Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for finishedHash (0.14 sec)

  1. src/crypto/tls/prf.go

    	return
    }
    
    func newFinishedHash(version uint16, cipherSuite *cipherSuite) finishedHash {
    	var buffer []byte
    	if version >= VersionTLS12 {
    		buffer = []byte{}
    	}
    
    	prf, hash := prfAndHashForVersion(version, cipherSuite)
    	if hash != 0 {
    		return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
    	}
    
    	return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf}
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Nov 21 16:29:49 UTC 2023
    - 9.2K bytes
    - Viewed (0)
  2. src/crypto/tls/handshake_client.go

    	if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) {
    		hs.finishedHash.discardHandshakeBuffer()
    	}
    
    	if err := transcriptMsg(hs.hello, &hs.finishedHash); err != nil {
    		return err
    	}
    	if err := transcriptMsg(hs.serverHello, &hs.finishedHash); err != nil {
    		return err
    	}
    
    	c.buffering = true
    	c.didResume = isResume
    	if isResume {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_server.go

    	hs.hello.ticketSupported = true
    	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
    	hs.finishedHash.discardHandshakeBuffer()
    	if err := transcriptMsg(hs.clientHello, &hs.finishedHash); err != nil {
    		return err
    	}
    	if _, err := hs.c.writeHandshakeRecord(hs.hello, &hs.finishedHash); err != nil {
    		return err
    	}
    
    	if c.config.VerifyConnection != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  4. src/crypto/tls/key_schedule.go

    	iv = c.expandLabel(trafficSecret, "iv", nil, aeadNonceLength)
    	return
    }
    
    // finishedHash generates the Finished verify_data or PskBinderEntry according
    // to RFC 8446, Section 4.4.4. See sections 4.4 and 4.2.11.2 for the baseKey
    // selection.
    func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
    	finishedKey := c.expandLabel(baseKey, "finished", nil, c.hash.Size())
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 6.5K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_client_tls13.go

    			transcript.Write(chHash)
    			if err := transcriptMsg(hs.serverHello, transcript); err != nil {
    				return err
    			}
    
    			if err := computeAndUpdatePSK(hello, hs.binderKey, transcript, hs.suite.finishedHash); err != nil {
    				return err
    			}
    		} else {
    			// Server selected a cipher suite incompatible with the PSK.
    			hello.pskIdentities = nil
    			hello.pskBinders = nil
    		}
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  6. src/crypto/tls/handshake_server_tls13.go

    		}
    		clientHelloBytes, err := hs.clientHello.marshalWithoutBinders()
    		if err != nil {
    			c.sendAlert(alertInternalError)
    			return err
    		}
    		transcript.Write(clientHelloBytes)
    		pskBinder := hs.suite.finishedHash(binderKey, transcript)
    		if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
    			c.sendAlert(alertDecryptError)
    			return errors.New("tls: invalid PSK binder")
    		}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
Back to top