Source file "org/bouncycastle/tls/TlsUtils.java" was not found during generation of report.
| Element | Missed Instructions | Cov. | Missed Branches | Cov. | Missed | Cxty | Missed | Lines | Missed | Methods |
| Total | 7,273 of 7,273 | 0% | 1,093 of 1,093 | 0% | 908 | 908 | 1,850 | 1,850 | 304 | 304 |
| createCertSigAlgOIDs() | 0% | n/a | 1 | 1 | 35 | 35 | 1 | 1 | ||
| selectPreSharedKey(TlsServerContext, TlsServer, Hashtable, HandshakeMessageInput, TlsHandshakeHash, boolean) | 0% | 0% | 9 | 9 | 31 | 31 | 1 | 1 | ||
| createDefaultSupportedSigAlgs() | 0% | n/a | 1 | 1 | 25 | 25 | 1 | 1 | ||
| getPRFAlgorithm(SecurityParameters, int) | 0% | 0% | 20 | 20 | 34 | 34 | 1 | 1 | ||
| collectKeyShares(TlsCrypto, int[], Vector, Hashtable, Vector) | 0% | 0% | 13 | 13 | 24 | 24 | 1 | 1 | ||
| verifyCertificateVerifyClient(TlsServerContext, CertificateRequest, DigitallySigned, TlsHandshakeHash) | 0% | 0% | 5 | 5 | 28 | 28 | 1 | 1 | ||
| isSupportedKeyExchange(TlsCrypto, int) | 0% | 0% | 26 | 26 | 21 | 21 | 1 | 1 | ||
| checkSigAlgOfServerCerts(TlsContext, TlsCertificate[]) | 0% | 0% | 11 | 11 | 22 | 22 | 1 | 1 | ||
| calculateEndPointHash(TlsContext, TlsCertificate, byte[], int, int) | 0% | 0% | 12 | 12 | 27 | 27 | 1 | 1 | ||
| checkSigAlgOfClientCerts(TlsContext, TlsCertificate[]) | 0% | 0% | 8 | 8 | 21 | 21 | 1 | 1 | ||
| receiveServerCertificate(TlsClientContext, TlsClient, ByteArrayInputStream, Hashtable) | 0% | 0% | 7 | 7 | 21 | 21 | 1 | 1 | ||
| createKeyExchangeServer(TlsServer, int) | 0% | 0% | 12 | 12 | 14 | 14 | 1 | 1 | ||
| addPreSharedKeyToClientHelloRetry(TlsClientContext, OfferedPsks.BindersConfig, Hashtable) | 0% | 0% | 4 | 4 | 18 | 18 | 1 | 1 | ||
| writeUint64(long, byte[], int) | 0% | n/a | 1 | 1 | 9 | 9 | 1 | 1 | ||
| getCertSigAndHashAlg(TlsCertificate, TlsCertificate) | 0% | 0% | 13 | 13 | 23 | 23 | 1 | 1 | ||
| verifyServerKeyExchangeSignature(TlsContext, InputStream, TlsCertificate, byte[], DigestInputBuffer) | 0% | 0% | 5 | 5 | 20 | 20 | 1 | 1 | ||
| chooseSignatureAndHashAlgorithm(ProtocolVersion, Vector, short) | 0% | 0% | 12 | 12 | 24 | 24 | 1 | 1 | ||
| checkTlsFeatures(Certificate, Hashtable, Hashtable) | 0% | 0% | 8 | 8 | 14 | 14 | 1 | 1 | ||
| establish13PhaseSecrets(TlsContext, TlsSecret, TlsSecret) | 0% | 0% | 4 | 4 | 22 | 22 | 1 | 1 | ||
| receive13ServerCertificate(TlsClientContext, TlsClient, ByteArrayInputStream, Hashtable) | 0% | 0% | 5 | 5 | 18 | 18 | 1 | 1 | ||
| createKeyExchangeClient(TlsClient, int) | 0% | 0% | 11 | 11 | 15 | 15 | 1 | 1 | ||
| isPermittedExtensionType13(int, int) | 0% | 0% | 20 | 20 | 29 | 29 | 1 | 1 | ||
| selectKeyShare(TlsCrypto, ProtocolVersion, Vector, int[], int[]) | 0% | 0% | 13 | 13 | 16 | 16 | 1 | 1 | ||
| negotiatedCipherSuite(SecurityParameters, int) | 0% | 0% | 4 | 4 | 19 | 19 | 1 | 1 | ||
| verify13CertificateVerify(Vector, String, TlsHandshakeHash, TlsCertificate, CertificateVerify) | 0% | 0% | 2 | 2 | 18 | 18 | 1 | 1 | ||
| writeUint48(long, byte[], int) | 0% | n/a | 1 | 1 | 7 | 7 | 1 | 1 | ||
| getCommonCipherSuites(int[], int[], boolean) | 0% | 0% | 6 | 6 | 14 | 14 | 1 | 1 | ||
| getPSKExternalsClient(TlsClient, int[]) | 0% | 0% | 5 | 5 | 15 | 15 | 1 | 1 | ||
| writeUint64(long, OutputStream) | 0% | n/a | 1 | 1 | 9 | 9 | 1 | 1 | ||
| calculateVerifyData(TlsContext, TlsHandshakeHash, boolean) | 0% | 0% | 5 | 5 | 15 | 15 | 1 | 1 | ||
| getUsableSignatureAlgorithms(Vector) | 0% | 0% | 5 | 5 | 14 | 14 | 1 | 1 | ||
| generate13CertificateVerify(TlsCrypto, TlsCredentialedSigner, String, TlsHandshakeHash, SignatureAndHashAlgorithm) | 0% | 0% | 2 | 2 | 13 | 13 | 1 | 1 | ||
| getEncryptionAlgorithm(int) | 0% | 0% | 25 | 25 | 26 | 26 | 1 | 1 | ||
| decodeUint16ArrayWithUint8Length(byte[]) | 0% | 0% | 5 | 5 | 11 | 11 | 1 | 1 | ||
| processServerCertificate(TlsClientContext, CertificateStatus, TlsKeyExchange, TlsAuthentication, Hashtable, Hashtable) | 0% | 0% | 5 | 5 | 16 | 16 | 1 | 1 | ||
| encodeSupportedSignatureAlgorithms(Vector, OutputStream) | 0% | 0% | 6 | 6 | 12 | 12 | 1 | 1 | ||
| selectKeyShareGroup(TlsCrypto, ProtocolVersion, int[], int[]) | 0% | 0% | 11 | 11 | 14 | 14 | 1 | 1 | ||
| getNamedGroupRoles(Vector) | 0% | 0% | 6 | 6 | 14 | 14 | 1 | 1 | ||
| addPreSharedKeyToClientHello(TlsClientContext, TlsClient, Hashtable, int[]) | 0% | 0% | 4 | 4 | 13 | 13 | 1 | 1 | ||
| getCertificateVerifyHeader(String) | 0% | 0% | 3 | 3 | 9 | 9 | 1 | 1 | ||
| addKeyShareToClientHelloRetry(TlsClientContext, Hashtable, int) | 0% | 0% | 3 | 3 | 9 | 9 | 1 | 1 | ||
| readUint32(byte[], int) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| calculateSignatureHash(TlsContext, SignatureAndHashAlgorithm, byte[], DigestInputBuffer) | 0% | 0% | 3 | 3 | 10 | 10 | 1 | 1 | ||
