line |
true |
false |
branch |
144
|
2117 |
2117 |
if (type == INIT_ENCRYPT_CIPHER) |
147
|
0 |
2117 |
if ((err = psAesInitGCM(&sec->encryptCtx.aesgcm, sec->writeKey, |
156
|
0 |
2117 |
if ((err = psAesInitGCM(&sec->decryptCtx.aesgcm, sec->readKey, |
174
|
4123 |
6288 |
if (len == 0) |
179
|
0 |
6288 |
if (len < 16 + 1) |
207
|
6288 |
0 |
if (seqNotDone) |
230
|
6288 |
0 |
for (i = 7; i >= 0; i--) |
233
|
6288 |
0 |
if (lssl->sec.seq[i] != 0) |
269
|
6287 |
0 |
if (seqNotDone) |
282
|
0 |
6287 |
if ((bytes = psAesDecryptGCM(ctx, ct, len, pt, len - TLS_GCM_TAG_LEN)) < 0) |
286
|
6287 |
0 |
for (i = 7; i >= 0; i--) |
289
|
6287 |
0 |
if (lssl->sec.remSeq[i] != 0) |
305
|
2 |
2 |
if (type == INIT_ENCRYPT_CIPHER) |
308
|
0 |
2 |
if ((err = psAesInitCBC(&sec->encryptCtx.aes, sec->writeIV, sec->writeKey, |
317
|
0 |
2 |
if ((err = psAesInitCBC(&sec->decryptCtx.aes, sec->readIV, sec->readKey, |
678
|
0 |
18972 |
if (out != in) |
688
|
8781 |
0 |
if (out != in) |
719
|
3 |
0 |
if (ssl->flags & SSL_FLAGS_TLS) |
722
|
3 |
0 |
if (ssl->nativeEnMacSize == SHA256_HASH_SIZE || |
|
0 |
3 |
if (ssl->nativeEnMacSize == SHA256_HASH_SIZE || |
761
|
3 |
0 |
if (ssl->flags & SSL_FLAGS_TLS) |
790
|
3 |
0 |
if (memcmpct(buf, mac, ssl->deMacSize) == 0) |
1757
|
6 |
7 |
if (ssl && !(ssl->flags & SSL_FLAGS_SERVER)) |
|
1 |
5 |
if (ssl && !(ssl->flags & SSL_FLAGS_SERVER)) |
1761
|
8 |
4 |
if (flags != PS_TRUE && flags != PS_FALSE) |
|
0 |
8 |
if (flags != PS_TRUE && flags != PS_FALSE) |
1765
|
216 |
2 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
1767
|
10 |
206 |
if (supportedCiphers[i].ident == cipherId) |
1769
|
6 |
4 |
if (ssl == NULL) |
1775
|
2 |
4 |
if (flags == PS_TRUE) |
1790
|
11 |
1 |
for (j = 0; j < SSL_MAX_DISABLED_CIPHERS; j++) |
1792
|
2 |
9 |
if (flags == PS_FALSE) |
1795
|
1 |
1 |
if (ssl->disabledCiphers[j] == 0x0 || |
|
1 |
0 |
if (ssl->disabledCiphers[j] == 0x0 || |
1804
|
1 |
8 |
if (ssl->disabledCiphers[j] == cipherId) |
1811
|
0 |
1 |
if (flags == PS_FALSE) |
1885
|
358331 |
0 |
while (cert) |
1887
|
358331 |
0 |
if (cert->pubKeyAlgorithm == keyAlg) |
1891
|
0 |
0 |
if (anyOrFirst == KEY_ALG_FIRST) |
1911
|
1147 |
0 |
if (spec->type == CS_PSK || spec->type == CS_DHE_PSK || |
|
1147 |
0 |
if (spec->type == CS_PSK || spec->type == CS_DHE_PSK || |
|
0 |
1147 |
if (spec->type == CS_PSK || spec->type == CS_DHE_PSK || |
1919
|
1147 |
0 |
if (ssl->flags & SSL_FLAGS_TLS_1_2) |
1925
|
1147 |
1147 |
while (crt) |
1933
|
1147 |
0 |
if (spec->type == CS_DHE_RSA || spec->type == CS_ECDHE_RSA || |
|
1 |
1146 |
if (spec->type == CS_DHE_RSA || spec->type == CS_ECDHE_RSA || |
|
0 |
1 |
if (spec->type == CS_DHE_RSA || spec->type == CS_ECDHE_RSA || |
1936
|
1146 |
0 |
if (crt->pubKeyAlgorithm == OID_RSA_KEY_ALG) |
1938
|
0 |
1146 |
if ( |
1940
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA1_RSA_MASK) && |
1943
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA384_RSA_MASK) && |
1946
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA512_RSA_MASK) && |
1954
|
0 |
1146 |
if (crt->pubKeyAlgorithm == OID_ECDSA_KEY_ALG) |
1956
|
0 |
0 |
if ( |
1958
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA1_ECDSA_MASK) && |
1961
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA384_ECDSA_MASK) && |
1964
|
0 |
0 |
!(ssl->hashSigAlg & HASH_SIG_SHA512_ECDSA_MASK) && |
1980
|
0 |
