Lines Matching +full:0 +full:x0808
19 MT_HELLO_REQUEST => 0,
45 AL_DESC_CLOSE_NOTIFY => 0,
75 EXT_SERVER_NAME => 0,
101 EXT_CRYPTOPRO_BUG_EXTENSION => 0xfde8,
102 EXT_UNKNOWN => 0xfffe,
104 EXT_FORCE_LAST => 0xffff
111 SIG_ALG_RSA_PKCS1_SHA256 => 0x0401,
112 SIG_ALG_RSA_PKCS1_SHA384 => 0x0501,
113 SIG_ALG_RSA_PKCS1_SHA512 => 0x0601,
114 SIG_ALG_ECDSA_SECP256R1_SHA256 => 0x0403,
115 SIG_ALG_ECDSA_SECP384R1_SHA384 => 0x0503,
116 SIG_ALG_ECDSA_SECP521R1_SHA512 => 0x0603,
117 SIG_ALG_RSA_PSS_RSAE_SHA256 => 0x0804,
118 SIG_ALG_RSA_PSS_RSAE_SHA384 => 0x0805,
119 SIG_ALG_RSA_PSS_RSAE_SHA512 => 0x0806,
120 SIG_ALG_ED25519 => 0x0807,
121 SIG_ALG_ED448 => 0x0808,
122 SIG_ALG_RSA_PSS_PSS_SHA256 => 0x0809,
123 SIG_ALG_RSA_PSS_PSS_SHA384 => 0x080a,
124 SIG_ALG_RSA_PSS_PSS_SHA512 => 0x080b,
125 SIG_ALG_RSA_PKCS1_SHA1 => 0x0201,
126 SIG_ALG_ECDSA_SHA1 => 0x0203,
127 SIG_ALG_DSA_SHA1 => 0x0202,
128 SIG_ALG_DSA_SHA256 => 0x0402,
129 SIG_ALG_DSA_SHA384 => 0x0502,
130 SIG_ALG_DSA_SHA512 => 0x0602,
131 OSSL_SIG_ALG_RSA_PKCS1_SHA224 => 0x0301,
132 OSSL_SIG_ALG_DSA_SHA224 => 0x0302,
133 OSSL_SIG_ALG_ECDSA_SHA224 => 0x0303
137 CIPHER_RSA_WITH_AES_128_CBC_SHA => 0x002f,
138 CIPHER_DHE_RSA_AES_128_SHA => 0x0033,
139 CIPHER_ADH_AES_128_SHA => 0x0034,
140 CIPHER_TLS13_AES_128_GCM_SHA256 => 0x1301,
141 CIPHER_TLS13_AES_256_GCM_SHA384 => 0x1302
145 CLIENT => 0,
153 my $server = 0;
154 my $success = 0;
155 my $end = 0;
158 my $ciphersuite = 0;
159 my $successondata = 0;
167 $server = 0;
168 $success = 0;
169 $end = 0;
170 $successondata = 0;
188 if ($serverin != $server && length($payload) != 0) {
206 if ($record->len == 0 || $record->len_real == 0) {
209 my $recoffset = 0;
211 if (length $payload > 0) {
225 $payload .= substr($record->decrypt_data, 0, $recoffset);
233 0, 0, 0,
573 my $lenlo = length($self->data) & 0xff;
578 my $msgfraglo = $self->msgfrag & 0xff;
580 my $msgfragoffslo = $self->msgfragoffs & 0xff;
589 if ($numrecs == 0) {
602 $old_length = ${$self->message_frag_lens}[0] + $msg_header_len;
604 $old_length = 0;
607 my $prefix = substr($recdata, 0, $self->startoffset);
620 .pack("C", TLSProxy::Record::RT_HANDSHAKE).("\0"x16));
626 for (0..$padval) {
631 foreach my $macval (0..19) {
637 $data = ("\0"x16).$data;
649 ${$self->message_frag_lens}[0] = length($msgdata) - $msg_header_len;
654 my $recctr = 0;
655 my $datadone = 0;
658 if ($recctr == 0) {
661 $rec->data(substr($recdata, 0, $self->startoffset)
662 .substr(($msgdata), 0, $remainlen));