| parseSupportedSignatureAlgorithms(InputStream) | 0% | 0% | 5 | 5 | 10 | 10 | 1 | 1 | ||
| generateCertificateVerifyClient(TlsClientContext, TlsCredentialedSigner, SignatureAndHashAlgorithm, TlsStreamSigner, TlsHandshakeHash) | 0% | 0% | 4 | 4 | 11 | 11 | 1 | 1 | ||
| decodeUint8ArrayWithUint8Length(byte[]) | 0% | 0% | 4 | 4 | 9 | 9 | 1 | 1 | ||
| getKeyExchangeAlgorithm(int) | 0% | 0% | 20 | 20 | 21 | 21 | 1 | 1 | ||
| validateCredentials(TlsCredentials) | 0% | 0% | 6 | 6 | 8 | 8 | 1 | 1 | ||
| writeUint48(long, OutputStream) | 0% | n/a | 1 | 1 | 7 | 7 | 1 | 1 | ||
| decodeOpaque8(byte[], int) | 0% | 0% | 5 | 5 | 8 | 8 | 1 | 1 | ||
| decodeOpaque16(byte[], int) | 0% | 0% | 5 | 5 | 8 | 8 | 1 | 1 | ||
| generateServerKeyExchangeSignature(TlsContext, TlsCredentialedSigner, byte[], DigestInputBuffer) | 0% | 0% | 2 | 2 | 10 | 10 | 1 | 1 | ||
| readInt32(byte[], int) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| writeGMTUnixTime(byte[], int) | 0% | n/a | 1 | 1 | 6 | 6 | 1 | 1 | ||
| addKeyShareToClientHello(TlsClientContext, TlsClient, Hashtable) | 0% | 0% | 3 | 3 | 10 | 10 | 1 | 1 | ||
| writeUint32(long, byte[], int) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| isValidCipherSuiteForSignatureAlgorithms(int, Vector) | 0% | 0% | 5 | 5 | 12 | 12 | 1 | 1 | ||
| calculateExporterSeed(SecurityParameters, byte[]) | 0% | 0% | 3 | 3 | 8 | 8 | 1 | 1 | ||
| getPRFAlgorithms13(int[]) | 0% | 0% | 4 | 4 | 7 | 7 | 1 | 1 | ||
| getSupportedCipherSuites(TlsCrypto, int[], int, int) | 0% | 0% | 4 | 4 | 9 | 9 | 1 | 1 | ||
| adjustTranscriptForRetry(TlsHandshakeHash) | 0% | n/a | 1 | 1 | 10 | 10 | 1 | 1 | ||
| readUint32(InputStream) | 0% | 0% | 2 | 2 | 7 | 7 | 1 | 1 | ||
| verifySupportedSignatureAlgorithm(Vector, SignatureAndHashAlgorithm, short) | 0% | 0% | 7 | 7 | 9 | 9 | 1 | 1 | ||
| isSupportedCipherSuite(TlsCrypto, int) | 0% | 0% | 7 | 7 | 11 | 11 | 1 | 1 | ||
| processClientCertificate(TlsServerContext, Certificate, TlsKeyExchange, TlsServer) | 0% | 0% | 4 | 4 | 11 | 11 | 1 | 1 | ||
| areCertificatesEqual(Certificate, Certificate) | 0% | 0% | 4 | 4 | 10 | 10 | 1 | 1 | ||
| checkExtensionData13(Hashtable, int, short) | 0% | 0% | 4 | 4 | 7 | 7 | 1 | 1 | ||
| getCommonCipherSuite13(ProtocolVersion, int[], int[], boolean) | 0% | 0% | 5 | 5 | 10 | 10 | 1 | 1 | ||
| retainAll(short[], short[]) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| addPreSharedKeyToClientExtensions(TlsPSK[], Hashtable) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| writeDowngradeMarker(ProtocolVersion, byte[]) | 0% | 0% | 3 | 3 | 8 | 8 | 1 | 1 | ||
| generate13CertificateVerify(TlsContext, TlsCredentialedSigner, TlsHandshakeHash) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| hasAnyRSASigAlgs(TlsCrypto) | 0% | 0% | 8 | 8 | 7 | 7 | 1 | 1 | ||
| calculatePSKBinder(TlsCrypto, boolean, int, TlsSecret, byte[]) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| initCipher(TlsContext) | 0% | 0% | 3 | 3 | 7 | 7 | 1 | 1 | ||
| readUint24(byte[], int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| constantTimeAreEqual(int, byte[], int, byte[], int) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| isValidSignatureAlgorithmForServerKeyExchange(short, int) | 0% | 0% | 9 | 9 | 10 | 10 | 1 | 1 | ||
| trackHashAlgorithms(TlsHandshakeHash, Vector) | 0% | 0% | 4 | 4 | 9 | 9 | 1 | 1 | ||
| getKeyExchangeAlgorithms(int[]) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| isValidVersionForCipherSuite(int, ProtocolVersion) | 0% | 0% | 5 | 5 | 8 | 8 | 1 | 1 | ||
| update13TrafficSecret(TlsContext, boolean) | 0% | 0% | 3 | 3 | 9 | 9 | 1 | 1 | ||
| writeUint32(long, OutputStream) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| readASN1Object(byte[]) | 0% | 0% | 3 | 3 | 7 | 7 | 1 | 1 | ||
| getSupportedSignatureAlgorithms(TlsContext, Vector) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| calculateMasterSecret(TlsContext, TlsSecret) | 0% | 0% | 2 | 2 | 7 | 7 | 1 | 1 | ||
| getOIDForHashAlgorithm(short) | 0% | 0% | 7 | 7 | 8 | 8 | 1 | 1 | ||
| normalizeCertificateRequest(CertificateRequest, short[]) | 0% | 0% | 3 | 3 | 7 | 7 | 1 | 1 | ||
| negotiatedVersion(SecurityParameters) | 0% | 0% | 4 | 4 | 9 | 9 | 1 | 1 | ||
| getPSKIndices(TlsPSK[], int) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| static {...} | 0% | n/a | 1 | 1 | 9 | 9 | 1 | 1 | ||
| readUint24(InputStream) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| readAllOrNothing(int, InputStream) | 0% | 0% | 4 | 4 | 9 | 9 | 1 | 1 | ||
