| line |
true |
false |
branch |
|
144
|
2117 |
2117 |
if (type == INIT_ENCRYPT_CIPHER) |
|
147
|
0 |
2117 |
if ((err = psAesInitGCM(&sec->encryptCtx.aesgcm, sec->writeKey, |
|
156
|
0 |
2117 |
if ((err = psAesInitGCM(&sec->decryptCtx.aesgcm, sec->readKey, |
|
174
|
4123 |
6288 |
if (len == 0) |
|
179
|
0 |
6288 |
if (len < 16 + 1) |
|
207
|
6288 |
0 |
if (seqNotDone) |
|
230
|
6288 |
0 |
for (i = 7; i >= 0; i--) |
|
233
|
6288 |
0 |
if (lssl->sec.seq[i] != 0) |
|
269
|
6287 |
0 |
if (seqNotDone) |
|
282
|
0 |
6287 |
if ((bytes = psAesDecryptGCM(ctx, ct, len, pt, len - TLS_GCM_TAG_LEN)) < 0) |
|
286
|
6287 |
0 |
for (i = 7; i >= 0; i--) |
|
289
|
6287 |
0 |
if (lssl->sec.remSeq[i] != 0) |
|
305
|
2 |
2 |
if (type == INIT_ENCRYPT_CIPHER) |
|
308
|
0 |
2 |
if ((err = psAesInitCBC(&sec->encryptCtx.aes, sec->writeIV, sec->writeKey, |
|
317
|
0 |
2 |
if ((err = psAesInitCBC(&sec->decryptCtx.aes, sec->readIV, sec->readKey, |
|
678
|
0 |
18972 |
if (out != in) |
|
688
|
8781 |
0 |
if (out != in) |
|
719
|
3 |
0 |
if (ssl->flags & SSL_FLAGS_TLS) |
|
722
|
3 |
0 |
if (ssl->nativeEnMacSize == SHA256_HASH_SIZE || |
|
|
0 |
3 |
if (ssl->nativeEnMacSize == SHA256_HASH_SIZE || |
|
761
|
3 |
0 |
if (ssl->flags & SSL_FLAGS_TLS) |
|
790
|
3 |
0 |
if (memcmpct(buf, mac, ssl->deMacSize) == 0) |
|
1757
|
6 |
7 |
if (ssl && !(ssl->flags & SSL_FLAGS_SERVER)) |
|
|
1 |
5 |
if (ssl && !(ssl->flags & SSL_FLAGS_SERVER)) |
|
1761
|
8 |
4 |
if (flags != PS_TRUE && flags != PS_FALSE) |
|
|
0 |
8 |
if (flags != PS_TRUE && flags != PS_FALSE) |
|
1765
|
216 |
2 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
|
1767
|
10 |
206 |
if (supportedCiphers[i].ident == cipherId) |
|
1769
|
6 |
4 |
if (ssl == NULL) |
|
1775
|
2 |
4 |
if (flags == PS_TRUE) |
|
1790
|
11 |
1 |
for (j = 0; j < SSL_MAX_DISABLED_CIPHERS; j++) |
|
1792
|
2 |
9 |
if (flags == PS_FALSE) |
|
1795
|
1 |
1 |
if (ssl->disabledCiphers[j] == 0x0 || |
|
|
1 |
0 |
if (ssl->disabledCiphers[j] == 0x0 || |
|
1804
|
1 |
8 |
if (ssl->disabledCiphers[j] == cipherId) |
|
1811
|
0 |
1 |
if (flags == PS_FALSE) |
|
1885
|
358331 |
0 |
while (cert) |
|
1887
|
358331 |
0 |
if (cert->pubKeyAlgorithm == keyAlg) |
|
1891
|
0 |
0 |
if (anyOrFirst == KEY_ALG_FIRST) |
|
1911
|
1147 |
0 |
if (spec->type == CS_PSK || spec->type == CS_DHE_PSK || |
|
|
1147 |
0 |
if (spec->type == CS_PSK || spec->type == CS_DHE_PSK || |
|
|
0 |
1147 |
if (spec->type == CS_PSK || spec->type == CS_DHE_PSK || |
|
1919
|
1147 |
0 |
if (ssl->flags & SSL_FLAGS_TLS_1_2) |
|
1925
|
1147 |
1147 |
while (crt) |
|
1933
|
1147 |
0 |
if (spec->type == CS_DHE_RSA || spec->type == CS_ECDHE_RSA || |
|
|
1 |
1146 |
if (spec->type == CS_DHE_RSA || spec->type == CS_ECDHE_RSA || |
|
|
0 |
1 |
if (spec->type == CS_DHE_RSA || spec->type == CS_ECDHE_RSA || |
|
1936
|
1146 |
0 |
if (crt->pubKeyAlgorithm == OID_RSA_KEY_ALG) |
|
1938
|
0 |
1146 |
if ( |
|
1940
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA1_RSA_MASK) && |
|
1943
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA384_RSA_MASK) && |
|
1946
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA512_RSA_MASK) && |
|
1954
|
0 |
1146 |
if (crt->pubKeyAlgorithm == OID_ECDSA_KEY_ALG) |
|
1956
|
0 |
0 |
if ( |
|
1958
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA1_ECDSA_MASK) && |
|
1961
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA384_ECDSA_MASK) && |
|
1964
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA512_ECDSA_MASK) && |
