HomeSort by relevance Sort by last modified time
    Searched full:tls_version (Results 1 - 25 of 27) sorted by null

1 2

  /external/scapy/scapy/layers/tls/crypto/
prf.py 176 context of the connection state using the tls_version and the cipher suite.
178 def __init__(self, hash_name="SHA256", tls_version=0x0303):
179 self.tls_version = tls_version
182 if tls_version < 0x0300: # SSLv2
184 elif tls_version == 0x0300: # SSLv3
186 elif (tls_version == 0x0301 or # TLS 1.0
187 tls_version == 0x0302): # TLS 1.1
189 elif tls_version == 0x0303: # TLS 1.2
206 if self.tls_version < 0x0300
    [all...]
suites.py 79 which may vary according to the current tls_version. The default is set to
129 def __init__(self, tls_version=0x0303):
132 metaclass, but we still have to provide tls_version differentiation.
141 if tls_version <= 0x301:
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.h 18 #define TLS_VERSION TLS_VERSION_1_2
21 #define TLS_VERSION TLS_VERSION_1_1
23 #define TLS_VERSION TLS_VERSION_1
262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
tlsv1_client_write.c 51 u16 tls_version = TLS_VERSION; local
56 tls_version == TLS_VERSION_1_2)
57 tls_version = TLS_VERSION_1_1;
61 tls_version == TLS_VERSION_1_1)
62 tls_version = TLS_VERSION_1;
65 tls_version == TLS_VERSION_1) {
71 tls_version_str(tls_version));
104 WPA_PUT_BE16(pos, tls_version);
129 if (conn->rl.tls_version >= TLS_VERSION_1_2)
    [all...]
tlsv1_record.h 32 u16 tls_version; member in struct:tlsv1_record_layer
tlsv1_client_read.c 84 u16 tls_version; local
126 tls_version = WPA_GET_BE16(pos);
127 if (!tls_version_ok(tls_version) ||
128 tls_version_disabled(conn, tls_version)) {
138 tls_version_str(tls_version));
139 conn->rl.tls_version = tls_version;
730 if (conn->rl.tls_version == TLS_VERSION_1_2) {
754 conn->rl.tls_version, pos[0],
764 conn->rl.tls_version, conn->client_random
    [all...]
tlsv1_client.c 43 WPA_PUT_BE16(pre_master_secret, TLS_VERSION);
65 if (tls_prf(conn->rl.tls_version,
80 if (conn->rl.tls_version == TLS_VERSION_1)
82 if (tls_prf(conn->rl.tls_version,
108 if (conn->rl.tls_version == TLS_VERSION_1) {
476 conn->rl.tls_version = TLS_VERSION;
541 return tls_prf(conn->rl.tls_version,
854 switch (conn->rl.tls_version) {
tlsv1_server_write.c 85 WPA_PUT_BE16(pos, conn->rl.tls_version);
566 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
569 conn->rl.tls_version, TLS_HASH_ALG_SHA256,
618 conn->rl.tls_version, conn->client_random,
843 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
884 if (tls_prf(conn->rl.tls_version,
1072 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
1073 TLS_VERSION);
tlsv1_server_read.c 185 if (TLS_VERSION == TLS_VERSION_1)
186 conn->rl.tls_version = TLS_VERSION_1;
189 conn->rl.tls_version = TLS_VERSION_1_2;
192 conn->rl.tls_version = TLS_VERSION_1_1;
194 conn->rl.tls_version = conn->client_version;
196 tls_version_str(conn->rl.tls_version));
931 if (conn->rl.tls_version == TLS_VERSION_1_2) {
1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1206 if (tls_prf(conn->rl.tls_version,
    [all...]
tlsv1_common.c 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg,
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
466 if (tls_version >= TLS_VERSION_1_2) {
tlsv1_record.c 167 WPA_PUT_BE16(pos, rl->tls_version);
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
378 if (rl->tls_version >= TLS_VERSION_1_1) {
tlsv1_server.c 71 if (tls_prf(conn->rl.tls_version,
87 if (tls_prf(conn->rl.tls_version,
486 return tls_prf(conn->rl.tls_version,
  /external/scapy/scapy/layers/tls/
basefields.py 69 We use the tls_version if it has been defined, else the advertised version.
74 v = pkt.tls_session.tls_version
84 v = pkt.tls_session.tls_version
121 if pkt.tls_session.tls_version >= 0x0302:
137 if pkt.tls_session.tls_version >= 0x0302:
handshake.py 358 self.tls_session.tls_version = self.version
387 tls_version=self.version)
391 tls_version=self.version)
417 s.tls_version = self.version
432 tls_version=self.version)
436 tls_version=self.version)
611 if tls_session and (tls_session.tls_version or 0) >= 0x0304:
    [all...]
keyexchange.py 57 We expect this. If tls_version is not set, this means we did not process
60 However, if the tls_version has been set, we test for TLS 1.2.
64 if not pkt.tls_session.tls_version:
66 return pkt.tls_session.tls_version < 0x0303
105 v = pkt.tls_session.tls_version
112 v = pkt.tls_session.tls_version
121 if s.tls_version and s.tls_version < 0x0300:
140 but if it is provided a TLS context with a tls_version < 0x0303
156 self.tls_session.tls_version an
    [all...]
automaton.py 145 if self.cur_session.tls_version is None or \
146 self.cur_session.tls_version < 0x0304:
161 if self.cur_session.tls_version is None or \
162 self.cur_session.tls_version < 0x0304:
188 v = (self.cur_session.tls_version or
handshake_sslv2.py 192 s.tls_version = self.version
355 tls_version = s.tls_version or 0x0002
361 tls_version=tls_version)
366 tls_version=tls_version)
session.py 72 tls_version=0x0303):
74 self.tls_version = tls_version
87 self.ciphersuite = ciphersuite(tls_version=tls_version)
98 if tls_version > 0x0200:
109 if tls_version >= 0x0304:
112 self.prf = PRF(ciphersuite.hash_alg.name, tls_version)
260 tls_version=self.tls_version)
    [all...]
record.py 128 if (((pkt.tls_session.tls_version or 0x0303) > 0x0200) and
192 _tls_version_check(pkt.tls_session.tls_version, 0x0304) and
287 if s and _tls_version_check(s.tls_version, 0x0304):
automaton_cli.py 114 v = _tls_version[s.tls_version]
118 if s.tls_version >= 0x0304:
automaton_srv.py 96 v = _tls_version[s.tls_version]
115 v = _tls_version[self.cur_session.tls_version]
extensions.py 584 v = pkt.tls_session.tls_version
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
PasspointProvisioner.java 42 private static final String TLS_VERSION = "TLSv1";
76 mOsuServerConnection.init(mObjectFactory.getSSLContext(TLS_VERSION),
  /device/linaro/bootloader/edk2/NetworkPkg/TlsDxe/
TlsDriver.h 29 #define TLS_VERSION 0x00000000
  /external/scapy/test/
sslv2.uts 82 assert(t_enc.tls_session.pwcs.tls_version == 0x0002)
83 assert(t_enc.tls_session.prcs.tls_version == 0x0002)

Completed in 799 milliseconds

1 2