| getLegacySupportedSignatureAlgorithms() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| establish13TrafficSecrets(TlsContext, byte[], TlsSecret, String, String, RecordStream) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| writeUint24(int, byte[], int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| isNullOrContainsNull(Object[]) | 0% | 0% | 4 | 4 | 7 | 7 | 1 | 1 | ||
| concat(byte[], byte[]) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| establish13PhaseEarly(TlsContext, byte[], RecordStream) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| getHashAlgorithmForPRFAlgorithm(int) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| sendSignatureInput(TlsContext, byte[], DigestInputBuffer, OutputStream) | 0% | 0% | 2 | 2 | 8 | 8 | 1 | 1 | ||
| validateCertificateRequest(CertificateRequest, TlsKeyExchange) | 0% | 0% | 3 | 3 | 7 | 7 | 1 | 1 | ||
| encodeOpaque16(byte[]) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| encodeOpaque24(byte[]) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| selectKeyShare(Vector, int) | 0% | 0% | 5 | 5 | 5 | 5 | 1 | 1 | ||
| getPSKEarlySecrets(TlsCrypto, TlsPSK[]) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| readUint48(byte[], int) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| establish13PhaseHandshake(TlsContext, byte[], RecordStream) | 0% | n/a | 1 | 1 | 6 | 6 | 1 | 1 | ||
| containsSignatureAlgorithm(Vector, SignatureAndHashAlgorithm) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| containsAnySignatureAlgorithm(Vector, short) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| establish13PhaseApplication(TlsContext, byte[], RecordStream) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| containsNonAscii(byte[]) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| establishServerSigAlgs(SecurityParameters, CertificateRequest) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| getSessionMasterSecret(TlsCrypto, TlsSecret) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| decodeUint8(byte[]) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| decodeUint16(byte[]) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| decodeUint32(byte[]) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| isValidKeyShareSelection(ProtocolVersion, int[], Hashtable, int) | 0% | 0% | 5 | 5 | 4 | 4 | 1 | 1 | ||
| skip13ServerCertificate(TlsClientContext) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| getSessionID(TlsSession) | 0% | 0% | 5 | 5 | 5 | 5 | 1 | 1 | ||
| negotiatedVersionDTLSClient(TlsClientContext, TlsClient) | 0% | 0% | 2 | 2 | 7 | 7 | 1 | 1 | ||
| negotiatedVersionTLSClient(TlsClientContext, TlsClient) | 0% | 0% | 2 | 2 | 7 | 7 | 1 | 1 | ||
| readUint16(byte[], int) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| readFully(int, InputStream) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| calculateFinishedHMAC(int, int, TlsSecret, byte[]) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| checkDowngradeMarker(byte[], byte[]) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| containsNonAscii(String) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| writeOpaque8(byte[], byte[], int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeOpaque16(byte[], byte[], int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeOpaque24(byte[], byte[], int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeUint16ArrayWithUint8Length(int[], byte[], int) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| writeUint16ArrayWithUint16Length(int[], byte[], int) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| readUint16(InputStream) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| readUint48(InputStream) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| readOpaque8(InputStream, int, int) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| addToSet(Vector, int) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| hasExpectedEmptyExtensionData(Hashtable, Integer, short) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| verify13CertificateVerifyClient(TlsServerContext, TlsHandshakeHash, CertificateVerify) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| verify13CertificateVerifyServer(TlsClientContext, TlsHandshakeHash, CertificateVerify) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| contains(short[], int, int, int) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| contains(int[], int, int, int) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| containsAll(short[], short[]) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| checkDowngradeMarker(ProtocolVersion, byte[]) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| generateEncryptedPreMasterSecret(TlsContext, TlsEncryptor, OutputStream) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| writeUint24(int, OutputStream) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| readUint8Array(int, InputStream) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| readUint16Array(int, InputStream) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| getSignatureAndHashAlgorithm(ProtocolVersion, TlsCredentialedSigner) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| clone(String[]) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| isValidCipherSuiteSelection(int[], int) | 0% | 0% | 5 | 5 | 3 | 3 | 1 | 1 | ||