|
1980
|
0 |
1147 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA256_RSA_MASK)) |
|
1987
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA1_RSA_MASK)) |
|
1995
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA384_RSA_MASK)) |
|
2004
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA256_ECDSA_MASK)) |
|
2011
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA1_ECDSA_MASK)) |
|
2019
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA384_ECDSA_MASK)) |
|
2035
|
1147 |
0 |
if (spec->type == CS_ECDH_ECDSA || spec->type == CS_ECDH_RSA) |
|
|
0 |
1147 |
if (spec->type == CS_ECDH_ECDSA || spec->type == CS_ECDH_RSA) |
|
2037
|
0 |
0 |
if (ssl->ecInfo.ecFlags) |
|
2040
|
0 |
0 |
if (psTestUserEcID(crt->publicKey.key.ecc.curve->curveId, |
|
2071
|
1147 |
0 |
if (sigType == RSA_TYPE_SIG) |
|
2073
|
1147 |
0 |
if (cert->sigAlgorithm == OID_SHA1_RSA_SIG || |
|
|
0 |
1147 |
if (cert->sigAlgorithm == OID_SHA1_RSA_SIG || |
|
2074
|
0 |
0 |
cert->sigAlgorithm == OID_SHA256_RSA_SIG || |
|
2075
|
0 |
0 |
cert->sigAlgorithm == OID_SHA384_RSA_SIG || |
|
2076
|
0 |
0 |
cert->sigAlgorithm == OID_SHA512_RSA_SIG || |
|
2077
|
0 |
0 |
cert->sigAlgorithm == OID_MD5_RSA_SIG || |
|
2078
|
0 |
0 |
cert->sigAlgorithm == OID_MD2_RSA_SIG || |
|
2084
|
0 |
0 |
else if (sigType == ECDSA_TYPE_SIG) |
|
2086
|
0 |
0 |
if (cert->sigAlgorithm == OID_SHA1_ECDSA_SIG || |
|
|
0 |
0 |
if (cert->sigAlgorithm == OID_SHA1_ECDSA_SIG || |
|
2087
|
0 |
0 |
cert->sigAlgorithm == OID_SHA224_ECDSA_SIG || |
|
2088
|
0 |
0 |
cert->sigAlgorithm == OID_SHA256_ECDSA_SIG || |
|
2089
|
0 |
0 |
cert->sigAlgorithm == OID_SHA384_ECDSA_SIG || |
|
2119
|
0 |
402979 |
if (ssl->sni_cb && reallyTest == 0) |
|
|
0 |
0 |
if (ssl->sni_cb && reallyTest == 0) |
|
2129
|
269034 |
133945 |
if (cipherType == CS_RSA || cipherType == CS_DHE_RSA || |
|
|
179738 |
89296 |
if (cipherType == CS_RSA || cipherType == CS_DHE_RSA || |
|
|
44648 |
135090 |
if (cipherType == CS_RSA || cipherType == CS_DHE_RSA || |
|
2130
|
44648 |
0 |
cipherType == CS_ECDHE_RSA || cipherType == CS_ECDH_RSA || |
|
|
44648 |
0 |
cipherType == CS_ECDHE_RSA || cipherType == CS_ECDH_RSA || |
|
2131
|
0 |
44648 |
cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA) |
|
2133
|
1147 |
357184 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2136
|
1147 |
0 |
if (ssl->keys == NULL || ssl->keys->cert == NULL) |
|
|
0 |
1147 |
if (ssl->keys == NULL || ssl->keys->cert == NULL) |
|
2145
|
357184 |
0 |
if (ssl->keys == NULL || ssl->keys->CAcerts == NULL) |
|
|
0 |
357184 |
if (ssl->keys == NULL || ssl->keys->CAcerts == NULL) |
|
2154
|
133945 |
269034 |
if (cipherType == CS_RSA) |
|
2156
|
1 |
133944 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2159
|
0 |
1 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_RSA_KEY_ALG, |
|
2164
|
0 |
1 |
if (haveCorrectSigAlg(ssl->keys->cert, RSA_TYPE_SIG) < 0) |
|
2174
|
0 |
133944 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
|
2187
|
89296 |
313683 |
if (cipherType == CS_DHE_RSA) |
|
2189
|
0 |
89296 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2192
|
0 |
0 |
if (ssl->keys->dhParams.size == 0) |
|
2198
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_RSA_KEY_ALG, |
|
2208
|
0 |
89296 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
|
2221
|
0 |
402979 |
if (cipherType == CS_DH_ANON) |
|
2223
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2225
