/ssl/test/runner/ |
A D | conn.go | 163 c.in.isDTLS = c.isDTLS 164 c.out.isDTLS = c.isDTLS 165 c.in.config = c.config 166 c.out.config = c.config 167 c.in.conn = c 168 c.out.conn = c 1179 record, err := c.makeDTLSRecordNumberInfo(&c.in.epoch, c.hand.Bytes()) 1210 copy(c.tmp[2:4], c.tmp[0:2]) 1676 …err := c.useInTrafficSecret(epoch, c.in.wireVersion, c.cipherSuite, updateTrafficSecret(c.cipherSu… 1789 if c.input.Len() == 0 || c.isDTLS { [all …]
|
A D | handshake_client.go | 107 c: c, 459 c := hs.c 912 c := hs.c 995 c := hs.c 1591 c := hs.c 1681 c := hs.c 1858 c := hs.c 1944 c := hs.c 1965 c := hs.c 2172 c := hs.c [all …]
|
A D | dtls.go | 442 …prev, received, next, records := c.previousFlight, c.receivedFlight, c.nextFlight, c.receivedFligh… 443 c.previousFlight, c.receivedFlight, c.nextFlight, c.receivedFlightRecords = next, nil, nil, nil 459 …c.previousFlight, c.receivedFlight, c.nextFlight, c.receivedFlightRecords = prev, received, next, … 692 for len(c.handMsg) < 4+c.handMsgLen { 711 c.hand.Next(c.hand.Len() - len(s)) 738 if len(c.handMsg) < 4+c.handMsgLen { 753 c.handMsg, c.handMsgLen = nil, 0 936 c.err = c.conn.dtlsFlushPacket() 1211 ret, c.err = c.doReadRetransmit() 1306 c.err = c.conn.dtlsFlushPacket() [all …]
|
A D | dtls_tests.go | 283 c.ReadACK(c.InEpoch()) 892 c.ReadACK(c.InEpoch()) 905 c.ReadACK(c.InEpoch()) 912 c.ReadACK(c.InEpoch()) 1056 c.ReadACK(c.InEpoch()) 1137 c.ReadACK(c.InEpoch()) 1237 c.ReadACK(c.InEpoch()) 1248 c.ReadACK(c.InEpoch()) 1263 c.ReadACK(c.InEpoch()) 1291 c.ReadACK(c.InEpoch()) [all …]
|
A D | key_update_tests.go | 136 c.ReadACK(c.InEpoch()) 141 c.WriteAppData(c.OutEpoch()-1, msg) 148 c.ReadACK(c.InEpoch()) 151 c.WriteAppData(c.OutEpoch(), msg) 156 c.WriteAppData(c.OutEpoch()-1, msg) 163 c.ReadACK(c.InEpoch()) 302 c.WriteACK(c.OutEpoch(), records) 313 c.WriteAppData(c.OutEpoch(), msg) 366 c.ReadACK(c.InEpoch()) 381 c.ReadACK(c.InEpoch()) [all …]
|
A D | handshake_server.go | 59 c: c, 168 c := hs.c 538 c := hs.c 1501 c := hs.c 1606 c := hs.c 1798 c := hs.c 1868 c := hs.c 1910 c := hs.c 2130 c := hs.c 2154 c := hs.c [all …]
|
A D | common.go | 451 switch c { 2220 if c != nil && c.MinVersion != 0 { 2238 if c != nil && c.MaxVersion != 0 { 2253 if c == nil || len(c.CurvePreferences) == 0 { 2262 if c == nil || c.DefaultCurves == nil { 2278 if c == nil || len(c.ECHCipherSuites) == 0 { 2429 if c != nil && c.SignatureAlgorithms != nil { 2464 c.Lock() 2474 if c.q.Len() < c.capacity { 2476 c.m[sessionKey] = c.q.PushFront(entry) [all …]
|
A D | tls.go | 28 c := &Conn{conn: conn, config: config} 29 c.init() 30 return c 39 c.init() 40 return c 51 func (l *listener) Accept() (c net.Conn, err error) { 52 c, err = l.Listener.Accept() 56 c = Server(c, l.config) 139 c := *config 140 c.ServerName = hostname [all …]
|
A D | cipher_suites.go | 163 func (c *cbcMode) SetIV(iv []byte) { 164 c.BlockMode = c.new(iv) 168 c := &cbcMode{} 171 c.new = func(iv []byte) cipher.BlockMode { return cipher.NewCBCDecrypter(block, iv) } 173 c.new = func(iv []byte) cipher.BlockMode { return cipher.NewCBCEncrypter(block, iv) } 175 c.SetIV(iv) 176 return c 180 c := &cbcMode{} 183 c.new = func(iv []byte) cipher.BlockMode { return cipher.NewCBCDecrypter(block, iv) } 187 c.SetIV(iv) [all …]
|
A D | ticket.go | 167 func (c *Conn) encryptTicket(state *sessionState) ([]byte, error) { 168 key := c.config.SessionTicketKey[:] 169 if c.config.Bugs.EncryptSessionTicketKey != nil { 170 key = c.config.Bugs.EncryptSessionTicketKey[:] 178 if _, err := io.ReadFull(c.config.rand(), iv); err != nil { 194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) { 202 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32]) 210 block, err := aes.NewCipher(c.config.SessionTicketKey[:16])
|
A D | key_agreement.go | 475 func (c *concatKEM) encapsulationKeySize() int { 476 return c.kem1.encapsulationKeySize() + c.kem2.encapsulationKeySize() 479 func (c *concatKEM) ciphertextSize() int { 480 return c.kem1.ciphertextSize() + c.kem2.ciphertextSize() 484 publicKey1, err := c.kem1.generate(config) 488 publicKey2, err := c.kem2.generate(config) 496 encapKeySize1 := c.kem1.encapsulationKeySize() 501 ciphertext1, secret1, err := c.kem1.encap(config, peerKey1) 513 ciphertextSize1 := c.kem1.ciphertextSize() 518 secret1, err := c.kem1.decap(config, ciphertext1) [all …]
