def should_ADD_CCS_from_ADD_CKE(self): self.cur_pkt = TLS(type=20, tls_session=self.cur_session, msg=[]) p = TLSChangeCipherSpec() self.cur_pkt.msg.append(p) self.socket.send(str(self.cur_pkt)) self.cur_pkt = None raise self.ADD_CCS()
def tls13_ADDED_SERVERHELLO(self): # If the client proposed a non-empty session ID in his ClientHello # he requested the middlebox compatibility mode (RFC8446, appendix D.4) # In this case, the server should send a dummy ChangeCipherSpec in # between the ServerHello and the encrypted handshake messages if self.cur_session.sid is not None: self.add_record(is_tls12=True) self.add_msg(TLSChangeCipherSpec()) pass
def should_add_ChangeCipherSpec_from_ClientKeyExchange(self): self.add_record() self.add_msg(TLSChangeCipherSpec()) raise self.ADDED_CHANGECIPHERSPEC()
def should_add_ChangeCipherSpec_from_CertificateVerify(self): self.add_record() self.add_msg(TLSChangeCipherSpec()) raise self.ADDED_CHANGECIPHERSPEC()
def should_add_ChangeCipherSpec(self): self.add_msg(TLSChangeCipherSpec()) raise self.ADDED_CHANGECIPHERSPEC()
def should_SEND_CCS(self): ccs = TLSChangeCipherSpec() self.cur_pkt = TLS(type=20, msg=[ccs], tls_session=self.cur_session) self.socket.send(str(self.cur_pkt)) self.cur_pkt = None raise self.SEND_CCS()
def TLS13_PREPARE_CLIENTFLIGHT2(self): if self.cur_session.middlebox_compatibility: self.add_record(is_tls12=True) self.add_msg(TLSChangeCipherSpec()) self.add_record(is_tls13=True)