Lines Matching refs:Message
53 # is expected to ensure that a ServerKeyExchange message is sent that uses
59 ok(TLSProxy::Message->success, "Default sigalgs");
71 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
77 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
83 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
90 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
98 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
106 ok(TLSProxy::Message->fail,
119 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
133 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
148 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1");
158 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 2");
168 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");
176 ok(TLSProxy::Message->fail, "Empty TLSv1.2 sigalgs");
184 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
193 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs");
201 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2");
212 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
221 ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs");
234 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
270 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3");
277 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert");
284 ok(TLSProxy::Message->fail, "No matching certificate for sigalgs_cert");
303 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello");
317 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
331 foreach my $message (@{$proxy->message_list}) {
332 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
334 $message->delete_extension(TLSProxy::Message::EXT_SIG_ALGS);
348 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
351 $message->repack();
363 foreach my $message (@{$proxy->message_list}) {
367 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
370 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS};
375 if ($_ == TLSProxy::Message::SIG_ALG_DSA_SHA256
376 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA384
377 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA512
378 || $_ == TLSProxy::Message::OSSL_SIG_ALG_DSA_SHA224
379 || $_ == TLSProxy::Message::SIG_ALG_RSA_PKCS1_SHA1
380 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA1
381 || $_ == TLSProxy::Message::SIG_ALG_ECDSA_SHA1) {
387 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS};
392 if ($_ == TLSProxy::Message::SIG_ALG_DSA_SHA256
393 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA384
394 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA512) {
397 if ($_ == TLSProxy::Message::SIG_ALG_RSA_PKCS1_SHA1
398 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA1
399 || $_ == TLSProxy::Message::SIG_ALG_ECDSA_SHA1) {
402 if ($_ == TLSProxy::Message::OSSL_SIG_ALG_RSA_PKCS1_SHA224
403 || $_ == TLSProxy::Message::OSSL_SIG_ALG_DSA_SHA224
404 || $_ == TLSProxy::Message::OSSL_SIG_ALG_ECDSA_SHA224) {
422 foreach my $message (@{$proxy->message_list}) {
423 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
443 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS_CERT, $sigs);
444 $message->repack();
458 foreach my $message (@{$proxy->message_list}) {
459 if ($message->mt == TLSProxy::Message::MT_CERTIFICATE_VERIFY) {
460 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
461 $message->repack();
476 $type = TLSProxy::Message::EXT_SIG_ALGS_CERT;
478 $type = TLSProxy::Message::EXT_SIG_ALGS;
488 my $message = ${$proxy->message_list}[0];
489 $message->set_extension($type, $ext);
490 $message->repack;