/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite global() subroutine [all...] |
H A D | Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
H A D | ServerKeyExchange.pm | 47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
H A D | Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 149 $data .= pack('n', $self->ciphersuite); 202 sub ciphersuite global() subroutine [all...] |
H A D | Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
H A D | ServerKeyExchange.pm | 47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
H A D | Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
/third_party/mbedtls/tests/scripts/ |
H A D | generate_tls13_compat_tests.py | 68 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, 74 if ciphersuite: 75 self.add_ciphersuites(ciphersuite) 410 "server hello, chosen ciphersuite: {} ( id={:04d} )".format( 457 "server hello, chosen ciphersuite: ( {:04x} ) - {}".format( 485 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_client.c | 669 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument 672 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg() 699 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket() 715 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity() 734 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk() 1116 1, ("Invalid ciphersuite for external psk.")); in ssl_tls13_parse_server_pre_shared_key_ext() 1260 * Early data are going to be encrypted using the ciphersuite in mbedtls_ssl_tls13_finalize_client_hello() 1264 * with a selected ciphersuite different from the ciphersuite in mbedtls_ssl_tls13_finalize_client_hello() 1268 * encrypted using a different ciphersuite tha in mbedtls_ssl_tls13_finalize_client_hello() [all...] |
H A D | ssl_tls13_server.c | 77 * If a valid PSK ciphersuite identifier has been passed in, we want in ssl_tls13_select_ciphersuite() 95 MBEDTLS_SSL_DEBUG_MSG(2, ("No matched ciphersuite, psk_ciphersuite_id=%x, psk_hash_alg=%x", in ssl_tls13_select_ciphersuite() 619 psk_ciphersuite_id = session.ciphersuite; in ssl_tls13_parse_pre_shared_key_ext() 657 * We consider finding a ciphersuite suitable for the PSK as part in ssl_tls13_parse_pre_shared_key_ext() 1283 * .. . .. ciphersuite list length ( 2 bytes ) in ssl_tls13_parse_client_hello() 1284 * .. . .. ciphersuite list in ssl_tls13_parse_client_hello() 1331 * and the ciphersuite list length. in ssl_tls13_parse_client_hello() 1347 * The length of the ciphersuite list has to be even. in ssl_tls13_parse_client_hello() 1355 /* Check we have enough data for the ciphersuite list, the legacy in ssl_tls13_parse_client_hello() 1432 * Search for a matching ciphersuite in ssl_tls13_parse_client_hello() [all...] |
H A D | ssl_tls13_keys.h | 289 * \param hash_alg The hash algorithm associated with the ciphersuite 339 * \param hash_alg The hash algorithm associated with the ciphersuite 511 * \param ciphersuite The numerical identifier for the ciphersuite to use. 529 int ciphersuite,
|
H A D | ssl_tls12_server.c | 683 * Try picking a certificate for this ciphersuite, 719 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite requires certificate")); in ssl_pick_cert() 791 * Check if a given ciphersuite is suitable for use with our config/keys/etc 810 MBEDTLS_SSL_DEBUG_MSG(3, ("trying ciphersuite: %#04x (%s)", in ssl_ciphersuite_match() 815 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: version")); in ssl_ciphersuite_match() 822 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: ecjpake " in ssl_ciphersuite_match() 834 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: " in ssl_ciphersuite_match() 841 /* If the ciphersuite requires a pre-shared key and we don't in ssl_ciphersuite_match() 845 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: no pre-shared key")); in ssl_ciphersuite_match() 852 * Final check: if ciphersuite require in ssl_ciphersuite_match() [all...] |
H A D | ssl_tls13_keys.c | 926 int endpoint, int ciphersuite, in mbedtls_ssl_tls13_populate_transform() 953 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in mbedtls_ssl_tls13_populate_transform() 955 MBEDTLS_SSL_DEBUG_MSG(1, ("ciphersuite info for %d not found", in mbedtls_ssl_tls13_populate_transform() 956 ciphersuite)); in mbedtls_ssl_tls13_populate_transform() 1588 /* Variables relating to the hash for the chosen ciphersuite. */ in ssl_tls13_generate_application_keys() 1594 /* Variables relating to the cipher for the chosen ciphersuite. */ in ssl_tls13_generate_application_keys() 1599 /* Extract basic information about hash and ciphersuite */ in ssl_tls13_generate_application_keys() 924 mbedtls_ssl_tls13_populate_transform( mbedtls_ssl_transform *transform, int endpoint, int ciphersuite, mbedtls_ssl_key_set const *traffic_keys, mbedtls_ssl_context *ssl ) mbedtls_ssl_tls13_populate_transform() argument