| truncate(short[], int) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| truncate(int[], int) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| isSafeRenegotiationServerCertificate(TlsClientContext, Certificate) | 0% | 0% | 3 | 3 | 6 | 6 | 1 | 1 | ||
| negotiatedVersionDTLSServer(TlsServerContext) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| negotiatedVersionTLSServer(TlsServerContext) | 0% | 0% | 2 | 2 | 6 | 6 | 1 | 1 | ||
| writeUint8Array(short[], byte[], int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| writeUint16Array(int[], byte[], int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| encodeUint16ArrayWithUint8Length(int[]) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| encodeUint16ArrayWithUint16Length(int[]) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| readVersion(InputStream) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| isExtendedMasterSecretOptionalTLS(ProtocolVersion[]) | 0% | 0% | 4 | 4 | 3 | 3 | 1 | 1 | ||
| clone(byte[]) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| validate13Credentials(TlsCredentials) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| deriveSecret(int, int, TlsSecret, String, byte[]) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| writeUint16(int, byte[], int) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| writeUint8ArrayWithUint8Length(short[], byte[], int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| encodeVersion(ProtocolVersion) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| readFully(byte[], InputStream) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| readOpaque8(InputStream, int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| readOpaque16(InputStream, int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| readOpaque24(InputStream, int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| readUint8ArrayWithUint8Length(InputStream, int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| writeVersion(ProtocolVersion, byte[], int) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| addIfSupported(Vector, TlsCrypto, int[]) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| copyOfRangeExact(byte[], int, int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeUint8Array(short[], OutputStream) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| writeUint16Array(int[], OutputStream) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| writeUint16ArrayWithUint16Length(int[], OutputStream) | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | ||
| readVersion(byte[], int) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| requireDEREncoding(ASN1Object, byte[]) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| getDefaultSignatureAlgorithms(short) | 0% | 0% | 2 | 2 | 2 | 2 | 1 | 1 | ||
| initKeyExchangeClient(TlsClientContext, TlsClient) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| initKeyExchangeServer(TlsServerContext, TlsServer) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| checkClientCertificateType(CertificateRequest, short, short) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| deriveSecret(SecurityParameters, TlsSecret, String, byte[]) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| encodeUint8ArrayWithUint8Length(short[]) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| readUint8(InputStream) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| isExtendedMasterSecretOptionalDTLS(ProtocolVersion[]) | 0% | 0% | 3 | 3 | 2 | 2 | 1 | 1 | ||
| isSignatureAlgorithmsExtensionAllowed(ProtocolVersion) | 0% | 0% | 3 | 3 | 2 | 2 | 1 | 1 | ||
| calculateFinishedHMAC(SecurityParameters, TlsSecret, byte[]) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| getMACAlgorithm(int) | 0% | 0% | 5 | 5 | 6 | 6 | 1 | 1 | ||