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
|
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
|
2234
|
44648 |
358331 |
if (cipherType == CS_DHE_PSK) |
|
2237
|
0 |
44648 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2239
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
|
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
|
2246
|
44648 |
0 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
|
2248
|
44648 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
|
|
44648 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
|
2261
|
135090 |
223241 |
if (cipherType == CS_ECDHE_RSA) |
|
2263
|
1146 |
133944 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2266
|
0 |
1146 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_RSA_KEY_ALG, |
|
2271
|
0 |
1146 |
if (haveCorrectSigAlg(ssl->keys->cert, RSA_TYPE_SIG) < 0) |
|
2280
|
0 |
133944 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
|
2292
|
0 |
358331 |
if (cipherType == CS_ECDH_RSA) |
|
2294
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2297
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_ECDSA_KEY_ALG, |
|
2302
|
0 |
0 |
if (haveCorrectSigAlg(ssl->keys->cert, RSA_TYPE_SIG) < 0) |
|
2311
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
|
2324
|
358331 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA) |
|
|
0 |
358331 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA) |
|
2326
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2329
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_ECDSA_KEY_ALG, |
|
2334
|
0 |
0 |
if (haveCorrectSigAlg(ssl->keys->cert, ECDSA_TYPE_SIG) < 0) |
|
2343
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_ECDSA_KEY_ALG, |
|
2355
|
0 |
358331 |
if (cipherType == CS_PSK) |
|
2357
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
|
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
|
2381
|
25216 |
17190 |
while (i <= j) { |
|
2382
|
27448 |
25216 |
while (v[i] > p) |
|
2384
|
33246 |
25216 |
while (v[j] < p) |
|
2387
|
20628 |
4588 |
if (i <= j) { |
|
2396
|
8018 |
9172 |
if (l < j) |
|
2398
|
8026 |
9164 |
if (i < r) |
|
2426
|
19479 |
1147 |
while ((cc < ec) && (cn < MAX_CIPHERS)) { |
|
|
19479 |
0 |
while ((cc < ec) && (cn < MAX_CIPHERS)) { |
|
2427
|
19479 |
0 |
if (ssl->rec.majVer > SSL2_MAJ_VER) { |
|
2443
|
1146 |
1 |
if (cn > 1) quick_sort_desc(ciphers, 0, cn - 1); |
|
2445
|
1147 |
0 |
while (i < cn) { |
|
2468
|
0 |
1147 |
if ((spec = sslGetCipherSpec(ssl, cipher)) == NULL) |
|
2473
|
0 |
1147 |
if (ssl->keys == NULL) |
|
2486
|
0 |
0 |
if (wantKey.keyType == CS_NULL && wantKey.dhParamsRequired == 0) |
|
|
0 |
0 |
if (wantKey.keyType == CS_NULL && wantKey.dhParamsRequired == 0) |
|
2516
|
0 |
0 |
if (givenKey == NULL) |
|
2526
|
0 |
0 |
if (haveKeyMaterial(ssl, spec->type, 1) < 0) |
|
2543
|
0 |
1147 |
if (ssl->expectedName) |
|
2547
|
0 |
0 |
if (matrixServerSetKeysSNI(ssl, ssl->expectedName, |
|
2557
|
0 |
0 |
if (haveKeyMaterial(ssl, spec->type, 1) < 0) |
|
2571
|
0 |
1147 |
if (validateKeyForExtensions(ssl, spec, givenKey) < 0) |
|
2586
|
0 |
0 |
psAssert(givenKey == NULL); |
|
2603
|
11162 |
1 |
if (cipherSpecLen == 0) |
|
2606
|
0 |
11162 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA) || |
|
2607
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA) || |
|
2608
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) || |
|
2609
