Home
last modified time | relevance | path

Searched refs:id (Results 1 – 25 of 25) sorted by relevance

/ssl/test/runner/
A Dcurve_tests.go24 id CurveID
78 CurvePreferences: []CurveID{curve.id},
85 curveID: curve.id,
104 CurvePreferences: []CurveID{curve.id},
121 CurvePreferences: []CurveID{curve.id},
132 if isECDHGroup(curve.id) {
167 if isX25519Group(curve.id) {
182 curveID: curve.id,
529 if !isPqGroup(curve.id) {
569 SendCurve: curve.id,
[all …]
A Dcompliance_policy_tests.go21 switch suite.id {
32 switch suite.id {
70 CipherSuites: []uint16{suite.id},
86 CipherSuites: []uint16{suite.id},
119 switch curve.id {
125 switch curve.id {
146 CurvePreferences: []CurveID{curve.id},
161 CurvePreferences: []CurveID{curve.id},
174 if sigalg.id == 0 {
179 switch sigalg.id {
[all …]
A Dsignature_algorithm_tests.go24 id signatureAlgorithm
66 if alg.id != 0 {
76 if alg.id != 0 {
118 …if alg.id == signatureECDSAWithSHA1 || alg.id == signatureECDSAWithP521AndSHA512 || alg.id == sign…
179 alg.id,
189 peerSignatureAlgorithm: alg.id,
202 alg.id,
214 peerSignatureAlgorithm: alg.id,
231 peerSignatureAlgorithm: alg.id,
273 if alg.id != 0 {
[all …]
A Dhandshake_messages.go149 id uint16 member
309 id uint16
413 id: extensionKeyShare,
432 id: extensionCookie,
497 id: extensionALPN,
536 id: extensionUseSRTP,
545 id: extensionCustom,
608 id: extensionPAKE,
1168 var id uint16
1176 m.pakeShares = append(m.pakeShares, pakeShare{id: id, msg: msg})
[all …]
A Dcipher_suites.go80 id uint16 member
359 func mutualCipherSuite(have []uint16, id uint16) *cipherSuite {
360 if slices.Contains(have, id) {
361 return cipherSuiteFromID(id)
366 func cipherSuiteFromID(id uint16) *cipherSuite {
368 if suite.id == id {
A Dcipher_suite_tests.go25 id uint16 member
113 serverCipherSuites := []uint16{suite.id}
125 sendCipherSuite = suite.id
139 CipherSuites: []uint16{suite.id},
190 CipherSuites: []uint16{suite.id},
217 CipherSuites: []uint16{suite.id},
A Dhandshake_server.go588 for _, id := range preferenceList {
599 hs.hello.cipherSuite = hs.suite.id
701 cipherSuite := hs.suite.id
1047 if pake.id == spakeID {
1223 id = override
1233 algID: id,
1870 hs.hello.cipherSuite = hs.suite.id
1926 hs.hello.cipherSuite = hs.suite.id
2210 cipherSuite: hs.suite.id,
2426 cipher := cipherSuiteFromID(id)
[all …]
A Dshim_ticket.go216 func SetShimTicketCipherSuite(in []byte, id uint16) ([]byte, error) {
245 cipherSuite[0] = byte(id >> 8)
246 cipherSuite[1] = byte(id)
A Dhandshake_client.go129 for _, id := range c.config.cipherSuites() {
130 if id == candidateSession.cipherSuite.id {
616 for id := range c.config.CertCompressionAlgs {
617 hello.compressedCertAlgs = append(hello.compressedCertAlgs, uint16(id))
683 for _, id := range c.config.Bugs.OfferExtraPAKEs {
686 hello.pakeShares = append(hello.pakeShares, pakeShare{id: id, msg: []byte{1}})
709 id := spakeID
711 id = cred.OverridePAKECodepoint
713 hello.pakeShares = append(hello.pakeShares, pakeShare{id: id, msg: share})
1126 if hs.suite.id != hs.serverHello.cipherSuite {
[all …]
A Dtrust_anchor_tests.go21 for _, id := range ids {
22 addUint8LengthPrefixedBytes(b, id)
A Dcommon.go2435 func (c *Credential) WithTrustAnchorID(id []byte) *Credential {
2437 ret.TrustAnchorID = id
2600 varDefaultCipherSuites = append(varDefaultCipherSuites, suite.id)
A Dexport_tests.go166 CipherSuites: []uint16{cipherSuite.id},
A Dconn.go330 switch suite.id {
850 c.config.Bugs.MockQUICTransport.readCipherSuite = suite.id
873 c.config.Bugs.MockQUICTransport.writeCipherSuite = suite.id
1906 state.CipherSuite = c.cipherSuite.id
2061 cipherSuite: c.cipherSuite.id,
A Dkey_agreement.go562 func kemForCurveID(id CurveID, config *Config) (kemImplementation, bool) {
564 switch id {
/ssl/
A Dssl_cipher.cc704 if (cipher_id != cp->id) { in ssl_cipher_apply_rule()
923 cipher_id = cipher->id; in ssl_cipher_process_rulestr()