1147 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA256_RSA_MASK)) |
1987
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA1_RSA_MASK)) |
1995
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA384_RSA_MASK)) |
2004
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA256_ECDSA_MASK)) |
2011
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA1_ECDSA_MASK)) |
2019
|
0 |
0 |
if (!(ssl->hashSigAlg & HASH_SIG_SHA384_ECDSA_MASK)) |
2035
|
1147 |
0 |
if (spec->type == CS_ECDH_ECDSA || spec->type == CS_ECDH_RSA) |
|
0 |
1147 |
if (spec->type == CS_ECDH_ECDSA || spec->type == CS_ECDH_RSA) |
2037
|
0 |
0 |
if (ssl->ecInfo.ecFlags) |
2040
|
0 |
0 |
if (psTestUserEcID(crt->publicKey.key.ecc.curve->curveId, |
2071
|
1147 |
0 |
if (sigType == RSA_TYPE_SIG) |
2073
|
1147 |
0 |
if (cert->sigAlgorithm == OID_SHA1_RSA_SIG || |
|
0 |
1147 |
if (cert->sigAlgorithm == OID_SHA1_RSA_SIG || |
2074
|
0 |
0 |
cert->sigAlgorithm == OID_SHA256_RSA_SIG || |
2075
|
0 |
0 |
cert->sigAlgorithm == OID_SHA384_RSA_SIG || |
2076
|
0 |
0 |
cert->sigAlgorithm == OID_SHA512_RSA_SIG || |
2077
|
0 |
0 |
cert->sigAlgorithm == OID_MD5_RSA_SIG || |
2078
|
0 |
0 |
cert->sigAlgorithm == OID_MD2_RSA_SIG || |
2084
|
0 |
0 |
else if (sigType == ECDSA_TYPE_SIG) |
2086
|
0 |
0 |
if (cert->sigAlgorithm == OID_SHA1_ECDSA_SIG || |
|
0 |
0 |
if (cert->sigAlgorithm == OID_SHA1_ECDSA_SIG || |
2087
|
0 |
0 |
cert->sigAlgorithm == OID_SHA224_ECDSA_SIG || |
2088
|
0 |
0 |
cert->sigAlgorithm == OID_SHA256_ECDSA_SIG || |
2089
|
0 |
0 |
cert->sigAlgorithm == OID_SHA384_ECDSA_SIG || |
2119
|
0 |
402979 |
if (ssl->sni_cb && reallyTest == 0) |
|
0 |
0 |
if (ssl->sni_cb && reallyTest == 0) |
2129
|
269034 |
133945 |
if (cipherType == CS_RSA || cipherType == CS_DHE_RSA || |
|
179738 |
89296 |
if (cipherType == CS_RSA || cipherType == CS_DHE_RSA || |
|
44648 |
135090 |
if (cipherType == CS_RSA || cipherType == CS_DHE_RSA || |
2130
|
44648 |
0 |
cipherType == CS_ECDHE_RSA || cipherType == CS_ECDH_RSA || |
|
44648 |
0 |
cipherType == CS_ECDHE_RSA || cipherType == CS_ECDH_RSA || |
2131
|
0 |
44648 |
cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA) |
2133
|
1147 |
357184 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2136
|
1147 |
0 |
if (ssl->keys == NULL || ssl->keys->cert == NULL) |
|
0 |
1147 |
if (ssl->keys == NULL || ssl->keys->cert == NULL) |
2145
|
357184 |
0 |
if (ssl->keys == NULL || ssl->keys->CAcerts == NULL) |
|
0 |
357184 |
if (ssl->keys == NULL || ssl->keys->CAcerts == NULL) |
2154
|
133945 |
269034 |
if (cipherType == CS_RSA) |
2156
|
1 |
133944 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2159
|
0 |
1 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_RSA_KEY_ALG, |
2164
|
0 |
1 |
if (haveCorrectSigAlg(ssl->keys->cert, RSA_TYPE_SIG) < 0) |
2174
|
0 |
133944 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
2187
|
89296 |
313683 |
if (cipherType == CS_DHE_RSA) |
2189
|
0 |
89296 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2192
|
0 |
0 |
if (ssl->keys->dhParams.size == 0) |
2198
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_RSA_KEY_ALG, |
2208
|
0 |
89296 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
2221
|
0 |
402979 |
if (cipherType == CS_DH_ANON) |
2223
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2225
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
2234
|
