TlsMessage
- class mtf.network_port.tls.tls_dtls_config.TlsMessage
- Enum representing various TLS message types used in the TLS handshake process. - Each enum member corresponds to a fully qualified Java class name that represents a specific type of TLS message. These message types can be dynamically loaded and processed using jpype in the TlsAttacker framework. - Enum Members:- HELLO_VERIFY_REQUESTstr
- Represents the HelloVerifyRequestMessage used in DTLS handshakes to verify the client’s IP address. 
- CHANGE_CIPHER_SPECstr
- Represents the ChangeCipherSpecMessage, indicating that the sender is ready to begin using new cryptographic parameters. 
- CERTIFICATE_REQUESTstr
- Represents the CertificateRequestMessage, sent by the server to request the client’s certificate. 
- SERVER_HELLO_DONEstr
- Represents the ServerHelloDoneMessage, indicating the server has finished its part of the handshake. 
- SERVER_KEY_EXCHANGEstr
- Represents the ServerKeyExchangeMessage, used to provide the server’s key-exchange parameters. 
- FINISHED_MESSAGEstr
- Represents the FinishedMessage, indicating the completion of the handshake process. 
- ALERTstr
- Represents the AlertMessage, used to signal errors or important notifications in the TLS session. 
- SERVER_HELLOstr
- Represents the ServerHelloMessage, sent by the server to confirm selected handshake parameters. 
- CLIENT_HELLOstr
- Represents the ClientHelloMessage, sent by the client to initiate the TLS handshake with proposed parameters. 
- CLIENT_KEY_EXCHANGEstr
- Represents the ClientKeyExchangeMessage, used to securely exchange key material between the client and server. 
- CERTIFICATEstr
- Represents the CertificateMessage, used to send the sender’s public key to the recipient for authentication. 
 - HELLO_VERIFY_REQUEST = 'de.rub.nds.tlsattacker.core.protocol.message.HelloVerifyRequestMessage'
 - CHANGE_CIPHER_SPEC = 'de.rub.nds.tlsattacker.core.protocol.message.ChangeCipherSpecMessage'
 - CERTIFICATE_REQUEST = 'de.rub.nds.tlsattacker.core.protocol.message.CertificateRequestMessage'
 - SERVER_HELLO_DONE = 'de.rub.nds.tlsattacker.core.protocol.message.ServerHelloDoneMessage'
 - SERVER_KEY_EXCHANGE = ('de.rub.nds.tlsattacker.core.protocol.message.ServerKeyExchangeMessage', 'de.rub.nds.tlsattacker.core.protocol.message.PskServerKeyExchangeMessage')
 - FINISHED_MESSAGE = 'de.rub.nds.tlsattacker.core.protocol.message.FinishedMessage'
 - ALERT = 'de.rub.nds.tlsattacker.core.protocol.message.AlertMessage'
 - SERVER_HELLO = 'de.rub.nds.tlsattacker.core.protocol.message.ServerHelloMessage'
 - CLIENT_HELLO = 'de.rub.nds.tlsattacker.core.protocol.message.ClientHelloMessage'
 - CLIENT_KEY_EXCHANGE = ('de.rub.nds.tlsattacker.core.protocol.message.ClientKeyExchangeMessage', 'de.rub.nds.tlsattacker.core.protocol.message.PskClientKeyExchangeMessage')
 - CERTIFICATE = 'de.rub.nds.tlsattacker.core.protocol.message.CertificateMessage'
 - EncryptedExtensionsMessage = 'de.rub.nds.tlsattacker.core.protocol.message.EncryptedExtensionsMessage'
 - ApplicationMessage = 'de.rub.nds.tlsattacker.core.protocol.message.ApplicationMessage'
 - ResetConnectionAction = 'de.rub.nds.tlsattacker.core.workflow.action.ResetConnectionAction'
 - RenegotiationAction = 'de.rub.nds.tlsattacker.core.workflow.action.RenegotiationAction'
 - NewSessionTicketMessage = 'de.rub.nds.tlsattacker.core.protocol.message.NewSessionTicketMessage'