if self.tls_version < 0x0300: 208 elif self.tls_version == 0x0300: 220 if self.tls_version <= 0x0300: [all …]
|
D | suites.py | 129 def __init__(self, tls_version=0x0303): argument 141 if tls_version <= 0x301:
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_write.c | 51 u16 tls_version = TLS_VERSION; in tls_send_client_hello() local 56 tls_version == TLS_VERSION_1_2) in tls_send_client_hello() 57 tls_version = TLS_VERSION_1_1; in tls_send_client_hello() 61 tls_version == TLS_VERSION_1_1) in tls_send_client_hello() 62 tls_version = TLS_VERSION_1; in tls_send_client_hello() 65 tls_version == TLS_VERSION_1) { in tls_send_client_hello() 71 tls_version_str(tls_version)); in tls_send_client_hello() 107 WPA_PUT_BE16(pos, tls_version); in tls_send_client_hello() 132 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_send_client_hello() 621 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_client_read.c | 84 u16 tls_version; in tls_process_server_hello() local 126 tls_version = WPA_GET_BE16(pos); in tls_process_server_hello() 127 if (!tls_version_ok(tls_version) || in tls_process_server_hello() 128 tls_version_disabled(conn, tls_version)) { in tls_process_server_hello() 138 tls_version_str(tls_version)); in tls_process_server_hello() 139 conn->rl.tls_version = tls_version; in tls_process_server_hello() 730 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tlsv1_process_diffie_hellman() 754 conn->rl.tls_version, pos[0], in tlsv1_process_diffie_hellman() 764 conn->rl.tls_version, conn->client_random, in tlsv1_process_diffie_hellman() 774 if (tls_verify_signature(conn->rl.tls_version, in tlsv1_process_diffie_hellman() [all …]
|
D | tlsv1_common.h | 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
D | tlsv1_client.c | 65 if (tls_prf(conn->rl.tls_version, in tls_derive_keys() 80 if (conn->rl.tls_version == TLS_VERSION_1) in tls_derive_keys() 82 if (tls_prf(conn->rl.tls_version, in tls_derive_keys() 108 if (conn->rl.tls_version == TLS_VERSION_1) { in tls_derive_keys() 476 conn->rl.tls_version = TLS_VERSION; in tlsv1_client_init() 563 res = tls_prf(conn->rl.tls_version, in tlsv1_client_prf() 878 switch (conn->rl.tls_version) { in tlsv1_client_get_version()
|
D | tlsv1_server_write.c | 88 WPA_PUT_BE16(pos, conn->rl.tls_version); in tls_write_server_hello() 569 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_key_exchange() 572 conn->rl.tls_version, TLS_HASH_ALG_SHA256, in tls_write_server_key_exchange() 621 conn->rl.tls_version, conn->client_random, in tls_write_server_key_exchange() 846 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_write_server_finished() 887 if (tls_prf(conn->rl.tls_version, in tls_write_server_finished() 1075 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : in tlsv1_server_send_alert()
|
D | tlsv1_server_read.c | 195 conn->rl.tls_version = TLS_VERSION_1; in tls_process_client_hello() 198 conn->rl.tls_version = TLS_VERSION_1_2; in tls_process_client_hello() 201 conn->rl.tls_version = TLS_VERSION_1_1; in tls_process_client_hello() 203 conn->rl.tls_version = conn->client_version; in tls_process_client_hello() 205 tls_version_str(conn->rl.tls_version)); in tls_process_client_hello() 959 if (conn->rl.tls_version == TLS_VERSION_1_2) { in tls_process_certificate_verify() 1030 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, in tls_process_certificate_verify() 1193 if (conn->rl.tls_version >= TLS_VERSION_1_2) { in tls_process_client_finished() 1234 if (tls_prf(conn->rl.tls_version, in tls_process_client_finished()
|
D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument 466 if (tls_version >= TLS_VERSION_1_2) { in tls_verify_signature()
|
D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); in tlsv1_record_send() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 378 if (rl->tls_version >= TLS_VERSION_1_1) { in tlsv1_record_receive()
|
D | tlsv1_record.h | 32 u16 tls_version; member
|
D | tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() 87 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() 511 res = tls_prf(conn->rl.tls_version, in tlsv1_server_prf()
|
/external/scapy/scapy/layers/tls/ |
D | handshake.py | 358 self.tls_session.tls_version = self.version 387 tls_version=self.version) 391 tls_version=self.version) 417 s.tls_version = self.version 432 tls_version=self.version) 436 tls_version=self.version) 611 if tls_session and (tls_session.tls_version or 0) >= 0x0304: 855 if s.tls_version >= 0x0304: 872 if s.tls_version >= 0x0304: 956 if pkt.tls_session.tls_version == 0x0300: [all …]
|
D | automaton.py | 145 if self.cur_session.tls_version is None or \ 146 self.cur_session.tls_version < 0x0304: 161 if self.cur_session.tls_version is None or \ 162 self.cur_session.tls_version < 0x0304: 188 v = (self.cur_session.tls_version or
|
D | keyexchange.py | 64 if not pkt.tls_session.tls_version: 66 return pkt.tls_session.tls_version < 0x0303 105 v = pkt.tls_session.tls_version 112 v = pkt.tls_session.tls_version 121 if s.tls_version and s.tls_version < 0x0300: 156 self.tls_session.tls_version and 157 self.tls_session.tls_version < 0x0303): 167 if self.tls_session.tls_version >= 0x0300: 193 if self.tls_session.tls_version >= 0x0300: 851 if s.tls_version >= 0x0301: [all …]
|
D | basefields.py | 74 v = pkt.tls_session.tls_version 84 v = pkt.tls_session.tls_version 121 if pkt.tls_session.tls_version >= 0x0302: 137 if pkt.tls_session.tls_version >= 0x0302:
|
D | session.py | 72 tls_version=0x0303): argument 74 self.tls_version = tls_version 87 self.ciphersuite = ciphersuite(tls_version=tls_version) 98 if tls_version > 0x0200: 109 if tls_version >= 0x0304: 112 self.prf = PRF(ciphersuite.hash_alg.name, tls_version) 260 tls_version=self.tls_version) 421 self.tls_version = None
|
D | handshake_sslv2.py | 192 s.tls_version = self.version 355 tls_version = s.tls_version or 0x0002 361 tls_version=tls_version) 366 tls_version=tls_version)
|
D | record.py | 128 if (((pkt.tls_session.tls_version or 0x0303) > 0x0200) and 192 _tls_version_check(pkt.tls_session.tls_version, 0x0304) and 287 if s and _tls_version_check(s.tls_version, 0x0304):
|
D | automaton_srv.py | 96 v = _tls_version[s.tls_version] 115 v = _tls_version[self.cur_session.tls_version]
|
D | automaton_cli.py | 114 v = _tls_version[s.tls_version] 118 if s.tls_version >= 0x0304:
|
D | extensions.py | 584 v = pkt.tls_session.tls_version
|
/external/scapy/test/ |
D | sslv2.uts | 82 assert(t_enc.tls_session.pwcs.tls_version == 0x0002) 83 assert(t_enc.tls_session.prcs.tls_version == 0x0002)
|
D | tls.uts | 332 p = PRF(tls_version=0x303, hash_name=t.h) 341 f = PRF(tls_version=0x300) 359 f = PRF(tls_version=0x301) 898 assert(t.tls_version == 0x0303)
|
/external/python/cpython3/Lib/test/ |
D | test_ssl.py | 4110 for name, tls_version, bits in ciphers:
|