44648 |
358331 |
if (cipherType == CS_DHE_PSK) |
2237
|
0 |
44648 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2239
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->dhParams.size == 0) |
2246
|
44648 |
0 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
2248
|
44648 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
|
44648 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
2261
|
135090 |
223241 |
if (cipherType == CS_ECDHE_RSA) |
2263
|
1146 |
133944 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2266
|
0 |
1146 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_RSA_KEY_ALG, |
2271
|
0 |
1146 |
if (haveCorrectSigAlg(ssl->keys->cert, RSA_TYPE_SIG) < 0) |
2280
|
0 |
133944 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
2292
|
0 |
358331 |
if (cipherType == CS_ECDH_RSA) |
2294
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2297
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_ECDSA_KEY_ALG, |
2302
|
0 |
0 |
if (haveCorrectSigAlg(ssl->keys->cert, RSA_TYPE_SIG) < 0) |
2311
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_RSA_KEY_ALG, |
2324
|
358331 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA) |
|
0 |
358331 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA) |
2326
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2329
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->cert, OID_ECDSA_KEY_ALG, |
2334
|
0 |
0 |
if (haveCorrectSigAlg(ssl->keys->cert, ECDSA_TYPE_SIG) < 0) |
2343
|
0 |
0 |
if (haveCorrectKeyAlg(ssl->keys->CAcerts, OID_ECDSA_KEY_ALG, |
2355
|
0 |
358331 |
if (cipherType == CS_PSK) |
2357
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
|
0 |
0 |
if (ssl->keys == NULL || ssl->keys->pskKeys == NULL) |
2381
|
25216 |
17190 |
while (i <= j) { |
2382
|
27448 |
25216 |
while (v[i] > p) |
2384
|
33246 |
25216 |
while (v[j] < p) |
2387
|
20628 |
4588 |
if (i <= j) { |
2396
|
8018 |
9172 |
if (l < j) |
2398
|
8026 |
9164 |
if (i < r) |
2426
|
19479 |
1147 |
while ((cc < ec) && (cn < MAX_CIPHERS)) { |
|
19479 |
0 |
while ((cc < ec) && (cn < MAX_CIPHERS)) { |
2427
|
19479 |
0 |
if (ssl->rec.majVer > SSL2_MAJ_VER) { |
2443
|
1146 |
1 |
if (cn > 1) quick_sort_desc(ciphers, 0, cn - 1); |
2445
|
1147 |
0 |
while (i < cn) { |
2468
|
0 |
1147 |
if ((spec = sslGetCipherSpec(ssl, cipher)) == NULL) |
2473
|
0 |
1147 |
if (ssl->keys == NULL) |
2486
|
0 |
0 |
if (wantKey.keyType == CS_NULL && wantKey.dhParamsRequired == 0) |
|
0 |
0 |
if (wantKey.keyType == CS_NULL && wantKey.dhParamsRequired == 0) |
2516
|
0 |
0 |
if (givenKey == NULL) |
2526
|
0 |
0 |
if (haveKeyMaterial(ssl, spec->type, 1) < 0) |
2543
|
0 |
1147 |
if (ssl->expectedName) |
2547
|
0 |
0 |
if (matrixServerSetKeysSNI(ssl, ssl->expectedName, |
2557
|
0 |
0 |
if (haveKeyMaterial(ssl, spec->type, 1) < 0) |
2571
|
0 |
1147 |
if (validateKeyForExtensions(ssl, spec, givenKey) < 0) |
2586
|
0 |
0 |
psAssert(givenKey == NULL); |
2603
|
11162 |
1 |
if (cipherSpecLen == 0) |
2606
|
0 |
11162 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA) || |
2607
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA) || |
2608
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) || |
2609
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA) || |
2610
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA) || |
2611
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA) || |