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA) || |
|
2610
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA) || |
|
2611
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA) || |
|
2612
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA) || |
|
2614
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256) || |
|
2615
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384) || |
|
2616
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256) || |
|
2617
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384) || |
|
2618
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256) || |
|
2619
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384) || |
|
2620
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) || |
|
2621
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) || |
|
2622
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) || |
|
2623
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) || |
|
2624
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) || |
|
2625
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) || |
|
2626
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256) || |
|
2627
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384) || |
|
2628
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256) || |
|
2629
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384) || |
|
2630
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256) || |
|
2631
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256) || |
|
2640
|
1 |
1 |
while (i < cipherSpecLen) |
|
2642
|
1 |
0 |
if (cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA || |
|
|
1 |
0 |
if (cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA || |
|
2643
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA || |
|
2644
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA || |
|
2645
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA || |
|
2646
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA || |
|
2647
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA || |
|
2648
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA || |
|
2649
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_256_CBC_SHA || |
|
2651
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 || |
|
2652
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 || |
|
2653
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 || |
|
2654
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 || |
|
2655
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 || |
|
2656
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 || |
|
2657
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 || |
|
2658
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 || |
|
2659
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 || |
|
2660
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 || |
|
2661
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 || |
|
2662
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 || |
|
2663
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 || |
|
2664
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 || |
|
2665
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 || |
|
2666
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 || |
|
2667
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 || |
|
2668
|
0 |
1 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 || |
|
2685
|
1148 |
0 |
if (pubKey == PS_RSA) |
