Home
last modified time | relevance | path

Searched refs:ciphersuite (Results 1 - 25 of 25) sorted by relevance

/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite global() subroutine
[all...]
H A DProxy.pm72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
H A DServerKeyExchange.pm47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment
48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
H A DMessage.pm146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
/third_party/openssl/util/perl/TLSProxy/
H A DServerHello.pm41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
149 $data .= pack('n', $self->ciphersuite);
202 sub ciphersuite global() subroutine
[all...]
H A DProxy.pm72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
H A DServerKeyExchange.pm47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment
48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
H A DMessage.pm146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
/third_party/mbedtls/tests/scripts/
H A Dgenerate_tls13_compat_tests.py68 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None,
74 if ciphersuite:
75 self.add_ciphersuites(ciphersuite)
410 "server hello, chosen ciphersuite: {} ( id={:04d} )".format(
457 "server hello, chosen ciphersuite: ( {:04x} ) - {}".format(
485 server_object = SERVER_CLASSES[server](ciphersuite=cipher,
489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
/third_party/mbedtls/library/
H A Dssl_tls13_client.c669 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument
672 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg()
699 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket()
715 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity()
734 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk()
1116 1, ("Invalid ciphersuite for external psk.")); in ssl_tls13_parse_server_pre_shared_key_ext()
1260 * Early data are going to be encrypted using the ciphersuite in mbedtls_ssl_tls13_finalize_client_hello()
1264 * with a selected ciphersuite different from the ciphersuite in mbedtls_ssl_tls13_finalize_client_hello()
1268 * encrypted using a different ciphersuite tha in mbedtls_ssl_tls13_finalize_client_hello()
[all...]
H A Dssl_tls13_server.c77 * If a valid PSK ciphersuite identifier has been passed in, we want in ssl_tls13_select_ciphersuite()
95 MBEDTLS_SSL_DEBUG_MSG(2, ("No matched ciphersuite, psk_ciphersuite_id=%x, psk_hash_alg=%x", in ssl_tls13_select_ciphersuite()
619 psk_ciphersuite_id = session.ciphersuite; in ssl_tls13_parse_pre_shared_key_ext()
657 * We consider finding a ciphersuite suitable for the PSK as part in ssl_tls13_parse_pre_shared_key_ext()
1283 * .. . .. ciphersuite list length ( 2 bytes ) in ssl_tls13_parse_client_hello()
1284 * .. . .. ciphersuite list in ssl_tls13_parse_client_hello()
1331 * and the ciphersuite list length. in ssl_tls13_parse_client_hello()
1347 * The length of the ciphersuite list has to be even. in ssl_tls13_parse_client_hello()
1355 /* Check we have enough data for the ciphersuite list, the legacy in ssl_tls13_parse_client_hello()
1432 * Search for a matching ciphersuite in ssl_tls13_parse_client_hello()
[all...]
H A Dssl_tls13_keys.h289 * \param hash_alg The hash algorithm associated with the ciphersuite
339 * \param hash_alg The hash algorithm associated with the ciphersuite
511 * \param ciphersuite The numerical identifier for the ciphersuite to use.
529 int ciphersuite,
H A Dssl_tls12_server.c683 * Try picking a certificate for this ciphersuite,
719 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite requires certificate")); in ssl_pick_cert()
791 * Check if a given ciphersuite is suitable for use with our config/keys/etc
810 MBEDTLS_SSL_DEBUG_MSG(3, ("trying ciphersuite: %#04x (%s)", in ssl_ciphersuite_match()
815 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: version")); in ssl_ciphersuite_match()
822 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: ecjpake " in ssl_ciphersuite_match()
834 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: " in ssl_ciphersuite_match()
841 /* If the ciphersuite requires a pre-shared key and we don't in ssl_ciphersuite_match()
845 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: no pre-shared key")); in ssl_ciphersuite_match()
852 * Final check: if ciphersuite require in ssl_ciphersuite_match()
[all...]
H A Dssl_tls13_keys.c926 int endpoint, int ciphersuite, in mbedtls_ssl_tls13_populate_transform()
953 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in mbedtls_ssl_tls13_populate_transform()
955 MBEDTLS_SSL_DEBUG_MSG(1, ("ciphersuite info for %d not found", in mbedtls_ssl_tls13_populate_transform()
956 ciphersuite)); in mbedtls_ssl_tls13_populate_transform()
1588 /* Variables relating to the hash for the chosen ciphersuite. */ in ssl_tls13_generate_application_keys()
1594 /* Variables relating to the cipher for the chosen ciphersuite. */ in ssl_tls13_generate_application_keys()
1599 /* Extract basic information about hash and ciphersuite */ in ssl_tls13_generate_application_keys()
