/ssl/test/runner/ |
A D | packet_adapter.go | 79 func (p *packetAdaptor) Read(b []byte) (int, error) { 91 return copy(b, out), nil 95 payload := make([]byte, 1+4+len(b)) 98 copy(payload[5:], b) 102 return len(b), nil 185 n, err := r.Conn.Write(b) 192 r.prevWrite = append(r.prevWrite[:0], b...) 213 if d.damage && len(b) > 0 { 214 b = slices.Clone(b) 215 b[len(b)-1]++ [all …]
|
A D | prf.go | 62 b := h.Sum(nil) 63 todo := len(b) 67 copy(result[j:j+todo], b) 91 result[i] ^= b 388 b = h.hash.Sum(b) 389 return b 443 b[i] = 32 445 b = append(b, context...) 446 b = append(b, 0) 447 b = h.appendContextHashes(b) [all …]
|
A D | certs.go | 293 var b [2]byte 295 b[0] = bits.Reverse8(byte(subject.KeyUsage)) 299 if b[1] == 0 { 300 ku.Bytes = b[:1] 302 ku.Bytes = b[:] 376 Certificate: b.chain, 377 ChainPath: writeTempCertFile(b.chain), 378 PrivateKey: b.privateKey, 379 KeyPath: writeTempKeyFile(b.privateKey), 380 RootCertificate: b.rootCert, [all …]
|
A D | dtls.go | 157 typ := b[0] 168 wireSeq := b[1:3] 195 recordLen = int(b[3])<<8 | int(b[4]) 219 vers := uint16(b[1])<<8 | uint16(b[2]) 242 seq := b[5:11] 256 recordLen = int(b[11])<<8 | int(b[12]) 534 b = append(b, typ) 536 b = append(b, seq[7]) 538 b = append(b, seq[6], seq[7]) 541 b = append(b, byte(recordLen>>8), byte(recordLen)) [all …]
|
A D | recordingconn.go | 67 func (r *recordingConn) Read(b []byte) (n int, err error) { 68 if n, err = r.Conn.Read(b); n == 0 { 71 r.appendFlow(readFlow, "", b[:n]) 75 func (r *recordingConn) Write(b []byte) (n int, err error) { 76 if n, err = r.Conn.Write(b); n == 0 { 79 r.appendFlow(writeFlow, "", b[:n])
|
A D | conn.go | 469 b := payload[len(payload)-1-i] 470 good &^= mask&paddingLen ^ mask&b 484 func roundUp(a, b int) int { 485 return a + (b-a%b)%b 635 padding := extendSlice(&b, paddingLen) 642 return b 990 b := c.rawInput.Next(recordHeaderLen + n) 1562 func (c *Conn) Write(b []byte) (int, error) { 1610 m, b = 1, b[1:] 1759 func (c *Conn) Read(b []byte) (n int, err error) { [all …]
|
A D | trust_anchor_tests.go | 20 b := cryptobyte.NewBuilder(nil) 22 addUint8LengthPrefixedBytes(b, id) 24 return base64FlagValue(b.BytesOrPanic())
|
A D | ems_tests.go | 62 boolToWord := func(b bool) string { 63 if b {
|
A D | mock_quic_transport.go | 144 func (m *mockQUICTransport) Write(b []byte) (int, error) { 148 func (m *mockQUICTransport) Read(b []byte) (int, error) {
|
A D | handshake_messages.go | 41 func addUint8LengthPrefixedBytes(b *cryptobyte.Builder, v []byte) { 42 b.AddUint8LengthPrefixed(func(child *cryptobyte.Builder) { child.AddBytes(v) }) 45 func addUint16LengthPrefixedBytes(b *cryptobyte.Builder, v []byte) { 46 b.AddUint16LengthPrefixed(func(child *cryptobyte.Builder) { child.AddBytes(v) }) 49 func addUint24LengthPrefixedBytes(b *cryptobyte.Builder, v []byte) { 185 func (f *flagSet) marshalExtension(b *cryptobyte.Builder) { 189 b.AddUint16(extensionTLSFlags) 190 b.AddUint16LengthPrefixed(func(value *cryptobyte.Builder) { 1126 for _, b := range body { 1127 if b != 0 { [all …]
|
A D | common.go | 2183 for _, b := range c.SessionTicketKey { 2184 if b != 0 { 2628 for _, b := range v { 2629 if b != 0 {
|
A D | key_agreement.go | 587 kem = &transformKEM{kem: kem, transform: func(b []byte) []byte { return b[:len(b)-1] }} 590 …kem = &transformKEM{kem: kem, transform: func(b []byte) []byte { return slices.Concat(b, []byte{0}…
|
A D | runner.go | 646 func (t *timeoutConn) Read(b []byte) (int, error) { 652 return t.Conn.Read(b) 655 func (t *timeoutConn) Write(b []byte) (int, error) { 661 return t.Conn.Write(b) 672 func expectedReply(b []byte) []byte { 673 ret := make([]byte, len(b)) 674 for i, v := range b {
|
/ssl/test/runner/kyber/ |
