Home
last modified time | relevance | path

Searched refs:c (Results 1 – 24 of 24) sorted by relevance

/ssl/test/runner/
A Dconn.go163 c.in.isDTLS = c.isDTLS
164 c.out.isDTLS = c.isDTLS
165 c.in.config = c.config
166 c.out.config = c.config
167 c.in.conn = c
168 c.out.conn = c
1179 record, err := c.makeDTLSRecordNumberInfo(&c.in.epoch, c.hand.Bytes())
1210 copy(c.tmp[2:4], c.tmp[0:2])
1676 …err := c.useInTrafficSecret(epoch, c.in.wireVersion, c.cipherSuite, updateTrafficSecret(c.cipherSu…
1789 if c.input.Len() == 0 || c.isDTLS {
[all …]
A Dhandshake_client.go107 c: c,
459 c := hs.c
912 c := hs.c
995 c := hs.c
1591 c := hs.c
1681 c := hs.c
1858 c := hs.c
1944 c := hs.c
1965 c := hs.c
2172 c := hs.c
[all …]
A Ddtls.go442 …prev, received, next, records := c.previousFlight, c.receivedFlight, c.nextFlight, c.receivedFligh…
443 c.previousFlight, c.receivedFlight, c.nextFlight, c.receivedFlightRecords = next, nil, nil, nil
459c.previousFlight, c.receivedFlight, c.nextFlight, c.receivedFlightRecords = prev, received, next, …
692 for len(c.handMsg) < 4+c.handMsgLen {
711 c.hand.Next(c.hand.Len() - len(s))
738 if len(c.handMsg) < 4+c.handMsgLen {
753 c.handMsg, c.handMsgLen = nil, 0
936 c.err = c.conn.dtlsFlushPacket()
1211 ret, c.err = c.doReadRetransmit()
1306 c.err = c.conn.dtlsFlushPacket()
[all …]
A Ddtls_tests.go283 c.ReadACK(c.InEpoch())
892 c.ReadACK(c.InEpoch())
905 c.ReadACK(c.InEpoch())
912 c.ReadACK(c.InEpoch())
1056 c.ReadACK(c.InEpoch())
1137 c.ReadACK(c.InEpoch())
1237 c.ReadACK(c.InEpoch())
1248 c.ReadACK(c.InEpoch())
1263 c.ReadACK(c.InEpoch())
1291 c.ReadACK(c.InEpoch())
[all …]
A Dkey_update_tests.go136 c.ReadACK(c.InEpoch())
141 c.WriteAppData(c.OutEpoch()-1, msg)
148 c.ReadACK(c.InEpoch())
151 c.WriteAppData(c.OutEpoch(), msg)
156 c.WriteAppData(c.OutEpoch()-1, msg)
163 c.ReadACK(c.InEpoch())
302 c.WriteACK(c.OutEpoch(), records)
313 c.WriteAppData(c.OutEpoch(), msg)
366 c.ReadACK(c.InEpoch())
381 c.ReadACK(c.InEpoch())
[all …]
A Dhandshake_server.go59 c: c,
168 c := hs.c
538 c := hs.c
1501 c := hs.c
1606 c := hs.c
1798 c := hs.c
1868 c := hs.c
1910 c := hs.c
2130 c := hs.c
2154 c := hs.c
[all …]
A Dcommon.go451 switch c {
2220 if c != nil && c.MinVersion != 0 {
2238 if c != nil && c.MaxVersion != 0 {
2253 if c == nil || len(c.CurvePreferences) == 0 {
2262 if c == nil || c.DefaultCurves == nil {
2278 if c == nil || len(c.ECHCipherSuites) == 0 {
2429 if c != nil && c.SignatureAlgorithms != nil {
2464 c.Lock()
2474 if c.q.Len() < c.capacity {
2476 c.m[sessionKey] = c.q.PushFront(entry)
[all …]
A Dtls.go28 c := &Conn{conn: conn, config: config}
29 c.init()
30 return c
39 c.init()
40 return c
51 func (l *listener) Accept() (c net.Conn, err error) {
52 c, err = l.Listener.Accept()
56 c = Server(c, l.config)
139 c := *config
140 c.ServerName = hostname
[all …]
A Dcipher_suites.go163 func (c *cbcMode) SetIV(iv []byte) {
164 c.BlockMode = c.new(iv)
168 c := &cbcMode{}
171 c.new = func(iv []byte) cipher.BlockMode { return cipher.NewCBCDecrypter(block, iv) }
173 c.new = func(iv []byte) cipher.BlockMode { return cipher.NewCBCEncrypter(block, iv) }
175 c.SetIV(iv)
176 return c
180 c := &cbcMode{}
183 c.new = func(iv []byte) cipher.BlockMode { return cipher.NewCBCDecrypter(block, iv) }
187 c.SetIV(iv)
[all …]
A Dticket.go167 func (c *Conn) encryptTicket(state *sessionState) ([]byte, error) {
168 key := c.config.SessionTicketKey[:]
169 if c.config.Bugs.EncryptSessionTicketKey != nil {
170 key = c.config.Bugs.EncryptSessionTicketKey[:]
178 if _, err := io.ReadFull(c.config.rand(), iv); err != nil {
194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) {
202 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32])
210 block, err := aes.NewCipher(c.config.SessionTicketKey[:16])
A Dkey_agreement.go475 func (c *concatKEM) encapsulationKeySize() int {
476 return c.kem1.encapsulationKeySize() + c.kem2.encapsulationKeySize()
479 func (c *concatKEM) ciphertextSize() int {
480 return c.kem1.ciphertextSize() + c.kem2.ciphertextSize()
484 publicKey1, err := c.kem1.generate(config)
488 publicKey2, err := c.kem2.generate(config)
496 encapKeySize1 := c.kem1.encapsulationKeySize()