924 mbedtls_ssl_tls13_populate_transform( mbedtls_ssl_transform *transform, int endpoint, int ciphersuite, mbedtls_ssl_key_set const *traffic_keys, mbedtls_ssl_context *ssl ) mbedtls_ssl_tls13_populate_transform() argument
H A Dssl_tls.c417 int ciphersuite,
1764 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session()
1769 MBEDTLS_SSL_DEBUG_MSG(4, ("%d is not a valid TLS 1.3 ciphersuite.", in mbedtls_ssl_set_session()
1770 session->ciphersuite)); in mbedtls_ssl_set_session()
3099 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl()
3108 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite()
4276 * uint16_t ciphersuite;
4323 * TLS version identifier, endpoint, ciphersuite in ssl_session_save()
4327 + 2; /* ciphersuite */ in ssl_session_save()
4331 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, in ssl_session_save()
6348 mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, const mbedtls_ssl_ciphersuite_t *ciphersuite, int cert_endpoint, uint32_t *flags) mbedtls_ssl_check_cert_usage() argument
8789 ssl_tls12_populate_transform(mbedtls_ssl_transform *transform, int ciphersuite, const unsigned char master[48], int encrypt_then_mac, ssl_tls_prf_t tls_prf, const unsigned char randbytes[64], mbedtls_ssl_protocol_version tls_version, unsigned endpoint, const mbedtls_ssl_context *ssl) ssl_tls12_populate_transform() argument
[all...]
H A Dssl_tls12_client.c1328 /* ciphersuite (used later) */ in ssl_parse_server_hello()
1352 ("ciphersuite info for %04x not found", (unsigned int) i)); in ssl_parse_server_hello()
1370 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello()
1378 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello()
1388 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, chosen ciphersuite: %04x", (unsigned) i)); in ssl_parse_server_hello()
1407 ssl->session_negotiate->ciphersuite) { in ssl_parse_server_hello()
1413 ssl->session_negotiate->ciphersuite); in ssl_parse_server_hello()
1425 ("server hello, chosen ciphersuite: %s", suite_info->name)); in ssl_parse_server_hello()
H A Dssl_ciphersuites.c288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
1862 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite) in mbedtls_ssl_ciphersuite_from_id() argument
1867 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id()
H A Dssl_misc.h264 /* This macro determines whether a ciphersuite using a
281 /* This macro determines whether a ciphersuite uses Encrypt-then-MAC with CBC */
1274 * \param uses_ec Whether one proposed ciphersuite uses an elliptic curve
1690 const mbedtls_ssl_ciphersuite_t *ciphersuite,
2741 /* Check whether we have offered this ciphersuite */ in mbedtls_ssl_tls13_cipher_suite_is_offered()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
H A Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys()
349 * first compute the session-id = TypeCode | H(ciphersuite | scal_p | in compute_keys()
358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
H A Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys()
349 * first compute the session-id = TypeCode | H(ciphersuite | scal_p | in compute_keys()
358 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32)); in compute_keys()
330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
/third_party/mbedtls/include/mbedtls/
H A Dssl.h458 * Signaling ciphersuite values (SCSV)
1252 int MBEDTLS_PRIVATE(ciphersuite); /*!< chosen ciphersuite */
1461 uint8_t MBEDTLS_PRIVATE(respect_cli_pref); /*!< pick the ciphersuite according to
1948 * \brief Return the name of the ciphersuite associated with the
1951 * \param ciphersuite_id SSL ciphersuite ID
1953 * \return a string containing the ciphersuite name
1958 * \brief Return the ID of the ciphersuite associated with the
1961 * \param ciphersuite_name SSL ciphersuite name
1963 * \return the ID with the ciphersuite o
[all...]
/third_party/mbedtls/tests/src/test_helpers/
H A Dssl_helpers.c1687 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session()
1793 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls13_populate_session()
2179 TEST_EQUAL(server.ssl.session->ciphersuite, in mbedtls_test_ssl_perform_handshake()
/third_party/openssl/test/
H A Dsslapitest.c3359 * Any ciphersuite using SHA256 will do - it will be compatible with in create_a_psk()
3360 * the actual ciphersuite selected as long as it too is based on SHA256 in create_a_psk()
4394 * So updating ciphersuite in 'sess' which will get reflected in in test_early_data_psk_with_all_ciphers()
4580 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list)
4581 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list)
4582 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list)
4583 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list)
4584 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4585 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4586 * Test 6: Set a default ciphersuite i
9696 const char *ciphersuite = "DHE-RSA-AES128-SHA"; test_dh_auto() local
[all...]

Completed in 59 milliseconds