HomeSort by: relevance | last modified time | path
    Searched refs:Message (Results 1 - 25 of 350) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/apache2/openssl/dist/test/recipes/
70-test_tls13certcomp.t 14 use TLSProxy::Message;
39 [TLSProxy::Message::MT_CLIENT_HELLO,
41 [TLSProxy::Message::MT_SERVER_HELLO,
43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
47 [TLSProxy::Message::MT_CERTIFICATE,
49 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE,
51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
53 [TLSProxy::Message::MT_FINISHED,
55 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE
    [all...]
70-test_tls13messages.t 35 [TLSProxy::Message::MT_CLIENT_HELLO,
37 [TLSProxy::Message::MT_SERVER_HELLO,
39 [TLSProxy::Message::MT_CLIENT_HELLO,
41 [TLSProxy::Message::MT_SERVER_HELLO,
43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
47 [TLSProxy::Message::MT_CERTIFICATE,
49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
51 [TLSProxy::Message::MT_FINISHED,
53 [TLSProxy::Message::MT_CERTIFICATE
    [all...]
70-test_tls13kexmodes.t 35 [TLSProxy::Message::MT_CLIENT_HELLO,
37 [TLSProxy::Message::MT_SERVER_HELLO,
39 [TLSProxy::Message::MT_CLIENT_HELLO,
41 [TLSProxy::Message::MT_SERVER_HELLO,
43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
47 [TLSProxy::Message::MT_CERTIFICATE,
49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
51 [TLSProxy::Message::MT_FINISHED,
53 [TLSProxy::Message::MT_CERTIFICATE
    [all...]
70-test_sslmessages.t 40 [TLSProxy::Message::MT_CLIENT_HELLO,
42 [TLSProxy::Message::MT_SERVER_HELLO,
44 [TLSProxy::Message::MT_CERTIFICATE,
48 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
50 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
53 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
55 [TLSProxy::Message::MT_SERVER_HELLO_DONE,
58 [TLSProxy::Message::MT_CERTIFICATE,
60 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
63 [TLSProxy::Message::MT_CERTIFICATE_VERIFY
    [all...]
70-test_sslsigalgs.t 66 # is expected to ensure that a ServerKeyExchange message is sent that uses
73 ok(TLSProxy::Message->success, "Default sigalgs");
86 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
92 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
98 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
105 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
113 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
122 ok(TLSProxy::Message->fail,
140 ok(TLSProxy::Message->fail,
154 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs")
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
70-test_tls13messages.t 37 [TLSProxy::Message::MT_CLIENT_HELLO,
39 [TLSProxy::Message::MT_SERVER_HELLO,
41 [TLSProxy::Message::MT_CLIENT_HELLO,
43 [TLSProxy::Message::MT_SERVER_HELLO,
45 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
47 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
49 [TLSProxy::Message::MT_CERTIFICATE,
51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
53 [TLSProxy::Message::MT_FINISHED,
55 [TLSProxy::Message::MT_CERTIFICATE
    [all...]
70-test_tls13kexmodes.t 38 [TLSProxy::Message::MT_CLIENT_HELLO,
40 [TLSProxy::Message::MT_SERVER_HELLO,
42 [TLSProxy::Message::MT_CLIENT_HELLO,
44 [TLSProxy::Message::MT_SERVER_HELLO,
46 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
48 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
50 [TLSProxy::Message::MT_CERTIFICATE,
52 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
54 [TLSProxy::Message::MT_FINISHED,
56 [TLSProxy::Message::MT_CERTIFICATE
    [all...]
70-test_sslmessages.t 42 [TLSProxy::Message::MT_CLIENT_HELLO,
44 [TLSProxy::Message::MT_SERVER_HELLO,
46 [TLSProxy::Message::MT_CERTIFICATE,
50 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
52 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
55 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
57 [TLSProxy::Message::MT_SERVER_HELLO_DONE,
60 [TLSProxy::Message::MT_CERTIFICATE,
62 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
65 [TLSProxy::Message::MT_CERTIFICATE_VERIFY
    [all...]
70-test_sslsigalgs.t 53 # is expected to ensure that a ServerKeyExchange message is sent that uses
60 ok(TLSProxy::Message->success, "Default sigalgs");
73 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
79 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
85 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
92 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
100 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
108 ok(TLSProxy::Message->fail,
121 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
135 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server")
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
70-test_tls13messages.t 36 [TLSProxy::Message::MT_CLIENT_HELLO,
38 [TLSProxy::Message::MT_SERVER_HELLO,
40 [TLSProxy::Message::MT_CLIENT_HELLO,
42 [TLSProxy::Message::MT_SERVER_HELLO,
44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
48 [TLSProxy::Message::MT_CERTIFICATE,
50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
52 [TLSProxy::Message::MT_FINISHED,
54 [TLSProxy::Message::MT_CERTIFICATE
    [all...]
