| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| H A D | 70-test_tls13kexmodes.t | 36 [TLSProxy::Message::MT_CLIENT_HELLO, 38 [TLSProxy::Message::MT_SERVER_HELLO, 40 [TLSProxy::Message::MT_CLIENT_HELLO, 42 [TLSProxy::Message::MT_SERVER_HELLO, 44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 48 [TLSProxy::Message::MT_CERTIFICATE, 50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 52 [TLSProxy::Message::MT_FINISHED, 54 [TLSProxy::Message::MT_CERTIFICATE, [all …]
|
| H A D | 70-test_tls13messages.t | 36 [TLSProxy::Message::MT_CLIENT_HELLO, 38 [TLSProxy::Message::MT_SERVER_HELLO, 40 [TLSProxy::Message::MT_CLIENT_HELLO, 42 [TLSProxy::Message::MT_SERVER_HELLO, 44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 48 [TLSProxy::Message::MT_CERTIFICATE, 50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 52 [TLSProxy::Message::MT_FINISHED, 54 [TLSProxy::Message::MT_CERTIFICATE, [all …]
|
| H A D | 70-test_sslmessages.t | 43 [TLSProxy::Message::MT_CLIENT_HELLO, 45 [TLSProxy::Message::MT_SERVER_HELLO, 47 [TLSProxy::Message::MT_CERTIFICATE, 51 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE, 53 [TLSProxy::Message::MT_CERTIFICATE_STATUS, 56 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 58 [TLSProxy::Message::MT_SERVER_HELLO_DONE, 61 [TLSProxy::Message::MT_CERTIFICATE, 63 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE, 66 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, [all …]
|
| H A D | 70-test_sslsigalgs.t | 59 ok(TLSProxy::Message->success, "Default sigalgs"); 71 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 77 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 83 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 90 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 98 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 106 ok(TLSProxy::Message->fail, 119 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs"); 133 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server"); 148 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1"); [all …]
|
| H A D | 70-test_key_share.t | 80 ok(TLSProxy::Message->success(), "Success after HRR"); 86 ok(TLSProxy::Message->fail(), "Server asks for group already provided"); 92 ok(TLSProxy::Message->fail(), "Missing key_shares extension"); 100 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 108 ok(TLSProxy::Message->fail(), "No acceptable key_shares"); 114 ok(TLSProxy::Message->success(), "Non preferred key_share"); 122 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 129 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups"); 135 ok(TLSProxy::Message->fail(), "Group id too short"); 141 ok(TLSProxy::Message->fail(), "key_exchange length mismatch"); [all …]
|
| H A D | 70-test_sslsessiontick.t | 144 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test"); 154 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test"); 161 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 172 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 181 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 182 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, ""); 208 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 211 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, ""); 225 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO 226 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { [all …]
|
| H A D | 70-test_sslversions.t | 60 ok(TLSProxy::Message->fail(), "Empty supported versions"); 67 ok(TLSProxy::Message->fail(), "No recognised versions"); 74 ok(TLSProxy::Message->success() 82 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)"); 90 ok(TLSProxy::Message->success() 101 ok(TLSProxy::Message->success() 110 ok(TLSProxy::Message->success() 119 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions"); 142 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 170 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext); [all …]
|
| H A D | 70-test_tlsextms.t | 141 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption"); 158 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1"); 175 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2"); 195 if ($crmextms && $message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 196 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET); 199 if ($srmextms && $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 200 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET); 213 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO 214 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 218 $extensions{TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET}) { [all …]
|
| H A D | 70-test_tls13downgrade.t | 49 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2"); 55 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.1"); 62 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.2 to TLSv1.1"); 70 my $alert = TLSProxy::Message->alert(); 71 ok(TLSProxy::Message->fail() 73 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER, 83 ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole"); 90 ok(TLSProxy::Message->success(), "TLSv1.2 server-side protocol hole"); 107 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 121 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
