Source file "org/bouncycastle/tls/TlsUtils.java" was not found during generation of report.
Element | Missed Instructions | Cov. | Missed Branches | Cov. | Missed | Cxty | Missed | Lines | Missed | Methods |
Total | 7,273 of 7,273 | 0% | 1,093 of 1,093 | 0% | 908 | 908 | 1,850 | 1,850 | 304 | 304 |
createCertSigAlgOIDs() | ![]() | 0% | n/a | 1 | 1 | 35 | 35 | 1 | 1 | |
selectPreSharedKey(TlsServerContext, TlsServer, Hashtable, HandshakeMessageInput, TlsHandshakeHash, boolean) | ![]() | 0% | ![]() | 0% | 9 | 9 | 31 | 31 | 1 | 1 |
createDefaultSupportedSigAlgs() | ![]() | 0% | n/a | 1 | 1 | 25 | 25 | 1 | 1 | |
getPRFAlgorithm(SecurityParameters, int) | ![]() | 0% | ![]() | 0% | 20 | 20 | 34 | 34 | 1 | 1 |
collectKeyShares(TlsCrypto, int[], Vector, Hashtable, Vector) | ![]() | 0% | ![]() | 0% | 13 | 13 | 24 | 24 | 1 | 1 |
verifyCertificateVerifyClient(TlsServerContext, CertificateRequest, DigitallySigned, TlsHandshakeHash) | ![]() | 0% | ![]() | 0% | 5 | 5 | 28 | 28 | 1 | 1 |
isSupportedKeyExchange(TlsCrypto, int) | ![]() | 0% | ![]() | 0% | 26 | 26 | 21 | 21 | 1 | 1 |
checkSigAlgOfServerCerts(TlsContext, TlsCertificate[]) | ![]() | 0% | ![]() | 0% | 11 | 11 | 22 | 22 | 1 | 1 |
calculateEndPointHash(TlsContext, TlsCertificate, byte[], int, int) | ![]() | 0% | ![]() | 0% | 12 | 12 | 27 | 27 | 1 | 1 |
checkSigAlgOfClientCerts(TlsContext, TlsCertificate[]) | ![]() | 0% | ![]() | 0% | 8 | 8 | 21 | 21 | 1 | 1 |
receiveServerCertificate(TlsClientContext, TlsClient, ByteArrayInputStream, Hashtable) | ![]() | 0% | ![]() | 0% | 7 | 7 | 21 | 21 | 1 | 1 |
createKeyExchangeServer(TlsServer, int) | ![]() | 0% | ![]() | 0% | 12 | 12 | 14 | 14 | 1 | 1 |
addPreSharedKeyToClientHelloRetry(TlsClientContext, OfferedPsks.BindersConfig, Hashtable) | ![]() | 0% | ![]() | 0% | 4 | 4 | 18 | 18 | 1 | 1 |
writeUint64(long, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 9 | 9 | 1 | 1 | |
getCertSigAndHashAlg(TlsCertificate, TlsCertificate) | ![]() | 0% | ![]() | 0% | 13 | 13 | 23 | 23 | 1 | 1 |
verifyServerKeyExchangeSignature(TlsContext, InputStream, TlsCertificate, byte[], DigestInputBuffer) | ![]() | 0% | ![]() | 0% | 5 | 5 | 20 | 20 | 1 | 1 |
chooseSignatureAndHashAlgorithm(ProtocolVersion, Vector, short) | ![]() | 0% | ![]() | 0% | 12 | 12 | 24 | 24 | 1 | 1 |
checkTlsFeatures(Certificate, Hashtable, Hashtable) | ![]() | 0% | ![]() | 0% | 8 | 8 | 14 | 14 | 1 | 1 |
establish13PhaseSecrets(TlsContext, TlsSecret, TlsSecret) | ![]() | 0% | ![]() | 0% | 4 | 4 | 22 | 22 | 1 | 1 |
receive13ServerCertificate(TlsClientContext, TlsClient, ByteArrayInputStream, Hashtable) | ![]() | 0% | ![]() | 0% | 5 | 5 | 18 | 18 | 1 | 1 |
createKeyExchangeClient(TlsClient, int) | ![]() | 0% | ![]() | 0% | 11 | 11 | 15 | 15 | 1 | 1 |
isPermittedExtensionType13(int, int) | ![]() | 0% | ![]() | 0% | 20 | 20 | 29 | 29 | 1 | 1 |
selectKeyShare(TlsCrypto, ProtocolVersion, Vector, int[], int[]) | ![]() | 0% | ![]() | 0% | 13 | 13 | 16 | 16 | 1 | 1 |
negotiatedCipherSuite(SecurityParameters, int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 19 | 19 | 1 | 1 |
verify13CertificateVerify(Vector, String, TlsHandshakeHash, TlsCertificate, CertificateVerify) | ![]() | 0% | ![]() | 0% | 2 | 2 | 18 | 18 | 1 | 1 |
writeUint48(long, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 7 | 7 | 1 | 1 | |
getCommonCipherSuites(int[], int[], boolean) | ![]() | 0% | ![]() | 0% | 6 | 6 | 14 | 14 | 1 | 1 |
getPSKExternalsClient(TlsClient, int[]) | ![]() | 0% | ![]() | 0% | 5 | 5 | 15 | 15 | 1 | 1 |
writeUint64(long, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 9 | 9 | 1 | 1 | |
calculateVerifyData(TlsContext, TlsHandshakeHash, boolean) | ![]() | 0% | ![]() | 0% | 5 | 5 | 15 | 15 | 1 | 1 |
getUsableSignatureAlgorithms(Vector) | ![]() | 0% | ![]() | 0% | 5 | 5 | 14 | 14 | 1 | 1 |
generate13CertificateVerify(TlsCrypto, TlsCredentialedSigner, String, TlsHandshakeHash, SignatureAndHashAlgorithm) | ![]() | 0% | ![]() | 0% | 2 | 2 | 13 | 13 | 1 | 1 |
getEncryptionAlgorithm(int) | ![]() | 0% | ![]() | 0% | 25 | 25 | 26 | 26 | 1 | 1 |
decodeUint16ArrayWithUint8Length(byte[]) | ![]() | 0% | ![]() | 0% | 5 | 5 | 11 | 11 | 1 | 1 |
processServerCertificate(TlsClientContext, CertificateStatus, TlsKeyExchange, TlsAuthentication, Hashtable, Hashtable) | ![]() | 0% | ![]() | 0% | 5 | 5 | 16 | 16 | 1 | 1 |
encodeSupportedSignatureAlgorithms(Vector, OutputStream) | ![]() | 0% | ![]() | 0% | 6 | 6 | 12 | 12 | 1 | 1 |
selectKeyShareGroup(TlsCrypto, ProtocolVersion, int[], int[]) | ![]() | 0% | ![]() | 0% | 11 | 11 | 14 | 14 | 1 | 1 |
getNamedGroupRoles(Vector) | ![]() | 0% | ![]() | 0% | 6 | 6 | 14 | 14 | 1 | 1 |
addPreSharedKeyToClientHello(TlsClientContext, TlsClient, Hashtable, int[]) | ![]() | 0% | ![]() | 0% | 4 | 4 | 13 | 13 | 1 | 1 |
