| /src/crypto/openssl/test/recipes/ |
| H A D | 70-test_tls13certcomp.t | 14 use TLSProxy::Message; 39 [TLSProxy::Message::MT_CLIENT_HELLO, 41 [TLSProxy::Message::MT_SERVER_HELLO, 43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 47 [TLSProxy::Message::MT_CERTIFICATE, 49 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE, 51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 53 [TLSProxy::Message::MT_FINISHED, 55 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE, [all …]
|
| H A D | 70-test_tls13messages.t | 35 [TLSProxy::Message::MT_CLIENT_HELLO, 37 [TLSProxy::Message::MT_SERVER_HELLO, 39 [TLSProxy::Message::MT_CLIENT_HELLO, 41 [TLSProxy::Message::MT_SERVER_HELLO, 43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 47 [TLSProxy::Message::MT_CERTIFICATE, 49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 51 [TLSProxy::Message::MT_FINISHED, 53 [TLSProxy::Message::MT_CERTIFICATE, [all …]
|
| H A D | 70-test_tls13kexmodes.t | 35 [TLSProxy::Message::MT_CLIENT_HELLO, 37 [TLSProxy::Message::MT_SERVER_HELLO, 39 [TLSProxy::Message::MT_CLIENT_HELLO, 41 [TLSProxy::Message::MT_SERVER_HELLO, 43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 47 [TLSProxy::Message::MT_CERTIFICATE, 49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 51 [TLSProxy::Message::MT_FINISHED, 53 [TLSProxy::Message::MT_CERTIFICATE, [all …]
|
| H A D | 70-test_sslmessages.t | 40 [TLSProxy::Message::MT_CLIENT_HELLO, 42 [TLSProxy::Message::MT_SERVER_HELLO, 44 [TLSProxy::Message::MT_CERTIFICATE, 48 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE, 50 [TLSProxy::Message::MT_CERTIFICATE_STATUS, 53 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 55 [TLSProxy::Message::MT_SERVER_HELLO_DONE, 58 [TLSProxy::Message::MT_CERTIFICATE, 60 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE, 63 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, [all …]
|
| H A D | 70-test_sslsigalgs.t | 73 ok(TLSProxy::Message->success, "Default sigalgs"); 86 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 92 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 98 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 105 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 113 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 122 ok(TLSProxy::Message->fail, 140 ok(TLSProxy::Message->fail, 154 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs"); 168 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server"); [all …]
|
| H A D | 70-test_key_share.t | 88 ok(TLSProxy::Message->success(), "Success after HRR"); 94 ok(TLSProxy::Message->fail(), "Server asks for group already provided"); 100 ok(TLSProxy::Message->fail(), "Missing key_shares extension"); 112 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 128 ok(TLSProxy::Message->fail(), "No acceptable key_shares"); 139 ok(TLSProxy::Message->success(), "Non preferred key_share"); 150 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 158 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups"); 164 ok(TLSProxy::Message->fail(), "Group id too short"); 170 ok(TLSProxy::Message->fail(), "key_exchange length mismatch"); [all …]
|
| H A D | 70-test_renegotiation.t | 44 ok(TLSProxy::Message->success(), "Basic renegotiation"); 54 ok(TLSProxy::Message->fail(), "No client SCSV"); 69 ok(TLSProxy::Message->fail(), "No client extension"); 87 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 97 ok(TLSProxy::Message->success() && $chmatch, 113 ok(TLSProxy::Message->fail(), "client_sig_algs instead of sig_algs"); 126 ok(TLSProxy::Message->fail(), 140 … my $clientHello = first { $_->mt == TLSProxy::Message::MT_CLIENT_HELLO } @{$proxy->message_list}; 142 …my $has_ri_extension = exists $clientHello->extension_data()->{TLSProxy::Message::EXT_RENEGOTIATE}; 158 … my $clientHello = first { $_->mt == TLSProxy::Message::MT_CLIENT_HELLO } @{$proxy->message_list}; [all …]
|
| H A D | 70-test_sslsessiontick.t | 142 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test"); 152 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test"); 159 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 170 if ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 179 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 180 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, ""); 206 if ($message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 209 $message->set_extension(TLSProxy::Message::EXT_SESSION_TICKET, ""); 223 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO 224 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { [all …]
|
