Home
last modified time | relevance | path

Searched refs:Message (Results 1 – 25 of 763) sorted by relevance

12345678910>>...31

/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D70-test_tls13kexmodes.t36 [TLSProxy::Message::MT_CLIENT_HELLO,
38 [TLSProxy::Message::MT_SERVER_HELLO,
40 [TLSProxy::Message::MT_CLIENT_HELLO,
42 [TLSProxy::Message::MT_SERVER_HELLO,
44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
48 [TLSProxy::Message::MT_CERTIFICATE,
50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
52 [TLSProxy::Message::MT_FINISHED,
54 [TLSProxy::Message::MT_CERTIFICATE,
[all …]
H A D70-test_tls13messages.t36 [TLSProxy::Message::MT_CLIENT_HELLO,
38 [TLSProxy::Message::MT_SERVER_HELLO,
40 [TLSProxy::Message::MT_CLIENT_HELLO,
42 [TLSProxy::Message::MT_SERVER_HELLO,
44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
48 [TLSProxy::Message::MT_CERTIFICATE,
50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
52 [TLSProxy::Message::MT_FINISHED,
54 [TLSProxy::Message::MT_CERTIFICATE,
[all …]
H A D70-test_sslmessages.t43 [TLSProxy::Message::MT_CLIENT_HELLO,
45 [TLSProxy::Message::MT_SERVER_HELLO,
47 [TLSProxy::Message::MT_CERTIFICATE,
51 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
53 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
56 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
58 [TLSProxy::Message::MT_SERVER_HELLO_DONE,
61 [TLSProxy::Message::MT_CERTIFICATE,
63 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
66 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
[all …]
H A D70-test_sslsigalgs.t59 ok(TLSProxy::Message->success, "Default sigalgs");
71 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
77 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
83 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
90 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
98 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
106 ok(TLSProxy::Message->fail,
119 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
133 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
148 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1");
[all …]
H A D70-test_key_share.t80 ok(TLSProxy::Message->success(), "Success after HRR");
86 ok(TLSProxy::Message->fail(), "Server asks for group already provided");
92 ok(TLSProxy::Message->fail(), "Missing key_shares extension");
100 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
108 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
114 ok(TLSProxy::Message->success(), "Non preferred key_share");
122 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
129 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
135 ok(TLSProxy::Message->fail(), "Group id too short");
141 ok(TLSProxy::Message->fail(), "key_exchange length mismatch");
[all …]
H A D70-test_sslsessiontick.t144 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test");
154 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test");
161 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
172 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
181 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
182 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, "");
208 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
211 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, "");
225 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
226 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
[all …]
H A D70-test_sslversions.t60 ok(TLSProxy::Message->fail(), "Empty supported versions");
67 ok(TLSProxy::Message->fail(), "No recognised versions");
74 ok(TLSProxy::Message->success()
82 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)");
90 ok(TLSProxy::Message->success()
101 ok(TLSProxy::Message->success()
110 ok(TLSProxy::Message->success()
119 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions");
142 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
170 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
[all …]
H A D70-test_tlsextms.t141 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption");
158 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1");
175 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2");
195 if ($crmextms && $message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
196 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET);
199 if ($srmextms && $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
200 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET);
213 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
214 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
218 $extensions{TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET}) {
[all …]
H A D70-test_tls13downgrade.t49 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2");
55 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.1");
62 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.2 to TLSv1.1");
70 my $alert = TLSProxy::Message->alert();
71 ok(TLSProxy::Message->fail()
73 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
83 ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole");
90 ok(TLSProxy::Message->success(), "TLSv1.2 server-side protocol hole");
107 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA);
121 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
H A D70-test_sslextension.t72 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
94 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, "");
95 $message->dupext(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION);
107 inject_duplicate_extension($proxy, TLSProxy::Message::MT_CLIENT_HELLO);
123 inject_duplicate_extension($proxy, TLSProxy::Message::MT_SERVER_HELLO);
156 if $message->mt != TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS;
167 $type = TLSProxy::Message::EXT_SERVER_NAME;
169 $type = TLSProxy::Message::EXT_SCT;
171 $type = TLSProxy::Message::EXT_SUPPORTED_GROUPS;
188 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, "");
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D70-test_tls13kexmodes.t38 [TLSProxy::Message::MT_CLIENT_HELLO,
40 [TLSProxy::Message::MT_SERVER_HELLO,
42 [TLSProxy::Message::MT_CLIENT_HELLO,
44 [TLSProxy::Message::MT_SERVER_HELLO,
46 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
48 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
50 [TLSProxy::Message::MT_CERTIFICATE,
52 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
54 [TLSProxy::Message::MT_FINISHED,
56 [TLSProxy::Message::MT_CERTIFICATE,
[all …]
H A D70-test_tls13messages.t37 [TLSProxy::Message::MT_CLIENT_HELLO,
39 [TLSProxy::Message::MT_SERVER_HELLO,
41 [TLSProxy::Message::MT_CLIENT_HELLO,
43 [TLSProxy::Message::MT_SERVER_HELLO,
45 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
47 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
49 [TLSProxy::Message::MT_CERTIFICATE,
51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
53 [TLSProxy::Message::MT_FINISHED,
55 [TLSProxy::Message::MT_CERTIFICATE,
[all …]
H A D70-test_sslmessages.t42 [TLSProxy::Message::MT_CLIENT_HELLO,
44 [TLSProxy::Message::MT_SERVER_HELLO,
46 [TLSProxy::Message::MT_CERTIFICATE,
50 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
52 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
55 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
57 [TLSProxy::Message::MT_SERVER_HELLO_DONE,
60 [TLSProxy::Message::MT_CERTIFICATE,
62 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
65 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
[all …]
H A D70-test_sslsigalgs.t60 ok(TLSProxy::Message->success, "Default sigalgs");
73 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