70-test_tls13kexmodes.t 36 [TLSProxy::Message::MT_CLIENT_HELLO,
38 [TLSProxy::Message::MT_SERVER_HELLO,
40 [TLSProxy::Message::MT_CLIENT_HELLO,
42 [TLSProxy::Message::MT_SERVER_HELLO,
44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
48 [TLSProxy::Message::MT_CERTIFICATE,
50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
52 [TLSProxy::Message::MT_FINISHED,
54 [TLSProxy::Message::MT_CERTIFICATE
    [all...]
70-test_sslmessages.t 43 [TLSProxy::Message::MT_CLIENT_HELLO,
45 [TLSProxy::Message::MT_SERVER_HELLO,
47 [TLSProxy::Message::MT_CERTIFICATE,
51 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
53 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
56 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
58 [TLSProxy::Message::MT_SERVER_HELLO_DONE,
61 [TLSProxy::Message::MT_CERTIFICATE,
63 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
66 [TLSProxy::Message::MT_CERTIFICATE_VERIFY
    [all...]
70-test_sslsigalgs.t 53 # is expected to ensure that a ServerKeyExchange message is sent that uses
59 ok(TLSProxy::Message->success, "Default sigalgs");
71 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
77 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
83 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
90 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
98 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
106 ok(TLSProxy::Message->fail,
119 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
133 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server")
    [all...]
70-test_key_share.t 80 ok(TLSProxy::Message->success(), "Success after HRR");
86 ok(TLSProxy::Message->fail(), "Server asks for group already provided");
92 ok(TLSProxy::Message->fail(), "Missing key_shares extension");
100 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
108 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
114 ok(TLSProxy::Message->success(), "Non preferred key_share");
122 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
129 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
135 ok(TLSProxy::Message->fail(), "Group id too short");
141 ok(TLSProxy::Message->fail(), "key_exchange length mismatch")
    [all...]
  /src/external/apache2/llvm/dist/llvm/bindings/ocaml/irreader/
irreader_ocaml.c 21 void llvm_raise(value Prototype, char *Message);
28 char *Message;
30 if (LLVMParseIRInContext(C, MemBuf, &M, &Message))
31 llvm_raise(*caml_named_value("Llvm_irreader.Error"), Message);
  /src/external/apache2/llvm/dist/llvm/utils/unittest/googletest/include/gtest/
gtest-message.h 33 // This header file defines the Message class.
60 // See Message& operator<<(...) below for why.
65 // The Message class works like an ostream repeater.
69 // 1. You stream a bunch of values to a Message object.
71 // 2. Then you stream the Message object to an ostream.
72 // This causes the text in the Message to be streamed
77 // testing::Message foo;
83 // Message is not intended to be inherited from. In particular, its
88 // latter (it causes an access violation if you do). The Message
91 class GTEST_API_ Message {
    [all...]
  /src/external/apache2/llvm/dist/clang/lib/Tooling/Core/
Diagnostic.cpp 21 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message)
22 : Message(Message), FileOffset(0) {}
24 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message,
27 : Message(Message), FileOffset(0) {
54 const DiagnosticMessage &Message,
57 : DiagnosticName(DiagnosticName), Message(Message), Notes(Notes),
61 if (!D.Message.Fix.empty()
    [all...]
  /src/external/apache2/llvm/dist/clang/include/clang/Basic/
PrettyStackTrace.h 24 /// If a crash happens while one of these objects are live, the message
29 const char *Message;
32 : SM(sm), Loc(L), Message(Msg) {}
  /src/crypto/external/apache2/openssl/dist/util/perl/
checkhandshake.pm 84 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO
85 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO);
92 my $message = undef;
108 $message = ${$proxy->message_list}[$nextmess];
111 $message = undef;
115 next if (!defined $message);
117 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
118 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO
    [all...]
  /src/crypto/external/bsd/openssl/dist/util/perl/
checkhandshake.pm 79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO
80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO);
87 my $message = undef;
103 $message = ${$proxy->message_list}[$nextmess];
106 $message = undef;
110 next if (!defined $message);
112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/util/perl/
checkhandshake.pm 79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO
80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO);
87 my $message = undef;
103 $message = ${$proxy->message_list}[$nextmess];
106 $message = undef;
110 next if (!defined $message);
112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO;
113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/tspi/gtk/
support.h 39 # define dgettext(Domain,Message) (Message)
40 # define dcgettext(Domain,Message,Type) (Message)
  /src/external/apache2/llvm/dist/llvm/bindings/ocaml/analysis/
analysis_ocaml.c 30 char *Message;
31 int Result = LLVMVerifyModule(M, LLVMReturnStatusAction, &Message);
36 String = copy_string(Message);
40 LLVMDisposeMessage(Message);
  /src/external/apache2/llvm/dist/llvm/bindings/ocaml/linker/
linker_ocaml.c 25 void llvm_raise(value Prototype, char *Message);
  /src/external/bsd/zstd/dist/contrib/pzstd/
main.cpp 20 case Options::Status::Message:

Completed in 51 milliseconds

1 2 3 4 5 6 7 8 91011>>