Home
last modified time | relevance | path

Searched refs:Message (Results 1 – 25 of 477) sorted by relevance

12345678910>>...20

/src/crypto/openssl/test/recipes/
H A D70-test_tls13certcomp.t14 use TLSProxy::Message;
39 [TLSProxy::Message::MT_CLIENT_HELLO,
41 [TLSProxy::Message::MT_SERVER_HELLO,
43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
47 [TLSProxy::Message::MT_CERTIFICATE,
49 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE,
51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
53 [TLSProxy::Message::MT_FINISHED,
55 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE,
[all …]
H A D70-test_tls13messages.t35 [TLSProxy::Message::MT_CLIENT_HELLO,
37 [TLSProxy::Message::MT_SERVER_HELLO,
39 [TLSProxy::Message::MT_CLIENT_HELLO,
41 [TLSProxy::Message::MT_SERVER_HELLO,
43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
47 [TLSProxy::Message::MT_CERTIFICATE,
49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
51 [TLSProxy::Message::MT_FINISHED,
53 [TLSProxy::Message::MT_CERTIFICATE,
[all …]
H A D70-test_tls13kexmodes.t35 [TLSProxy::Message::MT_CLIENT_HELLO,
37 [TLSProxy::Message::MT_SERVER_HELLO,
39 [TLSProxy::Message::MT_CLIENT_HELLO,
41 [TLSProxy::Message::MT_SERVER_HELLO,
43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
47 [TLSProxy::Message::MT_CERTIFICATE,
49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
51 [TLSProxy::Message::MT_FINISHED,
53 [TLSProxy::Message::MT_CERTIFICATE,
[all …]
H A D70-test_sslmessages.t40 [TLSProxy::Message::MT_CLIENT_HELLO,
42 [TLSProxy::Message::MT_SERVER_HELLO,
44 [TLSProxy::Message::MT_CERTIFICATE,
48 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
50 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
53 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
55 [TLSProxy::Message::MT_SERVER_HELLO_DONE,
58 [TLSProxy::Message::MT_CERTIFICATE,
60 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
63 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
[all …]
H A D70-test_sslsigalgs.t73 ok(TLSProxy::Message->success, "Default sigalgs");
86 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
92 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
98 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
105 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
113 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
122 ok(TLSProxy::Message->fail,
140 ok(TLSProxy::Message->fail,
154 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
168 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
[all …]
H A D70-test_key_share.t88 ok(TLSProxy::Message->success(), "Success after HRR");
94 ok(TLSProxy::Message->fail(), "Server asks for group already provided");
100 ok(TLSProxy::Message->fail(), "Missing key_shares extension");
112 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
128 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
139 ok(TLSProxy::Message->success(), "Non preferred key_share");
150 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
158 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
164 ok(TLSProxy::Message->fail(), "Group id too short");
170 ok(TLSProxy::Message->fail(), "key_exchange length mismatch");
[all …]
H A D70-test_renegotiation.t44 ok(TLSProxy::Message->success(), "Basic renegotiation");
54 ok(TLSProxy::Message->fail(), "No client SCSV");
69 ok(TLSProxy::Message->fail(), "No client extension");
87 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
97 ok(TLSProxy::Message->success() && $chmatch,
113 ok(TLSProxy::Message->fail(), "client_sig_algs instead of sig_algs");
126 ok(TLSProxy::Message->fail(),
140 … my $clientHello = first { $_->mt == TLSProxy::Message::MT_CLIENT_HELLO } @{$proxy->message_list};
142 …my $has_ri_extension = exists $clientHello->extension_data()->{TLSProxy::Message::EXT_RENEGOTIATE};
158 … my $clientHello = first { $_->mt == TLSProxy::Message::MT_CLIENT_HELLO } @{$proxy->message_list};
[all …]
H A D70-test_sslsessiontick.t142 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test");
152 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test");
159 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
170 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
179 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
180 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, "");
206 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
209 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, "");
223 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
224 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
[all …]
H A D70-test_tlsextms.t137 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption");
154 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1");
171 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2");