79 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
85 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
92 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
100 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
108 ok(TLSProxy::Message->fail,
121 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
135 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
150 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0");
[all …]
H A D70-test_key_share.t90 ok(TLSProxy::Message->success(), "Success after HRR");
96 ok(TLSProxy::Message->fail(), "Server asks for group already provided");
102 ok(TLSProxy::Message->fail(), "Missing key_shares extension");
114 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
130 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
141 ok(TLSProxy::Message->success(), "Non preferred key_share");
152 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
160 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
166 ok(TLSProxy::Message->fail(), "Group id too short");
172 ok(TLSProxy::Message->fail(), "key_exchange length mismatch");
[all …]
H A D70-test_sslsessiontick.t144 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test");
154 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test");
161 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
172 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
181 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
182 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, "");
208 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
211 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, "");
225 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
226 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
[all …]
H A D70-test_tlsextms.t139 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption");
156 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1");
173 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2");
196 if ($crmextms && $message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
197 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET);
200 if ($srmextms && $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
201 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET);
214 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
215 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
219 $extensions{TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET}) {
[all …]
H A D70-test_tls13downgrade.t51 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2");
57 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.1");
64 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.2 to TLSv1.1");
72 my $alert = TLSProxy::Message->alert();
73 ok(TLSProxy::Message->fail()
75 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
86 ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole");
93 ok(TLSProxy::Message->success(), "TLSv1.2 server-side protocol hole");
110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA);
124 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
H A D70-test_sslversions.t63 ok(TLSProxy::Message->fail(), "Empty supported versions");
70 ok(TLSProxy::Message->fail(), "No recognised versions");
77 ok(TLSProxy::Message->success()
85 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)");
93 ok(TLSProxy::Message->success()
106 ok(TLSProxy::Message->success()
115 ok(TLSProxy::Message->success()
124 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions");
147 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
175 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
[all …]
H A D70-test_sslextension.t72 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
94 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, "");
95 $message->dupext(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION);
107 inject_duplicate_extension($proxy, TLSProxy::Message::MT_CLIENT_HELLO);
123 inject_duplicate_extension($proxy, TLSProxy::Message::MT_SERVER_HELLO);
156 if $message->mt != TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS;
167 $type = TLSProxy::Message::EXT_SERVER_NAME;
169 $type = TLSProxy::Message::EXT_SCT;
171 $type = TLSProxy::Message::EXT_SUPPORTED_GROUPS;
188 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, "");
[all …]
H A D70-test_tls13psk.t54 ok(TLSProxy::Message->success(), "Initial connection");
62 ok(TLSProxy::Message->fail(), "PSK not last");
77 my $ch2seen = defined $ch2 && $ch2->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
79 && defined ${$ch2->{extension_data}}{TLSProxy::Message::EXT_PSK};
100 $ch2seen = defined $ch2 && $ch2->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
102 && defined ${$ch2->extension_data}{TLSProxy::Message::EXT_PSK};
111 ok(TLSProxy::Message->success(), "Remove sig algs");
137 || $message->mt != TLSProxy::Message::MT_CLIENT_HELLO);
140 $message->set_extension(TLSProxy::Message::EXT_FORCE_LAST, "");
143 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_GROUPS, "");
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/util/perl/
H A Dcheckhandshake.pm79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO
80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO);
112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO;
115 next if ($message->mt() != TLSProxy::Message::MT_CLIENT_HELLO
116 && $message->mt() != TLSProxy::Message::MT_SERVER_HELLO
118 TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS
119 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE
120 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE_REQUEST);
122 next if $message->mt() == TLSProxy::Message::MT_CERTIFICATE
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/
H A Dcheckhandshake.pm79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO
80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO);
112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO;
115 next if ($message->mt() != TLSProxy::Message::MT_CLIENT_HELLO
116 && $message->mt() != TLSProxy::Message::MT_SERVER_HELLO
118 TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS
119 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE
120 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE_REQUEST);
122 next if $message->mt() == TLSProxy::Message::MT_CERTIFICATE
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/utils/unittest/googletest/include/gtest/
H A Dgtest-message.h91 class GTEST_API_ Message {
99 Message();
102 Message(const Message& msg) : ss_(new ::std::stringstream) { // NOLINT in Message() function
107 explicit Message(const char* str) : ss_(new ::std::stringstream) { in Message() function
113 inline Message& operator <<(const T& val) {
147 inline Message& operator <<(T* const& pointer) { // NOLINT
162 Message& operator <<(BasicNarrowIoManip val) {
168 Message& operator <<(bool b) {
174 Message& operator <<(const wchar_t* wide_c_str);
175 Message& operator <<(wchar_t* wide_c_str);
[all …]
/netbsd-src/external/apache2/llvm/dist/clang/lib/Tooling/Core/
H A DDiagnostic.cpp21 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message) in DiagnosticMessage() argument
22 : Message(Message), FileOffset(0) {} in DiagnosticMessage()
24 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message, in DiagnosticMessage() argument
27 : Message(Message), FileOffset(0) { in DiagnosticMessage()
54 const DiagnosticMessage &Message, in Diagnostic() argument
57 : DiagnosticName(DiagnosticName), Message(Message), Notes(Notes), in Diagnostic()
61 if (!D.Message.Fix.empty()) in selectFirstFix()
62 return &D.Message.Fix; in selectFirstFix()

12345678910>>...31