Home
last modified time | relevance | path

Searched refs:handshake (Results 1 – 25 of 28) sorted by relevance

12

/external/webkit/WebKitTools/pywebsocket/test/
Dtest_handshake.py39 from mod_pywebsocket import handshake
407 handshake._validate_protocol('sample') # should succeed.
408 handshake._validate_protocol('Sample') # should succeed.
409 handshake._validate_protocol('sample\x20protocol') # should succeed.
410 handshake._validate_protocol('sample\x7eprotocol') # should succeed.
411 self.assertRaises(handshake.HandshakeError,
412 handshake._validate_protocol,
414 self.assertRaises(handshake.HandshakeError,
415 handshake._validate_protocol,
417 self.assertRaises(handshake.HandshakeError,
[all …]
/external/chromium/net/socket/
Dsocks5_client_socket.cc298 int SOCKS5ClientSocket::BuildHandshakeWriteBuffer(std::string* handshake) in BuildHandshakeWriteBuffer()
300 DCHECK(handshake->empty()); in BuildHandshakeWriteBuffer()
302 handshake->push_back(kSOCKS5Version); in BuildHandshakeWriteBuffer()
303 handshake->push_back(kTunnelCommand); // Connect command in BuildHandshakeWriteBuffer()
304 handshake->push_back(kNullByte); // Reserved null in BuildHandshakeWriteBuffer()
306 handshake->push_back(kEndPointDomain); // The type of the address. in BuildHandshakeWriteBuffer()
311 handshake->push_back(static_cast<unsigned char>( in BuildHandshakeWriteBuffer()
313 handshake->append(host_request_info_.hostname()); in BuildHandshakeWriteBuffer()
316 handshake->append(reinterpret_cast<char*>(&nw_port), sizeof(nw_port)); in BuildHandshakeWriteBuffer()
Dsocks5_client_socket.h103 int BuildHandshakeWriteBuffer(std::string* handshake) const;
/external/webkit/WebKitTools/pywebsocket/mod_pywebsocket/
Dheaderparserhandler.py41 import handshake
83 handshaker = handshake.Handshaker(request, _dispatcher)
88 except handshake.HandshakeError, e:
Dstandalone.py80 import handshake
223 self._handshaker = handshake.Handshaker(
246 except handshake.HandshakeError, e:
325 default=handshake._DEFAULT_WEB_SOCKET_PORT,
/external/chromium/net/third_party/nss/ssl/
Dsslsecur.c121 if (ss->handshake == 0) { in ssl_Do1stHandshake()
123 ss->handshake = ss->nextHandshake; in ssl_Do1stHandshake()
126 if (ss->handshake == 0) { in ssl_Do1stHandshake()
128 ss->handshake = ss->securityHandshake; in ssl_Do1stHandshake()
131 if (ss->handshake == 0) { in ssl_Do1stHandshake()
151 rv = (*ss->handshake)(ss); in ssl_Do1stHandshake()
186 ss->handshake = AlwaysBlock; in ssl_SetAlwaysBlock()
242 ss->handshake = ssl2_BeginServerHandshake; in SSL_ResetHandshake()
245 ss->handshake = ssl2_BeginClientHandshake; in SSL_ResetHandshake()
1112 if (ss->handshake || ss->nextHandshake || ss->securityHandshake) { in ssl_SecureRecv()
[all …]
Dsslcon.c1285 ss->handshake = 0; /* makes ssl_Do1stHandshake call ss->nextHandshake.*/ in ssl_GatherRecord1stHandshake()
2261 ss->handshake = 0; in ssl2_TryToFinish()
2699 if (ss->handshake == 0) { in ssl2_HandleMessage()
2703 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_HandleMessage()
2753 if (ss->handshake == 0) { in ssl2_HandleVerifyMessage()
2756 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_HandleVerifyMessage()
2976 if (ss->handshake == 0) { in ssl2_HandleServerHelloMessage()
2983 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_HandleServerHelloMessage()
3122 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_BeginClientHandshake()
3215 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_BeginClientHandshake()
[all …]
Dnotes.txt52 hs.msg_body (SSL3 only) When an incoming handshake message spans more
68 ci->sendBuf Outgoing handshake messages are appended to this buffer.
80 outgoing data until a socks handshake completes. However,
Dsslsock.c1382 ns->handshake = ssl2_BeginClientHandshake; in ssl_Accept()