194 if ($crmextms && $message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
195 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET);
198 if ($srmextms && $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
199 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET);
212 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
213 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
217 $extensions{TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET}) {
[all …]
H A D70-test_sslversions.t61 ok(TLSProxy::Message->fail(), "Empty supported versions");
68 ok(TLSProxy::Message->fail(), "No recognised versions");
75 ok(TLSProxy::Message->success()
83 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)");
91 ok(TLSProxy::Message->success()
104 ok(TLSProxy::Message->success()
113 ok(TLSProxy::Message->success()
122 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions");
145 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
173 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
[all …]
/src/contrib/googletest/googletest/test/
H A Dgoogletest-message-test.cc45 using ::testing::Message;
63 const Message msg; in TEST()
69 const Message msg1("Hello"); in TEST()
70 const Message msg2(msg1); in TEST()
76 Message msg("Hello"); in TEST()
82 const std::string s = (Message() << 1.23456F << " " << 2.34567F).GetString(); in TEST()
91 (Message() << 1260570880.4555497 << " " << 1260572265.1954534) in TEST()
102 EXPECT_NE("(null)", (Message() << p).GetString()); in TEST()
108 EXPECT_EQ("(null)", (Message() << p).GetString()); in TEST()
113 EXPECT_EQ("Foo", (Message() << "Foo").GetString()); in TEST()
[all …]
/src/crypto/openssl/util/perl/
H A Dcheckhandshake.pm84 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO
85 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO);
117 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
118 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO;
120 next if ($message->mt() != TLSProxy::Message::MT_CLIENT_HELLO
121 && $message->mt() != TLSProxy::Message::MT_SERVER_HELLO
123 TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS
124 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE
125 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE_REQUEST);
127 next if $message->mt() == TLSProxy::Message::MT_CERTIFICATE
[all …]
/src/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ml_dsa_65_wycheproof_sign.txt16 Sign-Message = ML-DSA-65:ML_DSA_65_1
24 Sign-Message = ML-DSA-65:ML_DSA_65_1
33 Sign-Message = ML-DSA-65:ML_DSA_65_1
42 Sign-Message = ML-DSA-65:ML_DSA_65_1
51 Sign-Message = ML-DSA-65:ML_DSA_65_1
61 Sign-Message = ML-DSA-65:ML_DSA_65_1
69 Sign-Message = ML-DSA-65:ML_DSA_65_1
77 Sign-Message = ML-DSA-65:ML_DSA_65_1
85 Sign-Message = ML-DSA-65:ML_DSA_65_1
93 Sign-Message = ML-DSA-65:ML_DSA_65_1
[all …]
H A Devppkey_ml_dsa_44_wycheproof_sign.txt16 Sign-Message = ML-DSA-44:ML_DSA_44_1
24 Sign-Message = ML-DSA-44:ML_DSA_44_1
33 Sign-Message = ML-DSA-44:ML_DSA_44_1
42 Sign-Message = ML-DSA-44:ML_DSA_44_1
51 Sign-Message = ML-DSA-44:ML_DSA_44_1
61 Sign-Message = ML-DSA-44:ML_DSA_44_1
69 Sign-Message = ML-DSA-44:ML_DSA_44_1
77 Sign-Message = ML-DSA-44:ML_DSA_44_1
85 Sign-Message = ML-DSA-44:ML_DSA_44_1
93 Sign-Message = ML-DSA-44:ML_DSA_44_1
[all …]
H A Devppkey_ml_dsa_65_wycheproof_verify.txt16 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
24 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
33 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
42 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
51 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
61 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
70 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
79 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
88 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
97 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1
[all …]
H A Devppkey_ml_dsa_87_wycheproof_verify.txt16 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
24 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
33 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
42 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
51 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
61 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
70 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
79 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
88 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
97 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1
[all …]
H A Devppkey_ml_dsa_87_wycheproof_sign.txt16 Sign-Message = ML-DSA-87:ML_DSA_87_1
24 Sign-Message = ML-DSA-87:ML_DSA_87_1
33 Sign-Message = ML-DSA-87:ML_DSA_87_1
42 Sign-Message = ML-DSA-87:ML_DSA_87_1
51 Sign-Message = ML-DSA-87:ML_DSA_87_1
61 Sign-Message = ML-DSA-87:ML_DSA_87_1
