TlsUtils

Class files must be compiled with debug information to show line coverage.

Class files must be compiled with debug information to link with source files.

ElementMissed InstructionsCov.Missed BranchesCov.MissedCxtyMissedMethods
Total7,661 of 7,6610%1,160 of 1,1600%957957317317
createCertSigAlgOIDs()2270%n/a1111
selectPreSharedKey(TlsServerContext, TlsServer, Hashtable, HandshakeMessageInput, TlsHandshakeHash, boolean)1330%140%8811
createDefaultSupportedSigAlgs()1140%n/a1111
getPRFAlgorithm(SecurityParameters, int)1080%360%222211
verifyCertificateVerifyClient(TlsServerContext, CertificateRequest, DigitallySigned, TlsHandshakeHash)950%80%5511
isSupportedKeyExchange(TlsCrypto, int)890%400%262611
checkSigAlgOfServerCerts(TlsContext, TlsCertificate[])890%200%111111
calculateEndPointHash(TlsContext, TlsCertificate, byte[], int, int)810%210%121211
checkSigAlgOfClientCerts(TlsContext, TlsCertificate[])800%140%8811
receiveServerCertificate(TlsClientContext, TlsClient, ByteArrayInputStream)790%120%7711
createKeyExchangeServer(TlsServer, int)780%120%121211
checkTlsFeatures(Certificate, Hashtable, Hashtable)780%140%8811
addPreSharedKeyToClientHelloRetry(TlsClientContext, OfferedPsks.BindersConfig, Hashtable)780%60%4411
writeUint64(long, byte[], int)770%n/a1111
getCertSigAndHashAlg(TlsCertificate, TlsCertificate)770%240%131311
verifyServerKeyExchangeSignature(TlsContext, InputStream, TlsCertificate, DigestInputBuffer)760%80%5511
chooseSignatureAndHashAlgorithm(ProtocolVersion, Vector, short)700%220%121211
establish13PhaseSecrets(TlsContext, TlsSecret, TlsSecret)680%60%4411
receive13ServerCertificate(TlsClientContext, TlsClient, ByteArrayInputStream)660%80%5511
createKeyExchangeClient(TlsClient, int)650%110%111111
isPermittedExtensionType13(int, int)630%300%202011
getEncryptionAlgorithm(int)620%300%303011
negotiatedCipherSuite(SecurityParameters, int)620%80%5511
collectKeyShares(TlsCrypto, int[], Vector, Hashtable, Vector)600%140%8811
verify13CertificateVerify(Vector, String, TlsHandshakeHash, TlsCertificate, CertificateVerify)590%20%2211
writeUint48(long, byte[], int)570%n/a1111
getCommonCipherSuites(int[], int[], boolean)570%100%6611
getPSKExternalsClient(TlsClient, int[])570%80%5511
writeUint64(long, OutputStream)550%n/a1111
calculateVerifyData(TlsContext, TlsHandshakeHash, boolean)550%80%5511
getUsableSignatureAlgorithms(Vector)550%80%5511
generate13CertificateVerify(TlsCrypto, TlsCredentialedSigner, String, TlsHandshakeHash, SignatureAndHashAlgorithm)530%20%2211
getNamedGroupRoles(Vector)530%70%6611
decodeUint8ArrayWithUint8Length(byte[])510%80%5511
decodeUint16ArrayWithUint8Length(byte[])510%80%5511
processServerCertificate(TlsClientContext, CertificateStatus, TlsKeyExchange, TlsAuthentication, Hashtable, Hashtable)510%80%5511
encodeSupportedSignatureAlgorithms(Vector, OutputStream)500%100%6611
createKeyShareSimple(TlsCrypto, int, boolean)500%140%8811
addPreSharedKeyToClientHello(TlsClientContext, TlsClient, Hashtable, int[])490%60%4411
createKeyShare(TlsCrypto, int, boolean)480%80%5511
getCertificateVerifyHeader(String)470%40%3311
selectKeyShareGroup(TlsCrypto, ProtocolVersion, int[], int[], boolean)460%160%9911
addKeyShareToClientHelloRetry(TlsClientContext, Hashtable, int)450%40%3311
readUint32(byte[], int)440%n/a1111
getKeyExchangeAlgorithm(int)440%210%212111
parseSupportedSignatureAlgorithms(InputStream)430%80%5511