|
A D | basic_tests.go | 793 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN… 797 c.WriteFragments([]DTLSFragment{f1, f2}) 809 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN… 813 c.WriteFragments([]DTLSFragment{f1, f2}) 1424 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN… 1426 c.WriteFlight(next) 1431 c.WriteFlight(next) 1432 c.ReadACK(c.InEpoch()) 1436 c.WriteAppData(c.OutEpoch(), msg) 1437 c.ReadAppData(c.InEpoch(), expectedReply(msg)) [all …]
|
A D | change_cipher_spec_tests.go | 200 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN… 206 c.WriteFlight(next) 305 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN… 306 c.WriteFragments([]DTLSFragment{{IsChangeCipherSpec: true, Data: []byte{1}}}) 307 c.WriteFlight(next)
|
A D | pake_tests.go | 197 CheckClientHello: func(c *clientHelloMsg) error { 199 if c.hasKeyShares { 202 if len(c.supportedCurves) != 0 { 206 if len(c.signatureAlgorithms) != 0 { 210 if len(c.pskKEModes) != 0 {
|
A D | certificate_selection_tests.go | 22 func canBeShimCertificate(c *Credential) bool { 24 return c.Type == CredentialTypeX509 && !c.MustMatchIssuer && c.TrustAnchorID == nil
|
A D | runner.go | 1997 func worker(dispatcher *shimDispatcher, statusChan chan statusMsg, c chan *testCase, shimPath strin… 2000 for test := range c {
|
/ssl/test/runner/hpke/ |
A D | hpke.go | 133 func (c *Context) KEM() uint16 { return c.kemID } 135 func (c *Context) KDF() uint16 { return c.kdfID } 137 func (c *Context) AEAD() uint16 { return c.aeadID } 139 func (c *Context) Overhead() int { return c.aead.Overhead() } 142 ciphertext := c.aead.Seal(nil, c.computeNonce(), plaintext, additionalData) 143 c.incrementSeq() 148 plaintext, err := c.aead.Open(nil, c.computeNonce(), ciphertext, additionalData) 152 c.incrementSeq() 157 suiteID := buildSuiteID(c.kemID, c.kdfID, c.aeadID) 256 c.seq++ [all …]
|
/ssl/ |
A D | ssl_privkey.cc | 736 const unsigned char c = str[offset]; in parse_sigalgs_list() local 738 switch (c) { in parse_sigalgs_list() 841 if (OPENSSL_isalnum(c) || c == '-' || c == '_') { in parse_sigalgs_list() 842 buf[buf_used++] = c; in parse_sigalgs_list() 845 ERR_add_error_dataf("invalid character 0x%02x at offest %zu", c, in parse_sigalgs_list()
|
A D | ssl_cipher.cc | 542 static bool is_cipher_list_separator(char c, bool is_strict) { in is_cipher_list_separator() argument 543 if (c == ':') { in is_cipher_list_separator() 546 return !is_strict && (c == ' ' || c == ';' || c == ','); in is_cipher_list_separator() 1220 SSL_CIPHER c; in SSL_get_cipher_by_value() local 1222 c.id = 0x03000000L | value; in SSL_get_cipher_by_value() 1224 bsearch(&c, kCiphers, OPENSSL_ARRAY_SIZE(kCiphers), sizeof(SSL_CIPHER), in SSL_get_cipher_by_value()
|
A D | handshake_server.cc | 147 const SSL_CIPHER *c = SSL_get_cipher_by_value(cipher_suite); in ssl_parse_client_cipher_list() local 148 if (c != NULL && !sk_SSL_CIPHER_push(sk.get(), c)) { in ssl_parse_client_cipher_list() 185 const SSL_CIPHER *c = sk_SSL_CIPHER_value(prio, i); in choose_cipher() local 190 SSL_CIPHER_get_min_version(c) <= ssl_protocol_version(ssl) && // in choose_cipher() 191 ssl_protocol_version(ssl) <= SSL_CIPHER_get_max_version(c) && // in choose_cipher() 193 (c->algorithm_mkey & mask_k) && // in choose_cipher() 194 (c->algorithm_auth & mask_a) && // in choose_cipher() 196 sk_SSL_CIPHER_find(allow, &cipher_index, c)) { in choose_cipher()
|
A D | encrypted_client_hello.cc | 397 for (uint8_t c : component) { in ssl_is_valid_ech_public_name() local 398 if (!OPENSSL_isalnum(c) && c != '-') { in ssl_is_valid_ech_public_name()
|
A D | ssl_lib.cc | 1977 const SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, n); in SSL_get_cipher_list() local 1978 if (c == NULL) { in SSL_get_cipher_list() 1982 return c->name; in SSL_get_cipher_list()
|
/ssl/test/ |
A D | README.md | 26 also works after using `go test -c` to make a `runner.test` binary first.
|
A D | PORTING.md | 104 test-only build configuration, to be more straightforward. See `crypto/mem.c`
|