1385 ns->handshake = ssl2_BeginServerHandshake; in ssl_Accept()
Dsslimpl.h1035 sslHandshakeFunc handshake; /*firstHandshakeLock*/ member
Dssl3con.c5551 if (ss->handshake != 0) { in ssl3_RestartHandshakeAfterCertReq()
5552 ss->handshake = ssl_GatherRecord1stHandshake; in ssl3_RestartHandshakeAfterCertReq()
7748 if (ss->handshake != NULL) { in ssl3_RestartHandshakeAfterServerCert()
7749 ss->handshake = ssl_GatherRecord1stHandshake; in ssl3_RestartHandshakeAfterServerCert()
8095 ss->handshake = NULL; in ssl3_HandleFinished()
/external/openssl/patches/
Dhandshake_cutthrough.patch8 + BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
33 + /* Enable handshake cutthrough for client connections using
143 + /* Deal with an application that calls SSL_read() when handshake data
207 + !s->hit && /* full-handshake */
212 + s->s3->previous_server_finished_len == 0 && /* not a renegotiation handshake */
227 + fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
271 +echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
/external/iptables/extensions/
Dlibipt_tcpmss.man1 …SYN or SYN/ACK packets, since the MSS is only negotiated during the TCP handshake at connection st…
/external/wpa_supplicant_6/wpa_supplicant/
Dtodo.txt39 (new PeerKey handshake, WPA2/IEEE 802.11 (RSN) IBSS)
87 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
91 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
DChangeLog8 * added explicit disconnect on 4-way handshake failures
98 allow fallback to full handshake if server rejects PAC-Opaque
107 handshake to avoid getting stuck in incorrect state [Bug 261]
182 * added support for fallback from abbreviated TLS handshake to
183 full handshake when using EAP-FAST (e.g., due to an expired
187 * added support for drivers that take care of RSN 4-way handshake
192 driver to take care of the 4-way handshake
256 * removed STAKey handshake since PeerKey handshake has replaced it in
356 * added PeerKey handshake implementation for IEEE 802.11e
357 direct link setup (DLS) to replace STAKey handshake
[all …]
DREADME297 WPA implements a new key handshake (4-Way Handshake and Group Key
299 the Authenticator and Supplicant. This handshake is also used to
316 messages in initial key handshake, pre-authentication, and PMKSA caching).
906 pcmcia-cs/cardmgr scripts (when using PC Cards). WPA handshake must be
Ddefconfig297 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
D.config294 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
/external/openssl/android.testssl/
Dtestssl82 echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
/external/wpa_supplicant/
DChangeLog5 handshake to avoid getting stuck in incorrect state [Bug 261]
109 * removed STAKey handshake since PeerKey handshake has replaced it in
209 * added PeerKey handshake implementation for IEEE 802.11e
210 direct link setup (DLS) to replace STAKey handshake
332 * added experimental STAKey handshake implementation for IEEE 802.11e
407 during handshake
414 cases (e.g., during TLS handshake)
862 handshake for ndiswrapper & NDIS driver which seems to be suffering
Dtodo.txt51 (new STAKey handshake, WPA2 IBSS)
DREADME293 WPA implements a new key handshake (4-Way Handshake and Group Key
295 the Authenticator and Supplicant. This handshake is also used to
312 messages in initial key handshake, pre-authentication, and PMKSA caching).
900 pcmcia-cs/cardmgr scripts (when using PC Cards). WPA handshake must be
Ddefconfig245 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
Ddriver_iphone.m328 * TODO: Need to either support configuring PMK for 4-way handshake or
/external/chromium/net/tools/testserver/
Dtestserver.py69 def handshake(self, tlsConnection): member in HTTPSServer

12