/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 176 context of the connection state using the tls_version and the cipher suite. 178 def __init__(self, hash_name="SHA256", tls_version=0x0303): 179 self.tls_version = tls_version 182 if tls_version < 0x0300: # SSLv2 184 elif tls_version == 0x0300: # SSLv3 186 elif (tls_version == 0x0301 or # TLS 1.0 187 tls_version == 0x0302): # TLS 1.1 189 elif tls_version == 0x0303: # TLS 1.2 206 if self.tls_version < 0x0300 [all...] |
suites.py | 79 which may vary according to the current tls_version. The default is set to 129 def __init__(self, tls_version=0x0303): 132 metaclass, but we still have to provide tls_version differentiation. 141 if tls_version <= 0x301:
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.h | 18 #define TLS_VERSION TLS_VERSION_1_2 21 #define TLS_VERSION TLS_VERSION_1_1 23 #define TLS_VERSION TLS_VERSION_1 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
tlsv1_client_write.c | 51 u16 tls_version = TLS_VERSION; local 56 tls_version == TLS_VERSION_1_2) 57 tls_version = TLS_VERSION_1_1; 61 tls_version == TLS_VERSION_1_1) 62 tls_version = TLS_VERSION_1; 65 tls_version == TLS_VERSION_1) { 71 tls_version_str(tls_version)); 104 WPA_PUT_BE16(pos, tls_version); 129 if (conn->rl.tls_version >= TLS_VERSION_1_2) [all...] |
tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
tlsv1_client_read.c | 84 u16 tls_version; local 126 tls_version = WPA_GET_BE16(pos); 127 if (!tls_version_ok(tls_version) || 128 tls_version_disabled(conn, tls_version)) { 138 tls_version_str(tls_version)); 139 conn->rl.tls_version = tls_version; 730 if (conn->rl.tls_version == TLS_VERSION_1_2) { 754 conn->rl.tls_version, pos[0], 764 conn->rl.tls_version, conn->client_random [all...] |
tlsv1_client.c | 43 WPA_PUT_BE16(pre_master_secret, TLS_VERSION); 65 if (tls_prf(conn->rl.tls_version, 80 if (conn->rl.tls_version == TLS_VERSION_1) 82 if (tls_prf(conn->rl.tls_version, 108 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 541 return tls_prf(conn->rl.tls_version, 854 switch (conn->rl.tls_version) {
|
tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 566 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 569 conn->rl.tls_version, TLS_HASH_ALG_SHA256, 618 conn->rl.tls_version, conn->client_random, 843 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 884 if (tls_prf(conn->rl.tls_version, 1072 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version : 1073 TLS_VERSION);
|
tlsv1_server_read.c | 185 if (TLS_VERSION == TLS_VERSION_1) 186 conn->rl.tls_version = TLS_VERSION_1; 189 conn->rl.tls_version = TLS_VERSION_1_2; 192 conn->rl.tls_version = TLS_VERSION_1_1; 194 conn->rl.tls_version = conn->client_version; 196 tls_version_str(conn->rl.tls_version)); 931 if (conn->rl.tls_version == TLS_VERSION_1_2) { 1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, 1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 1206 if (tls_prf(conn->rl.tls_version, [all...] |
tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 466 if (tls_version >= TLS_VERSION_1_2) {
|
tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, 87 if (tls_prf(conn->rl.tls_version, 486 return tls_prf(conn->rl.tls_version,
|
/external/scapy/scapy/layers/tls/ |
basefields.py | 69 We use the tls_version if it has been defined, else the advertised version. 74 v = pkt.tls_session.tls_version 84 v = pkt.tls_session.tls_version 121 if pkt.tls_session.tls_version >= 0x0302: 137 if pkt.tls_session.tls_version >= 0x0302:
|
handshake.py | 358 self.tls_session.tls_version = self.version 387 tls_version=self.version) 391 tls_version=self.version) 417 s.tls_version = self.version 432 tls_version=self.version) 436 tls_version=self.version) 611 if tls_session and (tls_session.tls_version or 0) >= 0x0304: [all...] |
keyexchange.py | 57 We expect this. If tls_version is not set, this means we did not process 60 However, if the tls_version has been set, we test for TLS 1.2. 64 if not pkt.tls_session.tls_version: 66 return pkt.tls_session.tls_version < 0x0303 105 v = pkt.tls_session.tls_version 112 v = pkt.tls_session.tls_version 121 if s.tls_version and s.tls_version < 0x0300: 140 but if it is provided a TLS context with a tls_version < 0x0303 156 self.tls_session.tls_version an [all...] |
automaton.py | 145 if self.cur_session.tls_version is None or \ 146 self.cur_session.tls_version < 0x0304: 161 if self.cur_session.tls_version is None or \ 162 self.cur_session.tls_version < 0x0304: 188 v = (self.cur_session.tls_version or
|
handshake_sslv2.py | 192 s.tls_version = self.version 355 tls_version = s.tls_version or 0x0002 361 tls_version=tls_version) 366 tls_version=tls_version)
|
session.py | 72 tls_version=0x0303): 74 self.tls_version = tls_version 87 self.ciphersuite = ciphersuite(tls_version=tls_version) 98 if tls_version > 0x0200: 109 if tls_version >= 0x0304: 112 self.prf = PRF(ciphersuite.hash_alg.name, tls_version) 260 tls_version=self.tls_version) [all...] |
record.py | 128 if (((pkt.tls_session.tls_version or 0x0303) > 0x0200) and 192 _tls_version_check(pkt.tls_session.tls_version, 0x0304) and 287 if s and _tls_version_check(s.tls_version, 0x0304):
|
automaton_cli.py | 114 v = _tls_version[s.tls_version] 118 if s.tls_version >= 0x0304:
|
automaton_srv.py | 96 v = _tls_version[s.tls_version] 115 v = _tls_version[self.cur_session.tls_version]
|
extensions.py | 584 v = pkt.tls_session.tls_version
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
PasspointProvisioner.java | 42 private static final String TLS_VERSION = "TLSv1"; 76 mOsuServerConnection.init(mObjectFactory.getSSLContext(TLS_VERSION),
|
/device/linaro/bootloader/edk2/NetworkPkg/TlsDxe/ |
TlsDriver.h | 29 #define TLS_VERSION 0x00000000
|
/external/scapy/test/ |
sslv2.uts | 82 assert(t_enc.tls_session.pwcs.tls_version == 0x0002) 83 assert(t_enc.tls_session.prcs.tls_version == 0x0002)
|