1059 for (uint16_t id : kAESCiphers) { in ssl_create_cipher_list() local
1064 for (uint16_t id : kChaChaCiphers) { in ssl_create_cipher_list() local
1069 for (uint16_t id : kAESCiphers) { in ssl_create_cipher_list() local
1074 for (uint16_t id : kLegacyCiphers) { in ssl_create_cipher_list() local
1192 if (a->id > b->id) { in ssl_cipher_id_cmp()
1195 if (a->id < b->id) { in ssl_cipher_id_cmp()
1222 c.id = 0x03000000L | value; in SSL_get_cipher_by_value()
1233 assert((cipher->id & 0xff000000) == 0x03000000); in SSL_CIPHER_get_protocol_id()
[all …]
A Dhandoff.cc51 if (!CBB_add_u16(&ciphers, static_cast<uint16_t>(cipher.id))) { in serialize_features()
131 uint16_t id; in apply_remote_features() local
132 if (!CBS_get_u16(&ciphers, &id)) { in apply_remote_features()
135 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(id); in apply_remote_features()
221 uint16_t id; in apply_remote_features() local
222 if (!CBS_get_u16(&alps, &id)) { in apply_remote_features()
227 if ((id == TLSEXT_TYPE_application_settings && in apply_remote_features()
229 (id == TLSEXT_TYPE_application_settings_old && in apply_remote_features()
A Dhandshake_server.cc45 const SSL_CLIENT_HELLO *client_hello, uint16_t id) { in ssl_client_cipher_list_contains_cipher() argument
56 if (got_id == id) { in ssl_client_cipher_list_contains_cipher()
308 uint16_t id; in is_probably_jdk11_with_tls13() member
335 uint16_t id; in is_probably_jdk11_with_tls13() local
336 if (CBS_get_u16(&copy, &id) && id == java_extension.id) { in is_probably_jdk11_with_tls13()
343 switch (id) { in is_probably_jdk11_with_tls13()
A Dextensions.cc101 static bool is_post_quantum_group(uint16_t id) { in is_post_quantum_group() argument
102 switch (id) { in is_post_quantum_group()
1665 if (!CBB_add_u16(&profile_ids, profile->id)) { in ext_srtp_add_clienthello()
1710 if (profile->id == profile_id) { in ext_srtp_parse_serverhello()
1753 if (server_profile->id == profile_id) { in ext_srtp_parse_clienthello()
2363 uint16_t id; in ssl_ext_key_share_parse_clienthello() local
2365 if (!CBS_get_u16(&key_shares, &id) || in ssl_ext_key_share_parse_clienthello()
2372 if (id == group_id) { in ssl_ext_key_share_parse_clienthello()
2634 CBS id; in ssl_is_valid_trust_anchor_list() local
2635 if (!CBS_get_u8_length_prefixed(&ids, &id) || // in ssl_is_valid_trust_anchor_list()
[all …]
A Dssl_credential.cc618 int SSL_CREDENTIAL_set1_trust_anchor_id(SSL_CREDENTIAL *cred, const uint8_t *id, in SSL_CREDENTIAL_set1_trust_anchor_id() argument
626 if (!cred->trust_anchor_id.CopyFrom(Span(id, id_len))) { in SSL_CREDENTIAL_set1_trust_anchor_id()
A Ds3_both.cc589 if (a->id == TLS1_3_CK_AES_256_GCM_SHA384) { in Evaluate()
591 } else if (a->id == TLS1_3_CK_AES_128_GCM_SHA256) { in Evaluate()
A Dssl_session.cc1192 SSL_SESSION *(*cb)(SSL *ssl, const uint8_t *id, in SSL_CTX_sess_set_get_cb() argument
1198 const uint8_t *id, in SSL_CTX_sess_get_get_cb()
A Dssl_asn1.cc154 !CBB_add_u16(&child, (uint16_t)(in->cipher->id & 0xffff)) || in SSL_SESSION_to_bytes_full()
A Dssl_test.cc97 unsigned long id; member
571 if (expected[i].id != SSL_CIPHER_get_id(cipher) || in CipherListsEqual()
987 int id; in TEST() member
1117 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(t.id & 0xffff); in TEST()
1988 for (const uint8_t id : test.ids) { in TEST() local
1994 ASSERT_TRUE(SSL_marshal_ech_config(&ech_config, &ech_config_len, id, in TEST()
2663 uint8_t id[SSL3_SSL_SESSION_ID_LENGTH] = {0}; in CreateTestSession() local
2664 OPENSSL_memcpy(id, &number, sizeof(number)); in CreateTestSession()
2665 if (!SSL_SESSION_set1_id(ret.get(), id, sizeof(id))) { in CreateTestSession()
A Dinternal.h246 uint32_t id; member
2334 const SSL_CLIENT_HELLO *client_hello, uint16_t id);
/ssl/test/
A DPORTING.md23 runner opens up a server socket and provides the shim with `-port`, `-shim-id`

Completed in 117 milliseconds