getCertificateVerifyHeader(String) | ![]() | 0% | ![]() | 0% | 3 | 3 | 9 | 9 | 1 | 1 |
addKeyShareToClientHelloRetry(TlsClientContext, Hashtable, int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 9 | 9 | 1 | 1 |
readUint32(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
calculateSignatureHash(TlsContext, SignatureAndHashAlgorithm, byte[], DigestInputBuffer) | ![]() | 0% | ![]() | 0% | 3 | 3 | 10 | 10 | 1 | 1 |
parseSupportedSignatureAlgorithms(InputStream) | ![]() | 0% | ![]() | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
generateCertificateVerifyClient(TlsClientContext, TlsCredentialedSigner, SignatureAndHashAlgorithm, TlsStreamSigner, TlsHandshakeHash) | ![]() | 0% | ![]() | 0% | 4 | 4 | 11 | 11 | 1 | 1 |
decodeUint8ArrayWithUint8Length(byte[]) | ![]() | 0% | ![]() | 0% | 4 | 4 | 9 | 9 | 1 | 1 |
getKeyExchangeAlgorithm(int) | ![]() | 0% | ![]() | 0% | 20 | 20 | 21 | 21 | 1 | 1 |
validateCredentials(TlsCredentials) | ![]() | 0% | ![]() | 0% | 6 | 6 | 8 | 8 | 1 | 1 |
writeUint48(long, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 7 | 7 | 1 | 1 | |
decodeOpaque8(byte[], int) | ![]() | 0% | ![]() | 0% | 5 | 5 | 8 | 8 | 1 | 1 |
decodeOpaque16(byte[], int) | ![]() | 0% | ![]() | 0% | 5 | 5 | 8 | 8 | 1 | 1 |
generateServerKeyExchangeSignature(TlsContext, TlsCredentialedSigner, byte[], DigestInputBuffer) | ![]() | 0% | ![]() | 0% | 2 | 2 | 10 | 10 | 1 | 1 |
readInt32(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
writeGMTUnixTime(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 6 | 6 | 1 | 1 | |
addKeyShareToClientHello(TlsClientContext, TlsClient, Hashtable) | ![]() | 0% | ![]() | 0% | 3 | 3 | 10 | 10 | 1 | 1 |
writeUint32(long, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
isValidCipherSuiteForSignatureAlgorithms(int, Vector) | ![]() | 0% | ![]() | 0% | 5 | 5 | 12 | 12 | 1 | 1 |
calculateExporterSeed(SecurityParameters, byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 8 | 8 | 1 | 1 |
getPRFAlgorithms13(int[]) | ![]() | 0% | ![]() | 0% | 4 | 4 | 7 | 7 | 1 | 1 |
getSupportedCipherSuites(TlsCrypto, int[], int, int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 9 | 9 | 1 | 1 |
adjustTranscriptForRetry(TlsHandshakeHash) | ![]() | 0% | n/a | 1 | 1 | 10 | 10 | 1 | 1 | |
readUint32(InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 7 | 7 | 1 | 1 |
verifySupportedSignatureAlgorithm(Vector, SignatureAndHashAlgorithm, short) | ![]() | 0% | ![]() | 0% | 7 | 7 | 9 | 9 | 1 | 1 |
isSupportedCipherSuite(TlsCrypto, int) | ![]() | 0% | ![]() | 0% | 7 | 7 | 11 | 11 | 1 | 1 |
processClientCertificate(TlsServerContext, Certificate, TlsKeyExchange, TlsServer) | ![]() | 0% | ![]() | 0% | 4 | 4 | 11 | 11 | 1 | 1 |
areCertificatesEqual(Certificate, Certificate) | ![]() | 0% | ![]() | 0% | 4 | 4 | 10 | 10 | 1 | 1 |
checkExtensionData13(Hashtable, int, short) | ![]() | 0% | ![]() | 0% | 4 | 4 | 7 | 7 | 1 | 1 |
getCommonCipherSuite13(ProtocolVersion, int[], int[], boolean) | ![]() | 0% | ![]() | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
retainAll(short[], short[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
addPreSharedKeyToClientExtensions(TlsPSK[], Hashtable) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
writeDowngradeMarker(ProtocolVersion, byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 8 | 8 | 1 | 1 |
generate13CertificateVerify(TlsContext, TlsCredentialedSigner, TlsHandshakeHash) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
hasAnyRSASigAlgs(TlsCrypto) | ![]() | 0% | ![]() | 0% | 8 | 8 | 7 | 7 | 1 | 1 |
calculatePSKBinder(TlsCrypto, boolean, int, TlsSecret, byte[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
initCipher(TlsContext) | ![]() | 0% | ![]() | 0% | 3 | 3 | 7 | 7 | 1 | 1 |
readUint24(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
constantTimeAreEqual(int, byte[], int, byte[], int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
isValidSignatureAlgorithmForServerKeyExchange(short, int) | ![]() | 0% | ![]() | 0% | 9 | 9 | 10 | 10 | 1 | 1 |
trackHashAlgorithms(TlsHandshakeHash, Vector) | ![]() | 0% | ![]() | 0% | 4 | 4 | 9 | 9 | 1 | 1 |
getKeyExchangeAlgorithms(int[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
isValidVersionForCipherSuite(int, ProtocolVersion) | ![]() | 0% | ![]() | 0% | 5 | 5 | 8 | 8 | 1 | 1 |
update13TrafficSecret(TlsContext, boolean) | ![]() | 0% | ![]() | 0% | 3 | 3 | 9 | 9 | 1 | 1 |
writeUint32(long, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
readASN1Object(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 7 | 7 | 1 | 1 |
getSupportedSignatureAlgorithms(TlsContext, Vector) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
calculateMasterSecret(TlsContext, TlsSecret) | ![]() | 0% | ![]() | 0% | 2 | 2 | 7 | 7 | 1 | 1 |