|
H A D | ssl_tls.c | 417 int ciphersuite, 1764 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session() 1769 MBEDTLS_SSL_DEBUG_MSG(4, ("%d is not a valid TLS 1.3 ciphersuite.", in mbedtls_ssl_set_session() 1770 session->ciphersuite)); in mbedtls_ssl_set_session() 3099 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl() 3108 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite() 4276 * uint16_t ciphersuite; 4323 * TLS version identifier, endpoint, ciphersuite in ssl_session_save() 4327 + 2; /* ciphersuite */ in ssl_session_save() 4331 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, in ssl_session_save() 6348 mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, const mbedtls_ssl_ciphersuite_t *ciphersuite, int cert_endpoint, uint32_t *flags) mbedtls_ssl_check_cert_usage() argument 8789 ssl_tls12_populate_transform(mbedtls_ssl_transform *transform, int ciphersuite, const unsigned char master[48], int encrypt_then_mac, ssl_tls_prf_t tls_prf, const unsigned char randbytes[64], mbedtls_ssl_protocol_version tls_version, unsigned endpoint, const mbedtls_ssl_context *ssl) ssl_tls12_populate_transform() argument [all...] |
H A D | ssl_tls12_client.c | 1328 /* ciphersuite (used later) */ in ssl_parse_server_hello() 1352 ("ciphersuite info for %04x not found", (unsigned int) i)); in ssl_parse_server_hello() 1370 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello() 1378 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello() 1388 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, chosen ciphersuite: %04x", (unsigned) i)); in ssl_parse_server_hello() 1407 ssl->session_negotiate->ciphersuite) { in ssl_parse_server_hello() 1413 ssl->session_negotiate->ciphersuite); in ssl_parse_server_hello() 1425 ("server hello, chosen ciphersuite: %s", suite_info->name)); in ssl_parse_server_hello()
|
H A D | ssl_ciphersuites.c | 288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 1862 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite) in mbedtls_ssl_ciphersuite_from_id() argument 1867 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id()
|
H A D | ssl_misc.h | 264 /* This macro determines whether a ciphersuite using a 281 /* This macro determines whether a ciphersuite uses Encrypt-then-MAC with CBC */ 1274 * \param uses_ec Whether one proposed ciphersuite uses an elliptic curve 1690 const mbedtls_ssl_ciphersuite_t *ciphersuite, 2741 /* Check whether we have offered this ciphersuite */ in mbedtls_ssl_tls13_cipher_suite_is_offered()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
H A D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() 349 * first compute the session-id = TypeCode | H(ciphersuite | scal_p | in compute_keys() 358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys() 330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
H A D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() 349 * first compute the session-id = TypeCode | H(ciphersuite | scal_p | in compute_keys() 358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys() 330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 458 * Signaling ciphersuite values (SCSV) 1252 int MBEDTLS_PRIVATE(ciphersuite); /*!< chosen ciphersuite */ 1461 uint8_t MBEDTLS_PRIVATE(respect_cli_pref); /*!< pick the ciphersuite according to 1948 * \brief Return the name of the ciphersuite associated with the 1951 * \param ciphersuite_id SSL ciphersuite ID 1953 * \return a string containing the ciphersuite name 1958 * \brief Return the ID of the ciphersuite associated with the 1961 * \param ciphersuite_name SSL ciphersuite name 1963 * \return the ID with the ciphersuite o [all...] |
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 1687 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session() 1793 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls13_populate_session() 2179 TEST_EQUAL(server.ssl.session->ciphersuite, in mbedtls_test_ssl_perform_handshake()
|
/third_party/openssl/test/ |
H A D | sslapitest.c | 3359 * Any ciphersuite using SHA256 will do - it will be compatible with in create_a_psk() 3360 * the actual ciphersuite selected as long as it too is based on SHA256 in create_a_psk() 4394 * So updating ciphersuite in 'sess' which will get reflected in in test_early_data_psk_with_all_ciphers() 4580 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list) 4581 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list) 4582 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list) 4583 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list) 4584 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list) 4585 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list) 4586 * Test 6: Set a default ciphersuite i 9696 const char *ciphersuite = "DHE-RSA-AES128-SHA"; test_dh_auto() local [all...] |