generateCertificateVerifyClient(TlsClientContext, TlsCredentialedSigner, SignatureAndHashAlgorithm, TlsStreamSigner, TlsHandshakeHash)430%60%4411
validateCredentials(TlsCredentials)420%100%6611
writeUint48(long, OutputStream)410%n/a1111
selectPreSharedKeyMode(short[], short[], boolean)410%140%8811
decodeOpaque8(byte[], int)400%80%5511
decodeOpaque16(byte[], int)400%80%5511
readInt32(byte[], int)390%n/a1111
writeGMTUnixTime(byte[], int)380%n/a1111
generateServerKeyExchangeSignature(TlsContext, TlsCredentialedSigner, DigestInputBuffer)380%20%2211
addKeyShareToClientHello(TlsClientContext, TlsClient, Hashtable)380%40%3311
writeUint32(long, byte[], int)370%n/a1111
isValidCipherSuiteForSignatureAlgorithms(int, Vector)370%80%5511
calculateExporterSeed(SecurityParameters, byte[])360%40%3311
getPRFAlgorithms13(int[])360%60%4411
getSupportedCipherSuites(TlsCrypto, int[], int, int)360%60%4411
adjustTranscriptForRetry(TlsHandshakeHash)360%n/a1111
processClientCertificateTypeExtension(Hashtable, Hashtable, short)360%80%5511
processServerCertificateTypeExtension(Hashtable, Hashtable, short)360%80%5511
readUint32(InputStream)350%20%2211
verifySupportedSignatureAlgorithm(Vector, SignatureAndHashAlgorithm, short)350%120%7711
calculateSignatureHash(TlsContext, SignatureAndHashAlgorithm, DigestInputBuffer)350%20%2211
isSupportedCipherSuite(TlsCrypto, int)350%120%7711
processClientCertificate(TlsServerContext, Certificate, TlsKeyExchange, TlsServer)350%60%4411
areCertificatesEqual(Certificate, Certificate)350%60%4411
checkExtensionData13(Hashtable, int, short)350%60%4411
getCommonCipherSuite13(ProtocolVersion, int[], int[], boolean)340%80%5511
retainAll(short[], short[])340%40%3311
addPreSharedKeyToClientExtensions(TlsPSK[], Hashtable)340%20%2211
writeDowngradeMarker(ProtocolVersion, byte[])330%40%3311
generate13CertificateVerify(TlsContext, TlsCredentialedSigner, TlsHandshakeHash)320%40%3311
hasAnyRSASigAlgs(TlsCrypto)320%140%8811
calculatePSKBinder(TlsCrypto, boolean, int, TlsSecret, byte[])310%20%2211
initCipher(TlsContext)310%40%3311
readUint24(byte[], int)300%n/a1111
constantTimeAreEqual(int, byte[], int, byte[], int)300%40%3311
isValidSignatureAlgorithmForServerKeyExchange(short, int)300%130%9911
trackHashAlgorithms(TlsHandshakeHash, Vector)290%60%4411
getKeyExchangeAlgorithms(int[])290%40%3311
isValidVersionForCipherSuite(int, ProtocolVersion)290%80%5511
update13TrafficSecret(TlsContext, boolean)280%40%3311
writeUint32(long, OutputStream)270%n/a1111
readASN1Object(byte[])270%40%3311
getSupportedSignatureAlgorithms(TlsContext, Vector)270%20%2211
calculateMasterSecret(TlsContext, TlsSecret)270%20%2211
getOIDForHashAlgorithm(short)270%70%7711
normalizeCertificateRequest(CertificateRequest, short[])270%40%3311
findEarlyKeyShare(Vector, int)270%80%5511
negotiatedVersion(SecurityParameters)270%60%4411
getPSKIndices(TlsPSK[], int)270%40%3311
static {...}260%n/a1111
readUint24(InputStream)250%20%2211
readAllOrNothing(int, InputStream)250%60%4411
getLegacySupportedSignatureAlgorithms()250%n/a1111
establish13TrafficSecrets(TlsContext, byte[], TlsSecret, String, String, RecordStream)250%20%2211
writeUint24(int, byte[], int)240%n/a1111
isNullOrContainsNull(Object[])240%60%4411
concat(byte[], byte[])240%n/a1111
establish13PhaseEarly(TlsContext, byte[], RecordStream)240%20%2211
validateCertificateRequest(CertificateRequest, TlsKeyExchange)240%40%3311