2612
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA) || |
2614
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256) || |
2615
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384) || |
2616
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256) || |
2617
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384) || |
2618
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256) || |
2619
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384) || |
2620
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) || |
2621
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) || |
2622
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) || |
2623
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) || |
2624
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) || |
2625
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) || |
2626
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256) || |
2627
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384) || |
2628
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256) || |
2629
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384) || |
2630
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256) || |
2631
|
0 |
0 |
sslGetCipherSpec(ssl, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256) || |
2640
|
1 |
1 |
while (i < cipherSpecLen) |
2642
|
1 |
0 |
if (cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA || |
|
1 |
0 |
if (cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA || |
2643
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA || |
2644
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA || |
2645
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA || |
2646
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA || |
2647
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA || |
2648
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA || |
2649
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_256_CBC_SHA || |
2651
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 || |
2652
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 || |
2653
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 || |
2654
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 || |
2655
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 || |
2656
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 || |
2657
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 || |
2658
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 || |
2659
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 || |
2660
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 || |
2661
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 || |
2662
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 || |
2663
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 || |
2664
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 || |
2665
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 || |
2666
|
1 |
0 |
cipherSpecs[i] == TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 || |
2667
|
1 |
0 |
cipherSpecs[i] == TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 || |
2668
|
0 |
1 |
cipherSpecs[i] == TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 || |
2685
|
1148 |
0 |
if (pubKey == PS_RSA) |
2687
|
1148 |
0 |
if (cipherType == CS_DHE_RSA || cipherType == CS_RSA || |