| getPSKEarlySecret(TlsCrypto, TlsPSK) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeOpaque8(byte[], OutputStream) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeOpaque16(byte[], OutputStream) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeOpaque24(byte[], OutputStream) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| writeUint8ArrayWithUint8Length(short[], OutputStream) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| encodeUint8(short) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| encodeUint16(int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| encodeUint24(int) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| encodeUint32(long) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| isNullOrEmpty(byte[]) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| isNullOrEmpty(short[]) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| isNullOrEmpty(int[]) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| isNullOrEmpty(Object[]) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| isNullOrEmpty(String) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| checkPeerSigAlgs(TlsContext, TlsCertificate[]) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| requireAgreementCredentials(TlsCredentials) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| requireDecryptorCredentials(TlsCredentials) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| requireSignerCredentials(TlsCredentials) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| writeEncryptedPMS(TlsContext, byte[], OutputStream) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| isValidUint8(long) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint16(long) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint24(long) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint32(long) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint48(long) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| getExtensionData(Hashtable, Integer) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isNullOrEmpty(Vector) | 0% | 0% | 3 | 3 | 1 | 1 | 1 | 1 | ||
| getLegacyClientCertType(short) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| getLegacySignatureAlgorithmClient(short) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| getLegacySignatureAlgorithmClientCert(short) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| getLegacySignatureAlgorithmServer(int) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| getLegacySignatureAlgorithmServerCert(int) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| getPRFAlgorithm13(int) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| vectorOfOne(Object) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| getEncryptionAlgorithmType(int) | 0% | 0% | 4 | 4 | 5 | 5 | 1 | 1 | ||
| checkUint8(short) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint8(int) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint8(long) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint16(int) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint16(long) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint24(int) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint24(long) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint32(long) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint48(long) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| checkUint64(long) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| isValidUint8(short) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint8(int) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint16(int) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isValidUint24(int) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| writeUint16(int, OutputStream) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| encodeOpaque8(byte[]) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| writeVersion(ProtocolVersion, OutputStream) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| addIfSupported(Vector, TlsCrypto, int) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| update13TrafficSecretPeer(TlsContext) | 0% | 0% | 2 | 2 | 2 | 2 | 1 | 1 | ||
| update13TrafficSecret(SecurityParameters, TlsSecret) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| trackHashAlgorithmClient(TlsHandshakeHash, SignatureAndHashAlgorithm) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| readEncryptedPMS(TlsContext, InputStream) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| establishClientSigAlgs(SecurityParameters, Hashtable) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| readDERObject(byte[]) | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | ||