supportsKeyShareGroupSimple(TlsCrypto, int)240%80%5511
encodeOpaque16(byte[])230%n/a1111
encodeOpaque24(byte[])230%n/a1111
getRetryKeyShare(Vector, int)230%80%5511
getPSKEarlySecrets(TlsCrypto, TlsPSK[])230%20%2211
readUint48(byte[], int)220%n/a1111
establish13PhaseHandshake(TlsContext, byte[], RecordStream)220%n/a1111
containsSignatureAlgorithm(Vector, SignatureAndHashAlgorithm)210%40%3311
containsAnySignatureAlgorithm(Vector, short)210%40%3311
establish13PhaseApplication(TlsContext, byte[], RecordStream)210%n/a1111
isSupportedNamedGroup(TlsCrypto, int)210%60%4411
containsNonAscii(byte[])210%40%3311
supportsKeyShareGroup(TlsCrypto, int)210%60%4411
establishServerSigAlgs(SecurityParameters, CertificateRequest)210%20%2211
getSessionMasterSecret(TlsCrypto, TlsSecret)210%40%3311
processMaxFragmentLengthExtension(Hashtable, Hashtable, short)210%80%5511
decodeUint8(byte[])200%40%3311
decodeUint16(byte[])200%40%3311
decodeUint32(byte[])200%40%3311
isValidKeyShareSelection(ProtocolVersion, int[], Hashtable, int)200%80%5511
skip13ServerCertificate(TlsClientContext)200%20%2211
getSessionID(TlsSession)200%80%5511
negotiatedVersionDTLSClient(TlsClientContext, TlsClient)200%20%2211
negotiatedVersionTLSClient(TlsClientContext, TlsClient)200%20%2211
readUint16(byte[], int)190%n/a1111
readFully(int, InputStream)190%40%3311
isExtendedMasterSecretOptional(ProtocolVersion)190%60%4411
isExtendedMasterSecretOptional(ProtocolVersion[])190%60%4411
calculateFinishedHMAC(int, int, TlsSecret, byte[])190%n/a1111
checkDowngradeMarker(byte[], byte[])190%20%2211
containsNonAscii(String)190%40%3311
writeOpaque8(byte[], byte[], int)180%n/a1111
writeOpaque16(byte[], byte[], int)180%n/a1111
writeOpaque24(byte[], byte[], int)180%n/a1111
writeUint16ArrayWithUint8Length(int[], byte[], int)180%n/a1111
writeUint16ArrayWithUint16Length(int[], byte[], int)180%n/a1111
readUint16(InputStream)180%20%2211
readUint48(InputStream)180%n/a1111
readOpaque8(InputStream, int, int)180%40%3311
addToSet(Vector, int)180%40%3311
hasExpectedEmptyExtensionData(Hashtable, Integer, short)180%40%3311
sendSignatureInput(TlsContext, DigestInputBuffer, OutputStream)180%n/a1111
verify13CertificateVerifyClient(TlsServerContext, TlsHandshakeHash, CertificateVerify)180%n/a1111
verify13CertificateVerifyServer(TlsClientContext, TlsHandshakeHash, CertificateVerify)180%n/a1111
contains(short[], int, int, short)180%40%3311
contains(int[], int, int, int)180%40%3311
containsAll(short[], short[])180%40%3311
containsNot(short[], int, int, short)180%40%3311
checkDowngradeMarker(ProtocolVersion, byte[])180%40%3311
generateEncryptedPreMasterSecret(TlsContext, TlsEncryptor, OutputStream)180%n/a1111
writeUint24(int, OutputStream)170%n/a1111
readUint8Array(int, InputStream)170%20%2211
readUint16Array(int, InputStream)170%20%2211
getSignatureAndHashAlgorithm(ProtocolVersion, TlsCredentialedSigner)170%40%3311
verify12SignatureAlgorithm(SignatureAndHashAlgorithm, short)170%60%4411
isValidCipherSuiteSelection(int[], int)170%80%5511
truncate(short[], int)170%20%2211
truncate(int[], int)170%20%2211
isSafeRenegotiationServerCertificate(TlsClientContext, Certificate)170%40%3311
negotiatedVersionDTLSServer(TlsServerContext)170%20%2211
negotiatedVersionTLSServer(TlsServerContext)170%20%2211
writeUint8Array(short[], byte[], int)160%20%2211
writeUint16Array(int[], byte[], int)160%20%2211