getOIDForHashAlgorithm(short) | ![]() | 0% | ![]() | 0% | 7 | 7 | 8 | 8 | 1 | 1 |
normalizeCertificateRequest(CertificateRequest, short[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 7 | 7 | 1 | 1 |
negotiatedVersion(SecurityParameters) | ![]() | 0% | ![]() | 0% | 4 | 4 | 9 | 9 | 1 | 1 |
getPSKIndices(TlsPSK[], int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
static {...} | ![]() | 0% | n/a | 1 | 1 | 9 | 9 | 1 | 1 | |
readUint24(InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
readAllOrNothing(int, InputStream) | ![]() | 0% | ![]() | 0% | 4 | 4 | 9 | 9 | 1 | 1 |
getLegacySupportedSignatureAlgorithms() | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
establish13TrafficSecrets(TlsContext, byte[], TlsSecret, String, String, RecordStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
writeUint24(int, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
isNullOrContainsNull(Object[]) | ![]() | 0% | ![]() | 0% | 4 | 4 | 7 | 7 | 1 | 1 |
concat(byte[], byte[]) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
establish13PhaseEarly(TlsContext, byte[], RecordStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
getHashAlgorithmForPRFAlgorithm(int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
sendSignatureInput(TlsContext, byte[], DigestInputBuffer, OutputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 8 | 8 | 1 | 1 |
validateCertificateRequest(CertificateRequest, TlsKeyExchange) | ![]() | 0% | ![]() | 0% | 3 | 3 | 7 | 7 | 1 | 1 |
encodeOpaque16(byte[]) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
encodeOpaque24(byte[]) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
selectKeyShare(Vector, int) | ![]() | 0% | ![]() | 0% | 5 | 5 | 5 | 5 | 1 | 1 |
getPSKEarlySecrets(TlsCrypto, TlsPSK[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
readUint48(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
establish13PhaseHandshake(TlsContext, byte[], RecordStream) | ![]() | 0% | n/a | 1 | 1 | 6 | 6 | 1 | 1 | |
containsSignatureAlgorithm(Vector, SignatureAndHashAlgorithm) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
containsAnySignatureAlgorithm(Vector, short) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
establish13PhaseApplication(TlsContext, byte[], RecordStream) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
containsNonAscii(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
establishServerSigAlgs(SecurityParameters, CertificateRequest) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
getSessionMasterSecret(TlsCrypto, TlsSecret) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
decodeUint8(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
decodeUint16(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
decodeUint32(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
isValidKeyShareSelection(ProtocolVersion, int[], Hashtable, int) | ![]() | 0% | ![]() | 0% | 5 | 5 | 4 | 4 | 1 | 1 |
skip13ServerCertificate(TlsClientContext) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
getSessionID(TlsSession) | ![]() | 0% | ![]() | 0% | 5 | 5 | 5 | 5 | 1 | 1 |
negotiatedVersionDTLSClient(TlsClientContext, TlsClient) | ![]() | 0% | ![]() | 0% | 2 | 2 | 7 | 7 | 1 | 1 |
negotiatedVersionTLSClient(TlsClientContext, TlsClient) | ![]() | 0% | ![]() | 0% | 2 | 2 | 7 | 7 | 1 | 1 |
readUint16(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
readFully(int, InputStream) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
calculateFinishedHMAC(int, int, TlsSecret, byte[]) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
checkDowngradeMarker(byte[], byte[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
containsNonAscii(String) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
writeOpaque8(byte[], byte[], int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeOpaque16(byte[], byte[], int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeOpaque24(byte[], byte[], int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeUint16ArrayWithUint8Length(int[], byte[], int) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
writeUint16ArrayWithUint16Length(int[], byte[], int) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
readUint16(InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
readUint48(InputStream) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
readOpaque8(InputStream, int, int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
addToSet(Vector, int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
hasExpectedEmptyExtensionData(Hashtable, Integer, short) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
verify13CertificateVerifyClient(TlsServerContext, TlsHandshakeHash, CertificateVerify) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