|
| H A D | 70-test_sslextension.t | 72 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 94 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, ""); 95 $message->dupext(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION); 107 inject_duplicate_extension($proxy, TLSProxy::Message::MT_CLIENT_HELLO); 123 inject_duplicate_extension($proxy, TLSProxy::Message::MT_SERVER_HELLO); 156 if $message->mt != TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS; 167 $type = TLSProxy::Message::EXT_SERVER_NAME; 169 $type = TLSProxy::Message::EXT_SCT; 171 $type = TLSProxy::Message::EXT_SUPPORTED_GROUPS; 188 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, ""); [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ |
| H A D | 70-test_tls13kexmodes.t | 38 [TLSProxy::Message::MT_CLIENT_HELLO, 40 [TLSProxy::Message::MT_SERVER_HELLO, 42 [TLSProxy::Message::MT_CLIENT_HELLO, 44 [TLSProxy::Message::MT_SERVER_HELLO, 46 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 48 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 50 [TLSProxy::Message::MT_CERTIFICATE, 52 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 54 [TLSProxy::Message::MT_FINISHED, 56 [TLSProxy::Message::MT_CERTIFICATE, [all …]
|
| H A D | 70-test_tls13messages.t | 37 [TLSProxy::Message::MT_CLIENT_HELLO, 39 [TLSProxy::Message::MT_SERVER_HELLO, 41 [TLSProxy::Message::MT_CLIENT_HELLO, 43 [TLSProxy::Message::MT_SERVER_HELLO, 45 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 47 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 49 [TLSProxy::Message::MT_CERTIFICATE, 51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 53 [TLSProxy::Message::MT_FINISHED, 55 [TLSProxy::Message::MT_CERTIFICATE, [all …]
|
| H A D | 70-test_sslmessages.t | 42 [TLSProxy::Message::MT_CLIENT_HELLO, 44 [TLSProxy::Message::MT_SERVER_HELLO, 46 [TLSProxy::Message::MT_CERTIFICATE, 50 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE, 52 [TLSProxy::Message::MT_CERTIFICATE_STATUS, 55 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 57 [TLSProxy::Message::MT_SERVER_HELLO_DONE, 60 [TLSProxy::Message::MT_CERTIFICATE, 62 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE, 65 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, [all …]
|
| H A D | 70-test_sslsigalgs.t | 60 ok(TLSProxy::Message->success, "Default sigalgs"); 73 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 79 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 85 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 92 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 100 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 108 ok(TLSProxy::Message->fail, 121 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs"); 135 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server"); 150 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0"); [all …]
|
| H A D | 70-test_key_share.t | 90 ok(TLSProxy::Message->success(), "Success after HRR"); 96 ok(TLSProxy::Message->fail(), "Server asks for group already provided"); 102 ok(TLSProxy::Message->fail(), "Missing key_shares extension"); 114 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 130 ok(TLSProxy::Message->fail(), "No acceptable key_shares"); 141 ok(TLSProxy::Message->success(), "Non preferred key_share"); 152 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 160 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups"); 166 ok(TLSProxy::Message->fail(), "Group id too short"); 172 ok(TLSProxy::Message->fail(), "key_exchange length mismatch"); [all …]
|
| H A D | 70-test_sslsessiontick.t | 144 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test"); 154 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test"); 161 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 172 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 181 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 182 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, ""); 208 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 211 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, ""); 225 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO 226 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { [all …]
|
| H A D | 70-test_tlsextms.t | 139 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption"); 156 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1"); 173 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2"); 196 if ($crmextms && $message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 197 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET); 200 if ($srmextms && $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 201 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET); 214 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO 215 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 219 $extensions{TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET}) { [all …]
|
