Home | History | Annotate | Download | only in recipes

Lines Matching refs:Message

66 #      is expected to ensure that a ServerKeyExchange message is sent that uses
73 ok(TLSProxy::Message->success, "Default sigalgs");
86 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
92 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
98 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
105 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
113 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
122 ok(TLSProxy::Message->fail,
140 ok(TLSProxy::Message->fail,
154 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
168 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
183 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0");
193 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 1");
203 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");
211 ok(TLSProxy::Message->fail, "Empty TLSv1.2 sigalgs");
219 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
228 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs");
236 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2");
247 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
256 ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs");
270 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
311 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3");
318 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert");
325 ok(TLSProxy::Message->fail, "No matching certificate for sigalgs_cert");
341 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello");
355 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
367 foreach my $message (@{$proxy->message_list}) {
368 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
370 $message->delete_extension(TLSProxy::Message::EXT_SIG_ALGS);
384 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
387 $message->repack();
399 foreach my $message (@{$proxy->message_list}) {
403 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
406 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS};
411 if ($_ == TLSProxy::Message::SIG_ALG_DSA_SHA256
412 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA384
413 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA512
414 || $_ == TLSProxy::Message::OSSL_SIG_ALG_DSA_SHA224
415 || $_ == TLSProxy::Message::SIG_ALG_RSA_PKCS1_SHA1
416 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA1
417 || $_ == TLSProxy::Message::SIG_ALG_ECDSA_SHA1) {
423 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS};
428 if ($_ == TLSProxy::Message::SIG_ALG_DSA_SHA256
429 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA384
430 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA512) {
433 if ($_ == TLSProxy::Message::SIG_ALG_RSA_PKCS1_SHA1
434 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA1
435 || $_ == TLSProxy::Message::SIG_ALG_ECDSA_SHA1) {
438 if ($_ == TLSProxy::Message::OSSL_SIG_ALG_RSA_PKCS1_SHA224
439 || $_ == TLSProxy::Message::OSSL_SIG_ALG_DSA_SHA224
440 || $_ == TLSProxy::Message::OSSL_SIG_ALG_ECDSA_SHA224) {
458 foreach my $message (@{$proxy->message_list}) {
459 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
479 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS_CERT, $sigs);
480 $message->repack();
494 foreach my $message (@{$proxy->message_list}) {
495 if ($message->mt == TLSProxy::Message::MT_CERTIFICATE_VERIFY) {
497 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
499 $message->sigalg(TLSProxy::Message::SIG_ALG_MLDSA65);
501 $message->repack();
516 $type = TLSProxy::Message::EXT_SIG_ALGS_CERT;
518 $type = TLSProxy::Message::EXT_SIG_ALGS;
528 my $message = ${$proxy->message_list}[0];
529 $message->set_extension($type, $ext);
530 $message->repack;