encodeUint16ArrayWithUint8Length(int[])160%n/a1111
encodeUint16ArrayWithUint16Length(int[])160%n/a1111
readVersion(InputStream)160%20%2211
clone(String[])160%40%3311
validate13Credentials(TlsCredentials)160%40%3311
deriveSecret(int, int, TlsSecret, String, byte[])160%20%2211
writeUint16(int, byte[], int)150%n/a1111
writeUint8ArrayWithUint8Length(short[], byte[], int)150%n/a1111
encodeVersion(ProtocolVersion)150%n/a1111
readFully(byte[], InputStream)150%40%3311
readOpaque8(InputStream, int)150%20%2211
readOpaque16(InputStream, int)150%20%2211
readOpaque24(InputStream, int)150%20%2211
readUint8ArrayWithUint8Length(InputStream, int)150%20%2211
writeVersion(ProtocolVersion, byte[], int)150%n/a1111
addIfSupported(Vector, TlsCrypto, int[])150%20%2211
clone(byte[])150%40%3311
copyOfRangeExact(byte[], int, int)150%n/a1111
writeUint8Array(short[], OutputStream)140%20%2211
writeUint16Array(int[], OutputStream)140%20%2211
writeUint16ArrayWithUint16Length(int[], OutputStream)140%n/a1111
readVersion(byte[], int)140%n/a1111
requireDEREncoding(ASN1Object, byte[])140%20%2211
getDefaultSignatureAlgorithms(short)130%20%2211
initKeyExchangeClient(TlsClientContext, TlsClient)130%n/a1111
initKeyExchangeServer(TlsServerContext, TlsServer)130%n/a1111
checkClientCertificateType(CertificateRequest, short, short)130%40%3311
deriveSecret(SecurityParameters, TlsSecret, String, byte[])130%n/a1111
encodeUint8ArrayWithUint8Length(short[])120%n/a1111
readUint8(InputStream)120%20%2211
isSignatureAlgorithmsExtensionAllowed(ProtocolVersion)120%40%3311
calculateFinishedHMAC(SecurityParameters, TlsSecret, byte[])120%n/a1111
getMACAlgorithm(int)120%50%5511
getPSKEarlySecret(TlsCrypto, TlsPSK)120%n/a1111
writeOpaque8(byte[], OutputStream)110%n/a1111
writeOpaque16(byte[], OutputStream)110%n/a1111
writeOpaque24(byte[], OutputStream)110%n/a1111
writeUint8ArrayWithUint8Length(short[], OutputStream)110%n/a1111
encodeUint8(short)110%n/a1111
encodeUint16(int)110%n/a1111
encodeUint24(int)110%n/a1111
encodeUint32(long)110%n/a1111
isNullOrEmpty(byte[])110%40%3311
isNullOrEmpty(short[])110%40%3311
isNullOrEmpty(int[])110%40%3311
isNullOrEmpty(Object[])110%40%3311
isNullOrEmpty(String)110%40%3311
checkPeerSigAlgs(TlsContext, TlsCertificate[])110%20%2211
requireAgreementCredentials(TlsCredentials)110%20%2211
requireDecryptorCredentials(TlsCredentials)110%20%2211
requireSignerCredentials(TlsCredentials)110%20%2211
writeEncryptedPMS(TlsContext, byte[], OutputStream)110%20%2211
validateCertificateType13(short, short)110%20%2211
isValidUint8(long)100%20%2211
isValidUint16(long)100%20%2211
isValidUint24(long)100%20%2211
isValidUint32(long)100%20%2211
isValidUint48(long)100%20%2211
isNullOrEmpty(Vector)100%40%3311
getLegacyClientCertType(short)100%40%4411
getLegacySignatureAlgorithmClient(short)100%40%4411
getLegacySignatureAlgorithmClientCert(short)100%40%4411
getLegacySignatureAlgorithmServer(int)100%40%4411
getLegacySignatureAlgorithmServerCert(int)100%40%4411
getPRFAlgorithm13(int)100%40%4411
vectorOfOne(Object)100%n/a1111
getEncryptionAlgorithmType(int)100%40%4411
checkUint8(short)90%20%2211
checkUint8(int)90%20%2211
checkUint8(long)90%20%2211
checkUint16(int)90%20%2211
checkUint16(long)90%20%2211
checkUint24(int)90%20%2211
checkUint24(long)90%20%2211
checkUint32(long)90%20%2211
checkUint48(long)90%20%2211
checkUint64(long)90%20%2211
isValidUint8(short)90%20%2211