| H A D | 70-test_tlsextms.t | 137 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption"); 154 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1"); 171 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2"); 194 if ($crmextms && $message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 195 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET); 198 if ($srmextms && $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 199 $message->delete_extension(TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET); 212 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO 213 || $message->mt == TLSProxy::Message::MT_SERVER_HELLO) { 217 $extensions{TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET}) { [all …]
|
| H A D | 70-test_sslversions.t | 61 ok(TLSProxy::Message->fail(), "Empty supported versions"); 68 ok(TLSProxy::Message->fail(), "No recognised versions"); 75 ok(TLSProxy::Message->success() 83 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)"); 91 ok(TLSProxy::Message->success() 104 ok(TLSProxy::Message->success() 113 ok(TLSProxy::Message->success() 122 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions"); 145 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) { 173 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext); [all …]
|
| /src/contrib/googletest/googletest/test/ |
| H A D | googletest-message-test.cc | 45 using ::testing::Message; 63 const Message msg; in TEST() 69 const Message msg1("Hello"); in TEST() 70 const Message msg2(msg1); in TEST() 76 Message msg("Hello"); in TEST() 82 const std::string s = (Message() << 1.23456F << " " << 2.34567F).GetString(); in TEST() 91 (Message() << 1260570880.4555497 << " " << 1260572265.1954534) in TEST() 102 EXPECT_NE("(null)", (Message() << p).GetString()); in TEST() 108 EXPECT_EQ("(null)", (Message() << p).GetString()); in TEST() 113 EXPECT_EQ("Foo", (Message() << "Foo").GetString()); in TEST() [all …]
|
| /src/crypto/openssl/util/perl/ |
| H A D | checkhandshake.pm | 84 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO 85 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO); 117 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 118 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO; 120 next if ($message->mt() != TLSProxy::Message::MT_CLIENT_HELLO 121 && $message->mt() != TLSProxy::Message::MT_SERVER_HELLO 123 TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS 124 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE 125 && $message->mt() != TLSProxy::Message::MT_CERTIFICATE_REQUEST); 127 next if $message->mt() == TLSProxy::Message::MT_CERTIFICATE [all …]
|
| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_ml_dsa_65_wycheproof_sign.txt | 16 Sign-Message = ML-DSA-65:ML_DSA_65_1 24 Sign-Message = ML-DSA-65:ML_DSA_65_1 33 Sign-Message = ML-DSA-65:ML_DSA_65_1 42 Sign-Message = ML-DSA-65:ML_DSA_65_1 51 Sign-Message = ML-DSA-65:ML_DSA_65_1 61 Sign-Message = ML-DSA-65:ML_DSA_65_1 69 Sign-Message = ML-DSA-65:ML_DSA_65_1 77 Sign-Message = ML-DSA-65:ML_DSA_65_1 85 Sign-Message = ML-DSA-65:ML_DSA_65_1 93 Sign-Message = ML-DSA-65:ML_DSA_65_1 [all …]
|
| H A D | evppkey_ml_dsa_44_wycheproof_sign.txt | 16 Sign-Message = ML-DSA-44:ML_DSA_44_1 24 Sign-Message = ML-DSA-44:ML_DSA_44_1 33 Sign-Message = ML-DSA-44:ML_DSA_44_1 42 Sign-Message = ML-DSA-44:ML_DSA_44_1 51 Sign-Message = ML-DSA-44:ML_DSA_44_1 61 Sign-Message = ML-DSA-44:ML_DSA_44_1 69 Sign-Message = ML-DSA-44:ML_DSA_44_1 77 Sign-Message = ML-DSA-44:ML_DSA_44_1 85 Sign-Message = ML-DSA-44:ML_DSA_44_1 93 Sign-Message = ML-DSA-44:ML_DSA_44_1 [all …]
|
| H A D | evppkey_ml_dsa_65_wycheproof_verify.txt | 16 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 24 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 33 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 42 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 51 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 61 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 70 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 79 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 88 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 97 Verify-Message-Public = ML-DSA-65:ML_DSA_65_1 [all …]
|
| H A D | evppkey_ml_dsa_87_wycheproof_verify.txt | 16 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 24 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 33 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 42 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 51 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 61 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 70 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 79 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 88 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 97 Verify-Message-Public = ML-DSA-87:ML_DSA_87_1 [all …]
|
| H A D | evppkey_ml_dsa_87_wycheproof_sign.txt | 16 Sign-Message = ML-DSA-87:ML_DSA_87_1 24 Sign-Message = ML-DSA-87:ML_DSA_87_1 33 Sign-Message = ML-DSA-87:ML_DSA_87_1 42 Sign-Message = ML-DSA-87:ML_DSA_87_1 51 Sign-Message = ML-DSA-87:ML_DSA_87_1 61 Sign-Message = ML-DSA-87:ML_DSA_87_1 69 Sign-Message = ML-DSA-87:ML_DSA_87_1 77 Sign-Message = ML-DSA-87:ML_DSA_87_1 85 Sign-Message = ML-DSA-87:ML_DSA_87_1 93 Sign-Message = ML-DSA-87:ML_DSA_87_1 [all …]