|
1147 |
1 |
if (cipherType == CS_DHE_RSA || cipherType == CS_RSA || |
|
1147 |
0 |
if (cipherType == CS_DHE_RSA || cipherType == CS_RSA || |
2693
|
0 |
0 |
if (pubKey == PS_ECC) |
2695
|
0 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA || |
|
0 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA || |
|
0 |
0 |
if (cipherType == CS_ECDHE_ECDSA || cipherType == CS_ECDH_ECDSA || |
2718
|
0 |
0 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
2720
|
0 |
0 |
if (supportedCiphers[i].ident == id) |
2749
|
904013 |
35772 |
if (supportedCiphers[i].ident != id) |
2788
|
0 |
35772 |
if (disabledCipherFlags[i >> 5] & (1 << (i & 31))) |
2795
|
13458 |
22314 |
if (id != 0) /* Disable NULL_WITH_NULL_NULL not possible */ |
2797
|
107664 |
13458 |
for (j = 0; j < SSL_MAX_DISABLED_CIPHERS; j++) |
2799
|
0 |
107664 |
if (ssl->disabledCiphers[j] == id) |
2825
|
22314 |
13458 |
if (ssl->minVer < TLS_1_2_MIN_VER) |
2827
|
22314 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
0 |
22314 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
2835
|
13458 |
22314 |
if (ssl->minVer == TLS_1_2_MIN_VER) |
2837
|
0 |
13458 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_MD5) |
2860
|
0 |
35772 |
if (ssl->flags & SSL_FLAGS_HTTP2) |
2863
|
0 |
0 |
if (!(supportedCiphers[i].flags & CRYPTO_FLAGS_GCM) && |
|
0 |
0 |
if (!(supportedCiphers[i].flags & CRYPTO_FLAGS_GCM) && |
2870
|
0 |
0 |
switch (supportedCiphers[i].type) |
2884
|
35772 |
0 |
if (ssl->keys != NULL) |
2886
|
34625 |
1147 |
if ((ssl->flags & SSL_FLAGS_SERVER) == 0) |
2892
|
1147 |
0 |
if (haveKeyMaterial(ssl, supportedCiphers[i].type, 0) |
2908
|
881688 |
22325 |
while (supportedCiphers[i++].ident != SSL_NULL_WITH_NULL_NULL); |
2927
|
0 |
11162 |
if (len < 4) |
2935
|
200916 |
11162 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
2937
|
0 |
200916 |
if (end - c < 2) |
2958
|
0 |
200916 |
if (ssl->minVer != TLS_1_2_MIN_VER) |
2960
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
2972
|
22324 |
178592 |
if (haveKeyMaterial(ssl, supportedCiphers[i].type, 0) != PS_SUCCESS) |
2984
|
11156 |
6 |
if (addScsv == 1) |
2989
|
0 |
11156 |
if (end - c < 2) |
3001
|
0 |
11162 |
if (ssl->extFlags.req_fallback_scsv) |
3005
|
0 |
0 |
if (end - c < 2) |
3030
|
200916 |
11162 |
for (i = 0; supportedCiphers[i].ident != SSL_NULL_WITH_NULL_NULL; i++) |
3049
|
0 |
200916 |
if (ssl->minVer != TLS_1_2_MIN_VER) |
3051
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
|
0 |
0 |
if (supportedCiphers[i].flags & CRYPTO_FLAGS_SHA3 || |
3063
|
22324 |
178592 |
if (haveKeyMaterial(ssl, supportedCiphers[i].type, 0) != PS_SUCCESS) |
3086
|
0 |
2299 |
if (ssl->cipher->type == CS_DHE_RSA) |
3099
|
0 |
2299 |
if (ssl->cipher->type == CS_DHE_PSK) |
3105
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
3107
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_CLIENT_AUTH) |
3119
|
2297 |
2 |
if (ssl->cipher->type == CS_ECDHE_RSA) |
3125
|
0 |
2299 |
if (ssl->cipher->type == CS_ECDHE_ECDSA) |
3134
|
0 |
2299 |
if (ssl->cipher->type == CS_DH_ANON) |
3144
|
0 |
2299 |
if (ssl->cipher->type == CS_ECDH_ECDSA) |
3148
|
0 |
2299 |
if (ssl->cipher->type == CS_ECDH_RSA) |
3155
|
0 |
2299 |
if (ssl->cipher->type == CS_PSK) |
3159
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_SERVER) |
3161
|
0 |
0 |
if (ssl->flags & SSL_FLAGS_CLIENT_AUTH) |