|
2687
|
1148 |
0 |
if (cipherType == CS_DHE_RSA || cipherType == CS_RSA || |
|
|
1147 |
1 |
if (cipherType == CS_DHE_RSA || cipherType == CS_RSA || |
|
|
1147 |
0 |
if (cipherType == CS_DHE_RSA || cipherType == CS_RSA || |
|
2693
|
0 |
0 |
if (pubKey == PS_ECC) |
|
2695
|
0 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA || |
|
|
0 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA || |
|
|
0 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA || |
|
2718
|
0 |
0 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
|
2720
|
0 |
0 |
if (supportedCiphers[i].ident == id) |
|
2749
|
904013 |
35772 |
if (supportedCiphers[i].ident != id) |
|
2788
|
0 |
35772 |
if (disabledCipherFlags[i >> 5] & (1 << (i & 31))) |
|
2795
|
13458 |
22314 |
if (id != 0) /* Disable NULL_WITH_NULL_NULL not possible */ |
|
2797
|
107664 |
13458 |
for (j = 0; j < SSL_MAX_DISABLED_CIPHERS; j++) |
|
2799
|
0 |
107664 |
if (ssl->disabledCiphers[j] == id) |
|
2825
|
22314 |
13458 |
if (ssl->minVer < TLS_1_2_MIN_VER) |
|
2827
|
22314 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
|
0 |
22314 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
2835
|
13458 |
22314 |
if (ssl->minVer == TLS_1_2_MIN_VER) |
|
2837
|
0 |
13458 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_MD5) |
|
2860
|
0 |
35772 |
if (ssl->flags & SSL_FLAGS_HTTP2) |
|
2863
|
0 |
0 |
if (!(supportedCiphers[i].flags & CRYPTO_FLAGS_GCM) && |
|
|
0 |
0 |
if (!(supportedCiphers[i].flags & CRYPTO_FLAGS_GCM) && |
|
2870
|
0 |
0 |
switch (supportedCiphers[i].type) |
|
2884
|
35772 |
0 |
if (ssl->keys != NULL) |
|
2886
|
34625 |
1147 |
if ((ssl->flags & SSL_FLAGS_SERVER) == 0) |
|
2892
|
1147 |
0 |
if (haveKeyMaterial(ssl, supportedCiphers[i].type, 0) |
|
2908
|
881688 |
22325 |
while (supportedCiphers[i++].ident != SSL_NULL_WITH_NULL_NULL); |
|
2927
|
0 |
11162 |
if (len < 4) |
|
2935
|
200916 |
11162 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
|
2937
|
0 |
200916 |
if (end - c < 2) |
|
2958
|
0 |
200916 |
if (ssl->minVer != TLS_1_2_MIN_VER) |
|
2960
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
2972
|
22324 |
178592 |
if (haveKeyMaterial(ssl, supportedCiphers[i].type, 0) != PS_SUCCESS) |
|
2984
|
11156 |
6 |
if (addScsv == 1) |
|
2989
|
0 |
11156 |
if (end - c < 2) |
|
3001
|
0 |
11162 |
if (ssl->extFlags.req_fallback_scsv) |
|
3005
|
0 |
0 |
if (end - c < 2) |
|
3030
|
200916 |
11162 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
|
3049
|
0 |
200916 |
if (ssl->minVer != TLS_1_2_MIN_VER) |
|
3051
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
3063
|
22324 |
178592 |
if (haveKeyMaterial(ssl, supportedCiphers[i].type, 0) != PS_SUCCESS) |
|
3086
|
0 |
2299 |
if (ssl->cipher->type == CS_DHE_RSA) |
|
3099
|
0 |
2299 |
if (ssl->cipher->type == CS_DHE_PSK) |
|
3105
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
3107
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_CLIENT_AUTH) |
|
3119
|
2297 |
2 |
if (ssl->cipher->type == CS_ECDHE_RSA) |
|
3125
|
0 |
2299 |
if (ssl->cipher->type == CS_ECDHE_ECDSA) |
|
3134
|
0 |
2299 |
if (ssl->cipher->type == CS_DH_ANON) |
|
3144
|
0 |
2299 |
if (ssl->cipher->type == CS_ECDH_ECDSA) |
|
3148
|
0 |
2299 |
if (ssl->cipher->type == CS_ECDH_RSA) |
|
3155
|
0 |
2299 |
if (ssl->cipher->type == CS_PSK) |
|
3159
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
3161
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_CLIENT_AUTH) |