verify13CertificateVerifyServer(TlsClientContext, TlsHandshakeHash, CertificateVerify) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
contains(short[], int, int, int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
contains(int[], int, int, int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
containsAll(short[], short[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
checkDowngradeMarker(ProtocolVersion, byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
generateEncryptedPreMasterSecret(TlsContext, TlsEncryptor, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
writeUint24(int, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
readUint8Array(int, InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
readUint16Array(int, InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
getSignatureAndHashAlgorithm(ProtocolVersion, TlsCredentialedSigner) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
clone(String[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
isValidCipherSuiteSelection(int[], int) | ![]() | 0% | ![]() | 0% | 5 | 5 | 3 | 3 | 1 | 1 |
truncate(short[], int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
truncate(int[], int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
isSafeRenegotiationServerCertificate(TlsClientContext, Certificate) | ![]() | 0% | ![]() | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
negotiatedVersionDTLSServer(TlsServerContext) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
negotiatedVersionTLSServer(TlsServerContext) | ![]() | 0% | ![]() | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
writeUint8Array(short[], byte[], int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
writeUint16Array(int[], byte[], int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
encodeUint16ArrayWithUint8Length(int[]) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
encodeUint16ArrayWithUint16Length(int[]) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
readVersion(InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
isExtendedMasterSecretOptionalTLS(ProtocolVersion[]) | ![]() | 0% | ![]() | 0% | 4 | 4 | 3 | 3 | 1 | 1 |
clone(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
validate13Credentials(TlsCredentials) | ![]() | 0% | ![]() | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
deriveSecret(int, int, TlsSecret, String, byte[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
writeUint16(int, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
writeUint8ArrayWithUint8Length(short[], byte[], int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
encodeVersion(ProtocolVersion) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
readFully(byte[], InputStream) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
readOpaque8(InputStream, int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
readOpaque16(InputStream, int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
readOpaque24(InputStream, int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
readUint8ArrayWithUint8Length(InputStream, int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
writeVersion(ProtocolVersion, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
addIfSupported(Vector, TlsCrypto, int[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
copyOfRangeExact(byte[], int, int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeUint8Array(short[], OutputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
writeUint16Array(int[], OutputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
writeUint16ArrayWithUint16Length(int[], OutputStream) | ![]() | 0% | n/a | 1 | 1 | 5 | 5 | 1 | 1 | |
readVersion(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
requireDEREncoding(ASN1Object, byte[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
getDefaultSignatureAlgorithms(short) | ![]() | 0% | ![]() | 0% | 2 | 2 | 2 | 2 | 1 | 1 |
initKeyExchangeClient(TlsClientContext, TlsClient) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
initKeyExchangeServer(TlsServerContext, TlsServer) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
checkClientCertificateType(CertificateRequest, short, short) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
deriveSecret(SecurityParameters, TlsSecret, String, byte[]) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
encodeUint8ArrayWithUint8Length(short[]) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
readUint8(InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
isExtendedMasterSecretOptionalDTLS(ProtocolVersion[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 2 | 2 | 1 | 1 |
isSignatureAlgorithmsExtensionAllowed(ProtocolVersion) | ![]() | 0% | ![]() | 0% | 3 | 3 | 2 | 2 | 1 | 1 |
calculateFinishedHMAC(SecurityParameters, TlsSecret, byte[]) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