| addIfSupported(Vector, TlsCrypto, SignatureAndHashAlgorithm) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| getDefaultSignatureAlgorithm(short) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| PRF(SecurityParameters, TlsSecret, String, byte[], int) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| PRF(TlsContext, TlsSecret, String, byte[], int) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| calculateEndPointHash(TlsContext, TlsCertificate, byte[]) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getMinimumVersion(int) | 0% | 0% | 3 | 3 | 4 | 4 | 1 | 1 | ||
| isAEADCipherSuite(int) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isBlockCipherSuite(int) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| isStreamCipherSuite(int) | 0% | 0% | 2 | 2 | 1 | 1 | 1 | 1 | ||
| addCertSigAlgOID(Hashtable, ASN1ObjectIdentifier, SignatureAndHashAlgorithm) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| addCertSigAlgOID(Hashtable, ASN1ObjectIdentifier, short, short) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| readUint8(byte[], int) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| readOpaque8(InputStream) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| readOpaque16(InputStream) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| readOpaque24(InputStream) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| isValidSignatureSchemeForServerKeyExchange(int, int) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| getSupportedCipherSuites(TlsCrypto, int[]) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| writeUint8(short, byte[], int) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| writeUint8(int, byte[], int) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| importSession(byte[], SessionParameters) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| hasSigningCapability(short) | 0% | 0% | 2 | 2 | 3 | 3 | 1 | 1 | ||
| getCipherType(int) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| chooseSignatureAndHashAlgorithm(TlsContext, Vector, short) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getSupportedCipherSuites(TlsCrypto, int[], int) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv10(ProtocolVersion) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv11(ProtocolVersion) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv12(ProtocolVersion) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv13(ProtocolVersion) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getSignatureAndHashAlgorithm(TlsContext, TlsCredentialedSigner) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| verifySupportedSignatureAlgorithm(Vector, SignatureAndHashAlgorithm) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| update13TrafficSecretLocal(TlsContext) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| createHash(TlsCrypto, short) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| createHash(TlsCrypto, SignatureAndHashAlgorithm) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| establishClientCredentials(TlsAuthentication, CertificateRequest) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| establish13ClientCredentials(TlsAuthentication, CertificateRequest) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isSSL(TlsContext) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv10(TlsContext) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv11(TlsContext) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv12(TlsContext) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isTLSv13(TlsContext) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| writeUint8(short, OutputStream) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| writeUint8(int, OutputStream) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| decodeOpaque8(byte[]) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| decodeOpaque16(byte[]) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getDefaultSupportedSignatureAlgorithms(TlsContext) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getNamedGroupRoles(int[]) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isValidCipherSuiteForVersion(int, ProtocolVersion) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getCurrentPRFHash(TlsHandshakeHash) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| establishServerCredentials(TlsServer) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| establish13ServerCredentials(TlsServer) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| TlsUtils() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getDefaultDSSSignatureAlgorithms() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getDefaultECDSASignatureAlgorithms() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| getDefaultRSASignatureAlgorithms() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| isValidUint64(long) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 |