A D | kyber.go | 66 func lt(a, b uint32) uint32 { 67 return uint32(0 - int32(a^((a^b)|((a-b)^a)))>>31) 192 func (s *scalar) add(b *scalar) { 194 s[i] = reduceOnce(s[i] + b[i]) 260 b := uint16(entropy[i/2]) 263 value += (b & 1) + ((b >> 1) & 1) 264 value -= ((b >> 2) & 1) + ((b >> 3) & 1) 267 b >>= 4 269 value += (b & 1) + ((b >> 1) & 1) 270 value -= ((b >> 2) & 1) + ((b >> 3) & 1) [all …]
|
/ssl/test/ |
A D | fuzzer.h | 602 BIOData *b = new BIOData; in MakeBIO() local 603 b->protocol = protocol_; in MakeBIO() 604 CBS_init(&b->cbs, in, len); in MakeBIO() 608 BIO_set_data(bio.get(), b); in MakeBIO() 613 BIOData *b = reinterpret_cast<BIOData *>(BIO_get_data(bio)); in BIORead() local 614 if (b->protocol == kTLS) { in BIORead() 616 memcpy(out, CBS_data(&b->cbs), len); in BIORead() 617 CBS_skip(&b->cbs, len); in BIORead() 623 if (!CBS_get_u24_length_prefixed(&b->cbs, &packet)) { in BIORead() 632 BIOData *b = reinterpret_cast<BIOData *>(BIO_get_data(bio)); in BIODestroy() local [all …]
|
A D | handshake_util.cc | 217 char *b = buf; in Proxy() local 219 int written = BIO_write(socket, b, bytes); in Proxy() 232 b += written; in Proxy()
|
/ssl/ |
A D | ssl_internal_test.cc | 149 auto expect_bitmap = [](const DTLSMessageBitmap &b, in TEST() 151 EXPECT_EQ(ranges.empty(), b.IsComplete()); in TEST() 156 EXPECT_EQ(b.NextUnmarkedRange(start), r); in TEST() 160 EXPECT_EQ(b.NextUnmarkedRange(start), in TEST() 164 EXPECT_TRUE(b.NextUnmarkedRange(start).empty()); in TEST() 165 EXPECT_TRUE(b.NextUnmarkedRange(start + 1).empty()); in TEST() 166 EXPECT_TRUE(b.NextUnmarkedRange(start + 42).empty()); in TEST() 171 for (auto r = b.NextUnmarkedRange(0); !r.empty(); in TEST() 172 r = b.NextUnmarkedRange(r.end)) { in TEST()
|
A D | ssl_lib.cc | 159 static uint8_t hex_char_consttime(uint8_t b) { in hex_char_consttime() argument 160 declassify_assert(b < 16); in hex_char_consttime() 161 return constant_time_select_8(constant_time_lt_8(b, 10), b + '0', in hex_char_consttime() 162 b - 10 + 'a'); in hex_char_consttime() 171 for (uint8_t b : in) { in cbb_add_hex_consttime() local 172 *(out++) = hex_char_consttime(b >> 4); in cbb_add_hex_consttime() 173 *(out++) = hex_char_consttime(b & 0xf); in cbb_add_hex_consttime() 1444 if (b != NULL) { in SSL_get_rfd() 1445 BIO_get_fd(b, &ret); in SSL_get_rfd() 1453 if (b != NULL) { in SSL_get_wfd() [all …]
|
A D | encrypted_client_hello.cc | 345 for (uint8_t b : in.subspan(2)) { in is_hex_component() local 346 if (!OPENSSL_isxdigit(b)) { in is_hex_component() 357 for (uint8_t b : in) { in is_decimal_component() local 358 if (!('0' <= b && b <= '9')) { in is_decimal_component()
|
A D | ssl_file.cc | 30 static int xname_cmp(const X509_NAME *const *a, const X509_NAME *const *b) { in xname_cmp() argument 31 return X509_NAME_cmp(*a, *b); in xname_cmp()
|
A D | ssl_cipher.cc | 1191 const SSL_CIPHER *b) { in ssl_cipher_id_cmp() argument 1192 if (a->id > b->id) { in ssl_cipher_id_cmp() 1195 if (a->id < b->id) { in ssl_cipher_id_cmp()
|
A D | d1_both.cc | 54 static DTLSMessageBitmap::Range FirstUnmarkedRangeInByte(uint8_t b) { in FirstUnmarkedRangeInByte() argument 57 if ((b & (1u << start)) == 0) { in FirstUnmarkedRangeInByte() 62 if ((b & (1u << end)) != 0) { in FirstUnmarkedRangeInByte()
|
/ssl/test/runner/spake2plus/ |
A D | spake2plus_test.go | 25 b, err := hex.DecodeString(h) 29 return b 261 func bytesToBigInt(b []byte) *big.Int { 262 if len(b) == 0 { 265 return new(big.Int).SetBytes(b)
|
A D | spake2plus.go | 233 b := make([]byte, (params.BitSize+7)/8) 236 if _, err := rand.Read(b); err != nil { 239 k = new(big.Int).SetBytes(b)
|
/ssl/test/runner/hpke/ |
A D | hpke.go | 249 for i, b := range c.baseNonce { 250 nonce[i] ^= b 274 func appendBigEndianUint16(b []byte, v uint16) []byte { 275 return append(b, byte(v>>8), byte(v))
|