Searched refs:handshake (Results 1 – 25 of 28) sorted by relevance
12
39 from mod_pywebsocket import handshake407 handshake._validate_protocol('sample') # should succeed.408 handshake._validate_protocol('Sample') # should succeed.409 handshake._validate_protocol('sample\x20protocol') # should succeed.410 handshake._validate_protocol('sample\x7eprotocol') # should succeed.411 self.assertRaises(handshake.HandshakeError,412 handshake._validate_protocol,414 self.assertRaises(handshake.HandshakeError,415 handshake._validate_protocol,417 self.assertRaises(handshake.HandshakeError,[all …]
298 int SOCKS5ClientSocket::BuildHandshakeWriteBuffer(std::string* handshake) in BuildHandshakeWriteBuffer()300 DCHECK(handshake->empty()); in BuildHandshakeWriteBuffer()302 handshake->push_back(kSOCKS5Version); in BuildHandshakeWriteBuffer()303 handshake->push_back(kTunnelCommand); // Connect command in BuildHandshakeWriteBuffer()304 handshake->push_back(kNullByte); // Reserved null in BuildHandshakeWriteBuffer()306 handshake->push_back(kEndPointDomain); // The type of the address. in BuildHandshakeWriteBuffer()311 handshake->push_back(static_cast<unsigned char>( in BuildHandshakeWriteBuffer()313 handshake->append(host_request_info_.hostname()); in BuildHandshakeWriteBuffer()316 handshake->append(reinterpret_cast<char*>(&nw_port), sizeof(nw_port)); in BuildHandshakeWriteBuffer()
103 int BuildHandshakeWriteBuffer(std::string* handshake) const;
41 import handshake83 handshaker = handshake.Handshaker(request, _dispatcher)88 except handshake.HandshakeError, e:
80 import handshake223 self._handshaker = handshake.Handshaker(246 except handshake.HandshakeError, e:325 default=handshake._DEFAULT_WEB_SOCKET_PORT,
121 if (ss->handshake == 0) { in ssl_Do1stHandshake()123 ss->handshake = ss->nextHandshake; in ssl_Do1stHandshake()126 if (ss->handshake == 0) { in ssl_Do1stHandshake()128 ss->handshake = ss->securityHandshake; in ssl_Do1stHandshake()131 if (ss->handshake == 0) { in ssl_Do1stHandshake()151 rv = (*ss->handshake)(ss); in ssl_Do1stHandshake()186 ss->handshake = AlwaysBlock; in ssl_SetAlwaysBlock()242 ss->handshake = ssl2_BeginServerHandshake; in SSL_ResetHandshake()245 ss->handshake = ssl2_BeginClientHandshake; in SSL_ResetHandshake()1112 if (ss->handshake || ss->nextHandshake || ss->securityHandshake) { in ssl_SecureRecv()[all …]
1285 ss->handshake = 0; /* makes ssl_Do1stHandshake call ss->nextHandshake.*/ in ssl_GatherRecord1stHandshake()2261 ss->handshake = 0; in ssl2_TryToFinish()2699 if (ss->handshake == 0) { in ssl2_HandleMessage()2703 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_HandleMessage()2753 if (ss->handshake == 0) { in ssl2_HandleVerifyMessage()2756 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_HandleVerifyMessage()2976 if (ss->handshake == 0) { in ssl2_HandleServerHelloMessage()2983 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_HandleServerHelloMessage()3122 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_BeginClientHandshake()3215 ss->handshake = ssl_GatherRecord1stHandshake; in ssl2_BeginClientHandshake()[all …]
52 hs.msg_body (SSL3 only) When an incoming handshake message spans more 68 ci->sendBuf Outgoing handshake messages are appended to this buffer.80 outgoing data until a socks handshake completes. However,
1382 ns->handshake = ssl2_BeginClientHandshake; in ssl_Accept()1385 ns->handshake = ssl2_BeginServerHandshake; in ssl_Accept()
1035 sslHandshakeFunc handshake; /*firstHandshakeLock*/ member
5551 if (ss->handshake != 0) { in ssl3_RestartHandshakeAfterCertReq()5552 ss->handshake = ssl_GatherRecord1stHandshake; in ssl3_RestartHandshakeAfterCertReq()7748 if (ss->handshake != NULL) { in ssl3_RestartHandshakeAfterServerCert()7749 ss->handshake = ssl_GatherRecord1stHandshake; in ssl3_RestartHandshakeAfterServerCert()8095 ss->handshake = NULL; in ssl3_HandleFinished()
8 + BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");33 + /* Enable handshake cutthrough for client connections using143 + /* Deal with an application that calls SSL_read() when handshake data207 + !s->hit && /* full-handshake */212 + s->s3->previous_server_finished_len == 0 && /* not a renegotiation handshake */227 + fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");271 +echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
1 …SYN or SYN/ACK packets, since the MSS is only negotiated during the TCP handshake at connection st…
39 (new PeerKey handshake, WPA2/IEEE 802.11 (RSN) IBSS)87 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data91 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
8 * added explicit disconnect on 4-way handshake failures98 allow fallback to full handshake if server rejects PAC-Opaque107 handshake to avoid getting stuck in incorrect state [Bug 261]182 * added support for fallback from abbreviated TLS handshake to183 full handshake when using EAP-FAST (e.g., due to an expired187 * added support for drivers that take care of RSN 4-way handshake192 driver to take care of the 4-way handshake256 * removed STAKey handshake since PeerKey handshake has replaced it in356 * added PeerKey handshake implementation for IEEE 802.11e357 direct link setup (DLS) to replace STAKey handshake[all …]
297 WPA implements a new key handshake (4-Way Handshake and Group Key299 the Authenticator and Supplicant. This handshake is also used to316 messages in initial key handshake, pre-authentication, and PMKSA caching).906 pcmcia-cs/cardmgr scripts (when using PC Cards). WPA handshake must be
297 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
294 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
82 echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
5 handshake to avoid getting stuck in incorrect state [Bug 261]109 * removed STAKey handshake since PeerKey handshake has replaced it in209 * added PeerKey handshake implementation for IEEE 802.11e210 direct link setup (DLS) to replace STAKey handshake332 * added experimental STAKey handshake implementation for IEEE 802.11e407 during handshake414 cases (e.g., during TLS handshake)862 handshake for ndiswrapper & NDIS driver which seems to be suffering
51 (new STAKey handshake, WPA2 IBSS)
293 WPA implements a new key handshake (4-Way Handshake and Group Key295 the Authenticator and Supplicant. This handshake is also used to312 messages in initial key handshake, pre-authentication, and PMKSA caching).900 pcmcia-cs/cardmgr scripts (when using PC Cards). WPA handshake must be
245 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
328 * TODO: Need to either support configuring PMK for 4-way handshake or
69 def handshake(self, tlsConnection): member in HTTPSServer