示例#1
0
 def should_ADD_CCS_from_ADD_CKE(self):
     self.cur_pkt = TLS(type=20, tls_session=self.cur_session, msg=[])
     p = TLSChangeCipherSpec()
     self.cur_pkt.msg.append(p)
     self.socket.send(str(self.cur_pkt))
     self.cur_pkt = None
     raise self.ADD_CCS()
示例#2
0
 def tls13_ADDED_SERVERHELLO(self):
     # If the client proposed a non-empty session ID in his ClientHello
     # he requested the middlebox compatibility mode (RFC8446, appendix D.4)
     # In this case, the server should send a dummy ChangeCipherSpec in
     # between the ServerHello and the encrypted handshake messages
     if self.cur_session.sid is not None:
         self.add_record(is_tls12=True)
         self.add_msg(TLSChangeCipherSpec())
     pass
示例#3
0
 def should_add_ChangeCipherSpec_from_ClientKeyExchange(self):
     self.add_record()
     self.add_msg(TLSChangeCipherSpec())
     raise self.ADDED_CHANGECIPHERSPEC()
示例#4
0
 def should_add_ChangeCipherSpec_from_CertificateVerify(self):
     self.add_record()
     self.add_msg(TLSChangeCipherSpec())
     raise self.ADDED_CHANGECIPHERSPEC()
示例#5
0
 def should_add_ChangeCipherSpec(self):
     self.add_msg(TLSChangeCipherSpec())
     raise self.ADDED_CHANGECIPHERSPEC()
示例#6
0
 def should_SEND_CCS(self):
     ccs = TLSChangeCipherSpec()
     self.cur_pkt = TLS(type=20, msg=[ccs], tls_session=self.cur_session)
     self.socket.send(str(self.cur_pkt))
     self.cur_pkt = None
     raise self.SEND_CCS()
示例#7
0
 def TLS13_PREPARE_CLIENTFLIGHT2(self):
     if self.cur_session.middlebox_compatibility:
         self.add_record(is_tls12=True)
         self.add_msg(TLSChangeCipherSpec())
     self.add_record(is_tls13=True)