501 ciphertext1, secret1, err := c.kem1.encap(config, peerKey1)
513 ciphertextSize1 := c.kem1.ciphertextSize()
518 secret1, err := c.kem1.decap(config, ciphertext1)
[all …]
A Dbasic_tests.go793 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN…
797 c.WriteFragments([]DTLSFragment{f1, f2})
809 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN…
813 c.WriteFragments([]DTLSFragment{f1, f2})
1424 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN…
1426 c.WriteFlight(next)
1431 c.WriteFlight(next)
1432 c.ReadACK(c.InEpoch())
1436 c.WriteAppData(c.OutEpoch(), msg)
1437 c.ReadAppData(c.InEpoch(), expectedReply(msg))
[all …]
A Dchange_cipher_spec_tests.go200 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN…
206 c.WriteFlight(next)
305 …WriteFlightDTLS: func(c *DTLSController, prev, received, next []DTLSMessage, records []DTLSRecordN…
306 c.WriteFragments([]DTLSFragment{{IsChangeCipherSpec: true, Data: []byte{1}}})
307 c.WriteFlight(next)
A Dpake_tests.go197 CheckClientHello: func(c *clientHelloMsg) error {
199 if c.hasKeyShares {
202 if len(c.supportedCurves) != 0 {
206 if len(c.signatureAlgorithms) != 0 {
210 if len(c.pskKEModes) != 0 {
A Dcertificate_selection_tests.go22 func canBeShimCertificate(c *Credential) bool {
24 return c.Type == CredentialTypeX509 && !c.MustMatchIssuer && c.TrustAnchorID == nil
A Drunner.go1997 func worker(dispatcher *shimDispatcher, statusChan chan statusMsg, c chan *testCase, shimPath strin…
2000 for test := range c {
/ssl/test/runner/hpke/
A Dhpke.go133 func (c *Context) KEM() uint16 { return c.kemID }
135 func (c *Context) KDF() uint16 { return c.kdfID }
137 func (c *Context) AEAD() uint16 { return c.aeadID }
139 func (c *Context) Overhead() int { return c.aead.Overhead() }
142 ciphertext := c.aead.Seal(nil, c.computeNonce(), plaintext, additionalData)
143 c.incrementSeq()
148 plaintext, err := c.aead.Open(nil, c.computeNonce(), ciphertext, additionalData)
152 c.incrementSeq()
157 suiteID := buildSuiteID(c.kemID, c.kdfID, c.aeadID)
256 c.seq++
[all …]
/ssl/
A Dssl_privkey.cc736 const unsigned char c = str[offset]; in parse_sigalgs_list() local
738 switch (c) { in parse_sigalgs_list()
841 if (OPENSSL_isalnum(c) || c == '-' || c == '_') { in parse_sigalgs_list()
842 buf[buf_used++] = c; in parse_sigalgs_list()
845 ERR_add_error_dataf("invalid character 0x%02x at offest %zu", c, in parse_sigalgs_list()
A Dssl_cipher.cc542 static bool is_cipher_list_separator(char c, bool is_strict) { in is_cipher_list_separator() argument
543 if (c == ':') { in is_cipher_list_separator()
546 return !is_strict && (c == ' ' || c == ';' || c == ','); in is_cipher_list_separator()
1220 SSL_CIPHER c; in SSL_get_cipher_by_value() local
1222 c.id = 0x03000000L | value; in SSL_get_cipher_by_value()
1224 bsearch(&c, kCiphers, OPENSSL_ARRAY_SIZE(kCiphers), sizeof(SSL_CIPHER), in SSL_get_cipher_by_value()
A Dhandshake_server.cc147 const SSL_CIPHER *c = SSL_get_cipher_by_value(cipher_suite); in ssl_parse_client_cipher_list() local
148 if (c != NULL && !sk_SSL_CIPHER_push(sk.get(), c)) { in ssl_parse_client_cipher_list()
185 const SSL_CIPHER *c = sk_SSL_CIPHER_value(prio, i); in choose_cipher() local
190 SSL_CIPHER_get_min_version(c) <= ssl_protocol_version(ssl) && // in choose_cipher()
191 ssl_protocol_version(ssl) <= SSL_CIPHER_get_max_version(c) && // in choose_cipher()
193 (c->algorithm_mkey & mask_k) && // in choose_cipher()
194 (c->algorithm_auth & mask_a) && // in choose_cipher()
196 sk_SSL_CIPHER_find(allow, &cipher_index, c)) { in choose_cipher()
A Dencrypted_client_hello.cc397 for (uint8_t c : component) { in ssl_is_valid_ech_public_name() local
398 if (!OPENSSL_isalnum(c) && c != '-') { in ssl_is_valid_ech_public_name()
A Dssl_lib.cc1977 const SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, n); in SSL_get_cipher_list() local
1978 if (c == NULL) { in SSL_get_cipher_list()
1982 return c->name; in SSL_get_cipher_list()
/ssl/test/
A DREADME.md26 also works after using `go test -c` to make a `runner.test` binary first.
A DPORTING.md104 test-only build configuration, to be more straightforward. See `crypto/mem.c`

Completed in 704 milliseconds