Home | History | Annotate | Download | only in runner

Lines Matching defs:dtls

120 	dtls
159 // expectedSRTPProtectionProfile is the DTLS-SRTP profile that
217 // to replay every write it makes in DTLS tests.
250 if test.protocol == dtls {
262 isDatagram: test.protocol == dtls,
293 if test.protocol == dtls {
300 if test.protocol == dtls {
442 if test.protocol == dtls {
443 return fmt.Errorf("messageLen < 0 not supported for DTLS tests")
479 if test.protocol == dtls {
610 if test.protocol == dtls {
611 flags = append(flags, "-dtls")
1093 protocol: dtls,
1095 name: "Alert-DTLS",
1117 protocol: dtls,
1119 name: "FragmentAlert-DTLS",
1296 protocol: dtls,
1297 name: "DisableEverything-DTLS",
1311 protocol: dtls,
1322 protocol: dtls,
1332 expectedLocalError: "dtls: exceeded maximum packet length",
1376 protocol: dtls,
1381 protocol: dtls,
1407 protocol: dtls,
1408 name: "AppDataBeforeHandshake-DTLS",
1418 protocol: dtls,
1419 name: "AppDataBeforeHandshake-DTLS-Empty",
1449 protocol: dtls,
1450 name: "AppDataAfterChangeCipherSpec-DTLS",
1456 // BoringSSL's DTLS implementation will drop the out-of-order
1460 protocol: dtls,
1461 name: "AppDataAfterChangeCipherSpec-DTLS-Empty",
1467 // BoringSSL's DTLS implementation will drop the out-of-order
1481 protocol: dtls,
1482 name: "AlertAfterChangeCipherSpec-DTLS",
1492 protocol: dtls,
1493 name: "ReorderHandshakeFragments-Small-DTLS",
1504 protocol: dtls,
1505 name: "ReorderHandshakeFragments-Large-DTLS",
1516 protocol: dtls,
1517 name: "MixCompleteMessageWithFragments-DTLS",
1537 protocol: dtls,
1538 name: "SendInvalidRecordType-DTLS",
1608 protocol: dtls,
1609 name: "WrongMessageType-DTLS",
1620 protocol: dtls,
1621 name: "FragmentMessageTypeMismatch-DTLS",
1632 protocol: dtls,
1633 name: "FragmentMessageLengthMismatch-DTLS",
1644 protocol: dtls,
1645 name: "SplitFragments-Header-DTLS",
1655 protocol: dtls,
1656 name: "SplitFragments-Boundary-DTLS",
1666 protocol: dtls,
1667 name: "SplitFragments-Body-DTLS",
1677 protocol: dtls,
1678 name: "SendEmptyFragments-DTLS",
1838 protocol: dtls,
1847 protocol: dtls,
1857 protocol: dtls,
1869 protocol: dtls,
1870 name: "NoRC4-DTLS",
1902 protocol: dtls,
1903 name: "SendWarningAlerts-DTLS-Pass",
1961 protocol: dtls,
1962 name: "LargePlaintext-DTLS",
1984 protocol: dtls,
1985 name: "LargeCiphertext-DTLS",
1992 // Unlike the other four cases, DTLS drops records which
2040 protocol: dtls,
2041 name: "BadChangeCipherSpec-DTLS-1",
2051 protocol: dtls,
2052 name: "BadChangeCipherSpec-DTLS-2",
2177 protocol: dtls,
2192 protocol: dtls,
2210 // Ensure both TLS and DTLS accept their maximum record sizes.
2224 protocol: dtls,
2225 name: suite.name + "-LargeRecord-DTLS",
3057 if protocol == dtls {
3058 test.name += "-DTLS"
3069 if protocol == dtls {
3120 protocols = append(protocols, dtls)
3129 if protocol == dtls {
3130 suffix += "-DTLS"
3133 shimVersFlag := strconv.Itoa(int(versionToWire(shimVers.version, protocol == dtls)))
3208 protocols = append(protocols, dtls)
3212 if protocol == dtls {
3213 suffix += "-DTLS"
3215 shimVersFlag := strconv.Itoa(int(versionToWire(shimVers.version, protocol == dtls)))
3537 // Basic DTLS-SRTP tests. Include fake profiles to ensure they
3540 protocol: dtls,
3552 protocol: dtls,
3566 protocol: dtls,
3584 protocol: dtls,
3599 protocol: dtls,
3716 protocols = append(protocols, dtls)
3720 if protocol == dtls {
3721 suffix += "-DTLS"
4047 protocol: dtls,
4048 name: "DTLS-Replay",
4056 protocol: dtls,
4057 name: "DTLS-Replay-LargeGaps",
4071 protocol: dtls,
4072 name: "DTLS-Replay-NonMonotonic",
4336 protocol: dtls,
4337 name: "DTLS-Retransmit-Client-" + number,
4347 protocol: dtls,
4349 name: "DTLS-Retransmit-Server-" + number,
4363 protocol: dtls,
4364 name: "DTLS-Retransmit-Timeout",
4379 protocol: dtls,
4380 name: "DTLS-Retransmit-Fudge",
4396 protocol: dtls,
4397 name: "DTLS-Retransmit-Fragmented",
4829 for _, protocol := range []protocol{tls, dtls} {