69 Sign-Message = ML-DSA-87:ML_DSA_87_1
77 Sign-Message = ML-DSA-87:ML_DSA_87_1
85 Sign-Message = ML-DSA-87:ML_DSA_87_1
93 Sign-Message = ML-DSA-87:ML_DSA_87_1
[all …]
H A Devppkey_ml_dsa_44_wycheproof_verify.txt16 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
24 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
33 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
42 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
51 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
61 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
70 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
79 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
88 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
97 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
[all …]
H A Devppkey_ml_dsa_siggen.txt15 Sign-Message = ML-DSA-44:ML_DSA_44_1
25 Sign-Message = ML-DSA-44:ML_DSA_44_2
36 Sign-Message = ML-DSA-44:ML_DSA_44_3
46 Sign-Message = ML-DSA-44:ML_DSA_44_4
57 Sign-Message = ML-DSA-44:ML_DSA_44_5
67 Sign-Message = ML-DSA-44:ML_DSA_44_6
78 Sign-Message = ML-DSA-44:ML_DSA_44_7
88 Sign-Message = ML-DSA-44:ML_DSA_44_8
99 Sign-Message = ML-DSA-44:ML_DSA_44_9
109 Sign-Message = ML-DSA-44:ML_DSA_44_10
[all …]
H A Devppkey_slh_dsa_siggen.txt15 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_1
25 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_2
36 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_3
47 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_4
58 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_5
69 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_6
80 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_7
91 Sign-Message = SLH-DSA-SHA2-192f:SLH_DSA_SHA2_192f_20
101 Sign-Message = SLH-DSA-SHA2-192f:SLH_DSA_SHA2_192f_21
112 Sign-Message = SLH-DSA-SHA2-192f:SLH_DSA_SHA2_192f_22
[all …]
H A Devppkey_ml_dsa_sigver.txt16 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1
27 Verify-Message-Public = ML-DSA-44:ML_DSA_44_2
39 Verify-Message-Public = ML-DSA-44:ML_DSA_44_3
50 Verify-Message-Public = ML-DSA-44:ML_DSA_44_4
62 Verify-Message-Public = ML-DSA-44:ML_DSA_44_5
73 Verify-Message-Public = ML-DSA-44:ML_DSA_44_6
85 Verify-Message-Public = ML-DSA-44:ML_DSA_44_7
95 Verify-Message-Public = ML-DSA-44:ML_DSA_44_8
106 Verify-Message-Public = ML-DSA-44:ML_DSA_44_9
117 Verify-Message-Public = ML-DSA-44:ML_DSA_44_10
[all …]
H A Devppkey_slh_dsa_sigver.txt16 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_1
28 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_2
40 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_3
52 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_4
64 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_5
76 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_6
88 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_7
100 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_8
112 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_9
123 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_10
[all …]
H A Devppkey_ecx_sigalg.txt78 Sign-Message = ED25519:ED25519-1
85 Sign-Message = ED25519:ED25519-2
92 Sign-Message = ED25519:ED25519-3
99 Sign-Message = ED25519:ED25519-4
106 Sign-Message = ED25519:ED25519-5
112 Verify-Message = ED25519:ED25519-1-PUBLIC
118 Verify-Message = ED25519:ED25519-1-PUBLIC
125 Verify-Message = ED25519:ED25519-1-PUBLIC
136 Sign-Message = ED25519:ED25519-1-Raw
141 Verify-Message = ED25519:ED25519-1-PUBLIC-Raw
[all …]
/src/contrib/googletest/googletest/include/gtest/
H A Dgtest-message.h101 class GTEST_API_ Message {
109 Message();
112 Message(const Message& msg) : ss_(new ::std::stringstream) { // NOLINT in Message() function
117 explicit Message(const char* str) : ss_(new ::std::stringstream) { in Message() function
132 inline Message& operator<<(const T& val) {
158 inline Message& operator<<(const T& val) {
181 inline Message& operator<<(T* const& pointer) { // NOLINT
196 Message& operator<<(BasicNarrowIoManip val) {
202 Message& operator<<(bool b) { return *this << (b ? "true" : "false"); }
206 Message& operator<<(const wchar_t* wide_c_str);
[all …]
/src/contrib/llvm-project/clang/lib/Tooling/Core/
H A DDiagnostic.cpp21 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message) in DiagnosticMessage() argument
22 : Message(Message), FileOffset(0) {} in DiagnosticMessage()
24 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message, in DiagnosticMessage() argument
27 : Message(Message), FileOffset(0) { in DiagnosticMessage()
54 const DiagnosticMessage &Message, in Diagnostic() argument
57 : DiagnosticName(DiagnosticName), Message(Message), Notes(Notes), in Diagnostic()
61 if (!D.Message.Fix.empty()) in selectFirstFix()
62 return &D.Message.Fix; in selectFirstFix()

12345678910>>...20