| H A D | 70-test_tls13downgrade.t | 51 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2"); 57 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.1"); 64 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.2 to TLSv1.1"); 72 my $alert = TLSProxy::Message->alert(); 73 ok(TLSProxy::Message->fail() 75 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER, 86 ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole"); 93 ok(TLSProxy::Message->success(), "TLSv1.2 server-side protocol hole"); 110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 124 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
|
| H A D | 70-test_sslversions.t | 63 ok(TLSProxy::Message->fail(), "Empty supported versions"); 70 ok(TLSProxy::Message->fail(), "No recognised versions"); 77 ok(TLSProxy::Message->success() 85 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)"); 93 ok(TLSProxy::Message->success() 106 ok(TLSProxy::Message->success() 115 ok(TLSProxy::Message->success() 124 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions"); 147 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 175 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext); [all …]
|
| H A D | 70-test_sslextension.t | 72 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 94 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, ""); 95 $message->dupext(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION); 107 inject_duplicate_extension($proxy, TLSProxy::Message::MT_CLIENT_HELLO); 123 inject_duplicate_extension($proxy, TLSProxy::Message::MT_SERVER_HELLO); 156 if $message->mt != TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS; 167 $type = TLSProxy::Message::EXT_SERVER_NAME; 169 $type = TLSProxy::Message::EXT_SCT; 171 $type = TLSProxy::Message::EXT_SUPPORTED_GROUPS; 188 $message->set_extension(TLSProxy::Message::EXT_CRYPTOPRO_BUG_EXTENSION, ""); [all …]
|
| H A D | 70-test_tls13psk.t | 54 ok(TLSProxy::Message->success(), "Initial connection"); 62 ok(TLSProxy::Message->fail(), "PSK not last"); 77 my $ch2seen = defined $ch2 && $ch2->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 79 && defined ${$ch2->{extension_data}}{TLSProxy::Message::EXT_PSK}; 100 $ch2seen = defined $ch2 && $ch2->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 102 && defined ${$ch2->extension_data}{TLSProxy::Message::EXT_PSK}; 111 ok(TLSProxy::Message->success(), "Remove sig algs"); 137 || $message->mt != TLSProxy::Message::MT_CLIENT_HELLO); 140 $message->set_extension(TLSProxy::Message::EXT_FORCE_LAST, ""); 143 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_GROUPS, ""); [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/util/perl/ |
| H A D | checkhandshake.pm | 79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO 80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO); 112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO; 115 next if ($message->mt() != TLSProxy::Message::MT_CLIENT_HELLO 116 && $message->mt() != TLSProxy::Message::MT_SERVER_HELLO 118 TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS 119 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE 120 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE_REQUEST); 122 next if $message->mt() == TLSProxy::Message::MT_CERTIFICATE [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/ |
| H A D | checkhandshake.pm | 79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO 80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO); 112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO; 115 next if ($message->mt() != TLSProxy::Message::MT_CLIENT_HELLO 116 && $message->mt() != TLSProxy::Message::MT_SERVER_HELLO 118 TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS 119 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE 120 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE_REQUEST); 122 next if $message->mt() == TLSProxy::Message::MT_CERTIFICATE [all …]
|
| /netbsd-src/external/apache2/llvm/dist/llvm/utils/unittest/googletest/include/gtest/ |
| H A D | gtest-message.h | 91 class GTEST_API_ Message { 99 Message(); 102 Message(const Message& msg) : ss_(new ::std::stringstream) { // NOLINT in Message() function 107 explicit Message(const char* str) : ss_(new ::std::stringstream) { in Message() function 113 inline Message& operator <<(const T& val) { 147 inline Message& operator <<(T* const& pointer) { // NOLINT 162 Message& operator <<(BasicNarrowIoManip val) { 168 Message& operator <<(bool b) { 174 Message& operator <<(const wchar_t* wide_c_str); 175 Message& operator <<(wchar_t* wide_c_str); [all …]
|
| /netbsd-src/external/apache2/llvm/dist/clang/lib/Tooling/Core/ |
| H A D | Diagnostic.cpp | 21 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message) in DiagnosticMessage() argument 22 : Message(Message), FileOffset(0) {} in DiagnosticMessage() 24 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message, in DiagnosticMessage() argument 27 : Message(Message), FileOffset(0) { in DiagnosticMessage() 54 const DiagnosticMessage &Message, in Diagnostic() argument 57 : DiagnosticName(DiagnosticName), Message(Message), Notes(Notes), in Diagnostic() 61 if (!D.Message.Fix.empty()) in selectFirstFix() 62 return &D.Message.Fix; in selectFirstFix()
|