|
| H A D | evppkey_ml_dsa_44_wycheproof_verify.txt | 16 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 24 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 33 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 42 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 51 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 61 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 70 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 79 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 88 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 97 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 [all …]
|
| H A D | evppkey_ml_dsa_siggen.txt | 15 Sign-Message = ML-DSA-44:ML_DSA_44_1 25 Sign-Message = ML-DSA-44:ML_DSA_44_2 36 Sign-Message = ML-DSA-44:ML_DSA_44_3 46 Sign-Message = ML-DSA-44:ML_DSA_44_4 57 Sign-Message = ML-DSA-44:ML_DSA_44_5 67 Sign-Message = ML-DSA-44:ML_DSA_44_6 78 Sign-Message = ML-DSA-44:ML_DSA_44_7 88 Sign-Message = ML-DSA-44:ML_DSA_44_8 99 Sign-Message = ML-DSA-44:ML_DSA_44_9 109 Sign-Message = ML-DSA-44:ML_DSA_44_10 [all …]
|
| H A D | evppkey_slh_dsa_siggen.txt | 15 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_1 25 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_2 36 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_3 47 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_4 58 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_5 69 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_6 80 Sign-Message = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_7 91 Sign-Message = SLH-DSA-SHA2-192f:SLH_DSA_SHA2_192f_20 101 Sign-Message = SLH-DSA-SHA2-192f:SLH_DSA_SHA2_192f_21 112 Sign-Message = SLH-DSA-SHA2-192f:SLH_DSA_SHA2_192f_22 [all …]
|
| H A D | evppkey_ml_dsa_sigver.txt | 16 Verify-Message-Public = ML-DSA-44:ML_DSA_44_1 27 Verify-Message-Public = ML-DSA-44:ML_DSA_44_2 39 Verify-Message-Public = ML-DSA-44:ML_DSA_44_3 50 Verify-Message-Public = ML-DSA-44:ML_DSA_44_4 62 Verify-Message-Public = ML-DSA-44:ML_DSA_44_5 73 Verify-Message-Public = ML-DSA-44:ML_DSA_44_6 85 Verify-Message-Public = ML-DSA-44:ML_DSA_44_7 95 Verify-Message-Public = ML-DSA-44:ML_DSA_44_8 106 Verify-Message-Public = ML-DSA-44:ML_DSA_44_9 117 Verify-Message-Public = ML-DSA-44:ML_DSA_44_10 [all …]
|
| H A D | evppkey_slh_dsa_sigver.txt | 16 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_1 28 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_2 40 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_3 52 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_4 64 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_5 76 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_6 88 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_7 100 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_8 112 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_9 123 Verify-Message-Public = SLH-DSA-SHA2-128f:SLH_DSA_SHA2_128f_10 [all …]
|
| H A D | evppkey_ecx_sigalg.txt | 78 Sign-Message = ED25519:ED25519-1 85 Sign-Message = ED25519:ED25519-2 92 Sign-Message = ED25519:ED25519-3 99 Sign-Message = ED25519:ED25519-4 106 Sign-Message = ED25519:ED25519-5 112 Verify-Message = ED25519:ED25519-1-PUBLIC 118 Verify-Message = ED25519:ED25519-1-PUBLIC 125 Verify-Message = ED25519:ED25519-1-PUBLIC 136 Sign-Message = ED25519:ED25519-1-Raw 141 Verify-Message = ED25519:ED25519-1-PUBLIC-Raw [all …]
|
| /src/contrib/googletest/googletest/include/gtest/ |
| H A D | gtest-message.h | 101 class GTEST_API_ Message { 109 Message(); 112 Message(const Message& msg) : ss_(new ::std::stringstream) { // NOLINT in Message() function 117 explicit Message(const char* str) : ss_(new ::std::stringstream) { in Message() function 132 inline Message& operator<<(const T& val) { 158 inline Message& operator<<(const T& val) { 181 inline Message& operator<<(T* const& pointer) { // NOLINT 196 Message& operator<<(BasicNarrowIoManip val) { 202 Message& operator<<(bool b) { return *this << (b ? "true" : "false"); } 206 Message& operator<<(const wchar_t* wide_c_str); [all …]
|
| /src/contrib/llvm-project/clang/lib/Tooling/Core/ |
| H A D | Diagnostic.cpp | 21 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message) in DiagnosticMessage() argument 22 : Message(Message), FileOffset(0) {} in DiagnosticMessage() 24 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message, in DiagnosticMessage() argument 27 : Message(Message), FileOffset(0) { in DiagnosticMessage() 54 const DiagnosticMessage &Message, in Diagnostic() argument 57 : DiagnosticName(DiagnosticName), Message(Message), Notes(Notes), in Diagnostic() 61 if (!D.Message.Fix.empty()) in selectFirstFix() 62 return &D.Message.Fix; in selectFirstFix()
|