getMACAlgorithm(int) | ![]() | 0% | ![]() | 0% | 5 | 5 | 6 | 6 | 1 | 1 |
getPSKEarlySecret(TlsCrypto, TlsPSK) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeOpaque8(byte[], OutputStream) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeOpaque16(byte[], OutputStream) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeOpaque24(byte[], OutputStream) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
writeUint8ArrayWithUint8Length(short[], OutputStream) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
encodeUint8(short) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
encodeUint16(int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
encodeUint24(int) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
encodeUint32(long) | ![]() | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | |
isNullOrEmpty(byte[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
isNullOrEmpty(short[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
isNullOrEmpty(int[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
isNullOrEmpty(Object[]) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
isNullOrEmpty(String) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
checkPeerSigAlgs(TlsContext, TlsCertificate[]) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
requireAgreementCredentials(TlsCredentials) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
requireDecryptorCredentials(TlsCredentials) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
requireSignerCredentials(TlsCredentials) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
writeEncryptedPMS(TlsContext, byte[], OutputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
isValidUint8(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint16(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint24(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint32(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint48(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
getExtensionData(Hashtable, Integer) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isNullOrEmpty(Vector) | ![]() | 0% | ![]() | 0% | 3 | 3 | 1 | 1 | 1 | 1 |
getLegacyClientCertType(short) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
getLegacySignatureAlgorithmClient(short) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
getLegacySignatureAlgorithmClientCert(short) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
getLegacySignatureAlgorithmServer(int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
getLegacySignatureAlgorithmServerCert(int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
getPRFAlgorithm13(int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
vectorOfOne(Object) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
getEncryptionAlgorithmType(int) | ![]() | 0% | ![]() | 0% | 4 | 4 | 5 | 5 | 1 | 1 |
checkUint8(short) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint8(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint8(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint16(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint16(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint24(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint24(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint32(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint48(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
checkUint64(long) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
isValidUint8(short) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint8(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint16(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isValidUint24(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
writeUint16(int, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
encodeOpaque8(byte[]) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
writeVersion(ProtocolVersion, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
addIfSupported(Vector, TlsCrypto, int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
update13TrafficSecretPeer(TlsContext) | ![]() | 0% | ![]() | 0% | 2 | 2 | 2 | 2 | 1 | 1 |
update13TrafficSecret(SecurityParameters, TlsSecret) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
trackHashAlgorithmClient(TlsHandshakeHash, SignatureAndHashAlgorithm) | ![]() | 0% | ![]() | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
readEncryptedPMS(TlsContext, InputStream) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
establishClientSigAlgs(SecurityParameters, Hashtable) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
readDERObject(byte[]) | ![]() | 0% | n/a | 1 | 1 | 3 | 3 | 1 | 1 | |
addIfSupported(Vector, TlsCrypto, SignatureAndHashAlgorithm) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
