/ssl/test/runner/ |
A D | curve_tests.go | 24 id CurveID 78 CurvePreferences: []CurveID{curve.id}, 85 curveID: curve.id, 104 CurvePreferences: []CurveID{curve.id}, 121 CurvePreferences: []CurveID{curve.id}, 132 if isECDHGroup(curve.id) { 167 if isX25519Group(curve.id) { 182 curveID: curve.id, 529 if !isPqGroup(curve.id) { 569 SendCurve: curve.id, [all …]
|
A D | compliance_policy_tests.go | 21 switch suite.id { 32 switch suite.id { 70 CipherSuites: []uint16{suite.id}, 86 CipherSuites: []uint16{suite.id}, 119 switch curve.id { 125 switch curve.id { 146 CurvePreferences: []CurveID{curve.id}, 161 CurvePreferences: []CurveID{curve.id}, 174 if sigalg.id == 0 { 179 switch sigalg.id { [all …]
|
A D | signature_algorithm_tests.go | 24 id signatureAlgorithm 66 if alg.id != 0 { 76 if alg.id != 0 { 118 …if alg.id == signatureECDSAWithSHA1 || alg.id == signatureECDSAWithP521AndSHA512 || alg.id == sign… 179 alg.id, 189 peerSignatureAlgorithm: alg.id, 202 alg.id, 214 peerSignatureAlgorithm: alg.id, 231 peerSignatureAlgorithm: alg.id, 273 if alg.id != 0 { [all …]
|
A D | handshake_messages.go | 149 id uint16 member 309 id uint16 413 id: extensionKeyShare, 432 id: extensionCookie, 497 id: extensionALPN, 536 id: extensionUseSRTP, 545 id: extensionCustom, 608 id: extensionPAKE, 1168 var id uint16 1176 m.pakeShares = append(m.pakeShares, pakeShare{id: id, msg: msg}) [all …]
|
A D | cipher_suites.go | 80 id uint16 member 359 func mutualCipherSuite(have []uint16, id uint16) *cipherSuite { 360 if slices.Contains(have, id) { 361 return cipherSuiteFromID(id) 366 func cipherSuiteFromID(id uint16) *cipherSuite { 368 if suite.id == id {
|
A D | cipher_suite_tests.go | 25 id uint16 member 113 serverCipherSuites := []uint16{suite.id} 125 sendCipherSuite = suite.id 139 CipherSuites: []uint16{suite.id}, 190 CipherSuites: []uint16{suite.id}, 217 CipherSuites: []uint16{suite.id},
|
A D | handshake_server.go | 588 for _, id := range preferenceList { 599 hs.hello.cipherSuite = hs.suite.id 701 cipherSuite := hs.suite.id 1047 if pake.id == spakeID { 1223 id = override 1233 algID: id, 1870 hs.hello.cipherSuite = hs.suite.id 1926 hs.hello.cipherSuite = hs.suite.id 2210 cipherSuite: hs.suite.id, 2426 cipher := cipherSuiteFromID(id) [all …]
|
A D | shim_ticket.go | 216 func SetShimTicketCipherSuite(in []byte, id uint16) ([]byte, error) { 245 cipherSuite[0] = byte(id >> 8) 246 cipherSuite[1] = byte(id)
|
A D | handshake_client.go | 129 for _, id := range c.config.cipherSuites() { 130 if id == candidateSession.cipherSuite.id { 616 for id := range c.config.CertCompressionAlgs { 617 hello.compressedCertAlgs = append(hello.compressedCertAlgs, uint16(id)) 683 for _, id := range c.config.Bugs.OfferExtraPAKEs { 686 hello.pakeShares = append(hello.pakeShares, pakeShare{id: id, msg: []byte{1}}) 709 id := spakeID 711 id = cred.OverridePAKECodepoint 713 hello.pakeShares = append(hello.pakeShares, pakeShare{id: id, msg: share}) 1126 if hs.suite.id != hs.serverHello.cipherSuite { [all …]
|
A D | trust_anchor_tests.go | 21 for _, id := range ids { 22 addUint8LengthPrefixedBytes(b, id)
|
A D | common.go | 2435 func (c *Credential) WithTrustAnchorID(id []byte) *Credential { 2437 ret.TrustAnchorID = id 2600 varDefaultCipherSuites = append(varDefaultCipherSuites, suite.id)
|
A D | export_tests.go | 166 CipherSuites: []uint16{cipherSuite.id},
|
A D | conn.go | 330 switch suite.id { 850 c.config.Bugs.MockQUICTransport.readCipherSuite = suite.id 873 c.config.Bugs.MockQUICTransport.writeCipherSuite = suite.id 1906 state.CipherSuite = c.cipherSuite.id 2061 cipherSuite: c.cipherSuite.id,
|
A D | key_agreement.go | 562 func kemForCurveID(id CurveID, config *Config) (kemImplementation, bool) { 564 switch id {
|
/ssl/ |