isValidUint8(int)90%20%2211
isValidUint16(int)90%20%2211
isValidUint24(int)90%20%2211
writeUint16(int, OutputStream)90%n/a1111
encodeOpaque8(byte[])90%n/a1111
writeVersion(ProtocolVersion, OutputStream)90%n/a1111
addIfSupported(Vector, TlsCrypto, int)90%20%2211
getExtensionData(Hashtable, Integer)90%20%2211
update13TrafficSecretPeer(TlsContext)90%20%2211
update13TrafficSecret(SecurityParameters, TlsSecret)90%n/a1111
trackHashAlgorithmClient(TlsHandshakeHash, SignatureAndHashAlgorithm)90%20%2211
readEncryptedPMS(TlsContext, InputStream)90%20%2211
establishClientSigAlgs(SecurityParameters, Hashtable)90%n/a1111
processClientCertificateTypeExtension13(Hashtable, Hashtable, short)90%n/a1111
processServerCertificateTypeExtension13(Hashtable, Hashtable, short)90%n/a1111
readDERObject(byte[])80%n/a1111
addIfSupported(Vector, TlsCrypto, SignatureAndHashAlgorithm)80%20%2211
getDefaultSignatureAlgorithm(short)80%20%2211
PRF(SecurityParameters, TlsSecret, String, byte[], int)80%n/a1111
PRF(TlsContext, TlsSecret, String, byte[], int)80%n/a1111
calculateEndPointHash(TlsContext, TlsCertificate, byte[])80%n/a1111
getMinimumVersion(int)80%30%3311
isAEADCipherSuite(int)80%20%2211
isBlockCipherSuite(int)80%20%2211
isStreamCipherSuite(int)80%20%2211
addCertSigAlgOID(Hashtable, ASN1ObjectIdentifier, SignatureAndHashAlgorithm)70%n/a1111
addCertSigAlgOID(Hashtable, ASN1ObjectIdentifier, short, short)70%n/a1111
readUint8(byte[], int)70%n/a1111
readOpaque8(InputStream)70%n/a1111
readOpaque16(InputStream)70%n/a1111
readOpaque24(InputStream)70%n/a1111
isValidSignatureSchemeForServerKeyExchange(int, int)70%n/a1111
getSupportedCipherSuites(TlsCrypto, int[])70%n/a1111
writeUint8(short, byte[], int)60%n/a1111
writeUint8(int, byte[], int)60%n/a1111
importSession(byte[], SessionParameters)60%n/a1111
hasSigningCapability(short)60%20%2211
getCipherType(int)60%n/a1111
chooseSignatureAndHashAlgorithm(TlsContext, Vector, short)60%n/a1111
getSupportedCipherSuites(TlsCrypto, int[], int)60%n/a1111
isTLSv10(ProtocolVersion)50%n/a1111
isTLSv11(ProtocolVersion)50%n/a1111
isTLSv12(ProtocolVersion)50%n/a1111
isTLSv13(ProtocolVersion)50%n/a1111
getSignatureAndHashAlgorithm(TlsContext, TlsCredentialedSigner)50%n/a1111
verifySupportedSignatureAlgorithm(Vector, SignatureAndHashAlgorithm)50%n/a1111
update13TrafficSecretLocal(TlsContext)50%n/a1111
createHash(TlsCrypto, short)50%n/a1111
createHash(TlsCrypto, SignatureAndHashAlgorithm)50%n/a1111
establishClientCredentials(TlsAuthentication, CertificateRequest)50%n/a1111
establish13ClientCredentials(TlsAuthentication, CertificateRequest)50%n/a1111
isSSL(TlsContext)40%n/a1111
isTLSv10(TlsContext)40%n/a1111
isTLSv11(TlsContext)40%n/a1111
isTLSv12(TlsContext)40%n/a1111
isTLSv13(TlsContext)40%n/a1111
writeUint8(short, OutputStream)40%n/a1111
writeUint8(int, OutputStream)40%n/a1111
decodeOpaque8(byte[])40%n/a1111
decodeOpaque16(byte[])40%n/a1111
getDefaultSupportedSignatureAlgorithms(TlsContext)40%n/a1111
getNamedGroupRoles(int[])40%n/a1111
isValidCipherSuiteForVersion(int, ProtocolVersion)40%n/a1111
getCurrentPRFHash(TlsHandshakeHash)40%n/a1111
establishServerCredentials(TlsServer)40%n/a1111
establish13ServerCredentials(TlsServer)40%n/a1111
TlsUtils()30%n/a1111
getDefaultDSSSignatureAlgorithms()30%n/a1111
getDefaultECDSASignatureAlgorithms()30%n/a1111
getDefaultRSASignatureAlgorithms()30%n/a1111
isValidUint64(long)20%n/a1111