getDefaultSignatureAlgorithm(short) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
PRF(SecurityParameters, TlsSecret, String, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
PRF(TlsContext, TlsSecret, String, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
calculateEndPointHash(TlsContext, TlsCertificate, byte[]) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getMinimumVersion(int) | ![]() | 0% | ![]() | 0% | 3 | 3 | 4 | 4 | 1 | 1 |
isAEADCipherSuite(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isBlockCipherSuite(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
isStreamCipherSuite(int) | ![]() | 0% | ![]() | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
addCertSigAlgOID(Hashtable, ASN1ObjectIdentifier, SignatureAndHashAlgorithm) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
addCertSigAlgOID(Hashtable, ASN1ObjectIdentifier, short, short) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
readUint8(byte[], int) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
readOpaque8(InputStream) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
readOpaque16(InputStream) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
readOpaque24(InputStream) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
isValidSignatureSchemeForServerKeyExchange(int, int) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
getSupportedCipherSuites(TlsCrypto, int[]) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
writeUint8(short, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
writeUint8(int, byte[], int) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
importSession(byte[], SessionParameters) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
hasSigningCapability(short) | ![]() | 0% | ![]() | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
getCipherType(int) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
chooseSignatureAndHashAlgorithm(TlsContext, Vector, short) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getSupportedCipherSuites(TlsCrypto, int[], int) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv10(ProtocolVersion) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv11(ProtocolVersion) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv12(ProtocolVersion) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv13(ProtocolVersion) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getSignatureAndHashAlgorithm(TlsContext, TlsCredentialedSigner) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
verifySupportedSignatureAlgorithm(Vector, SignatureAndHashAlgorithm) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
update13TrafficSecretLocal(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
createHash(TlsCrypto, short) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
createHash(TlsCrypto, SignatureAndHashAlgorithm) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
establishClientCredentials(TlsAuthentication, CertificateRequest) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
establish13ClientCredentials(TlsAuthentication, CertificateRequest) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isSSL(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv10(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv11(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv12(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isTLSv13(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
writeUint8(short, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
writeUint8(int, OutputStream) | ![]() | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | |
decodeOpaque8(byte[]) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
decodeOpaque16(byte[]) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getDefaultSupportedSignatureAlgorithms(TlsContext) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getNamedGroupRoles(int[]) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isValidCipherSuiteForVersion(int, ProtocolVersion) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getCurrentPRFHash(TlsHandshakeHash) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
establishServerCredentials(TlsServer) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
establish13ServerCredentials(TlsServer) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
TlsUtils() | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getDefaultDSSSignatureAlgorithms() | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getDefaultECDSASignatureAlgorithms() | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
getDefaultRSASignatureAlgorithms() | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | |
isValidUint64(long) | ![]() | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 |