A D | ssl_cipher.cc | 704 if (cipher_id != cp->id) { in ssl_cipher_apply_rule() 923 cipher_id = cipher->id; in ssl_cipher_process_rulestr() 1059 for (uint16_t id : kAESCiphers) { in ssl_create_cipher_list() local 1064 for (uint16_t id : kChaChaCiphers) { in ssl_create_cipher_list() local 1069 for (uint16_t id : kAESCiphers) { in ssl_create_cipher_list() local 1074 for (uint16_t id : kLegacyCiphers) { in ssl_create_cipher_list() local 1192 if (a->id > b->id) { in ssl_cipher_id_cmp() 1195 if (a->id < b->id) { in ssl_cipher_id_cmp() 1222 c.id = 0x03000000L | value; in SSL_get_cipher_by_value() 1233 assert((cipher->id & 0xff000000) == 0x03000000); in SSL_CIPHER_get_protocol_id() [all …]
|
A D | handoff.cc | 51 if (!CBB_add_u16(&ciphers, static_cast<uint16_t>(cipher.id))) { in serialize_features() 131 uint16_t id; in apply_remote_features() local 132 if (!CBS_get_u16(&ciphers, &id)) { in apply_remote_features() 135 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(id); in apply_remote_features() 221 uint16_t id; in apply_remote_features() local 222 if (!CBS_get_u16(&alps, &id)) { in apply_remote_features() 227 if ((id == TLSEXT_TYPE_application_settings && in apply_remote_features() 229 (id == TLSEXT_TYPE_application_settings_old && in apply_remote_features()
|
A D | handshake_server.cc | 45 const SSL_CLIENT_HELLO *client_hello, uint16_t id) { in ssl_client_cipher_list_contains_cipher() argument 56 if (got_id == id) { in ssl_client_cipher_list_contains_cipher() 308 uint16_t id; in is_probably_jdk11_with_tls13() member 335 uint16_t id; in is_probably_jdk11_with_tls13() local 336 if (CBS_get_u16(©, &id) && id == java_extension.id) { in is_probably_jdk11_with_tls13() 343 switch (id) { in is_probably_jdk11_with_tls13()
|
A D | extensions.cc | 101 static bool is_post_quantum_group(uint16_t id) { in is_post_quantum_group() argument 102 switch (id) { in is_post_quantum_group() 1665 if (!CBB_add_u16(&profile_ids, profile->id)) { in ext_srtp_add_clienthello() 1710 if (profile->id == profile_id) { in ext_srtp_parse_serverhello() 1753 if (server_profile->id == profile_id) { in ext_srtp_parse_clienthello() 2363 uint16_t id; in ssl_ext_key_share_parse_clienthello() local 2365 if (!CBS_get_u16(&key_shares, &id) || in ssl_ext_key_share_parse_clienthello() 2372 if (id == group_id) { in ssl_ext_key_share_parse_clienthello() 2634 CBS id; in ssl_is_valid_trust_anchor_list() local 2635 if (!CBS_get_u8_length_prefixed(&ids, &id) || // in ssl_is_valid_trust_anchor_list() [all …]
|
A D | ssl_credential.cc | 618 int SSL_CREDENTIAL_set1_trust_anchor_id(SSL_CREDENTIAL *cred, const uint8_t *id, in SSL_CREDENTIAL_set1_trust_anchor_id() argument 626 if (!cred->trust_anchor_id.CopyFrom(Span(id, id_len))) { in SSL_CREDENTIAL_set1_trust_anchor_id()
|
A D | s3_both.cc | 589 if (a->id == TLS1_3_CK_AES_256_GCM_SHA384) { in Evaluate() 591 } else if (a->id == TLS1_3_CK_AES_128_GCM_SHA256) { in Evaluate()
|
A D | ssl_session.cc | 1192 SSL_SESSION *(*cb)(SSL *ssl, const uint8_t *id, in SSL_CTX_sess_set_get_cb() argument 1198 const uint8_t *id, in SSL_CTX_sess_get_get_cb()
|
A D | ssl_asn1.cc | 154 !CBB_add_u16(&child, (uint16_t)(in->cipher->id & 0xffff)) || in SSL_SESSION_to_bytes_full()
|
A D | ssl_test.cc | 97 unsigned long id; member 571 if (expected[i].id != SSL_CIPHER_get_id(cipher) || in CipherListsEqual() 987 int id; in TEST() member 1117 const SSL_CIPHER *cipher = SSL_get_cipher_by_value(t.id & 0xffff); in TEST() 1988 for (const uint8_t id : test.ids) { in TEST() local 1994 ASSERT_TRUE(SSL_marshal_ech_config(&ech_config, &ech_config_len, id, in TEST() 2663 uint8_t id[SSL3_SSL_SESSION_ID_LENGTH] = {0}; in CreateTestSession() local 2664 OPENSSL_memcpy(id, &number, sizeof(number)); in CreateTestSession() 2665 if (!SSL_SESSION_set1_id(ret.get(), id, sizeof(id))) { in CreateTestSession()
|
A D | internal.h | 246 uint32_t id; member 2334 const SSL_CLIENT_HELLO *client_hello, uint16_t id);
|
/ssl/test/ |
A D | PORTING.md | 23 runner opens up a server socket and provides the shim with `-port`, `-shim-id`
|