| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_tls13certcomp.t | 14 use TLSProxy::Message; 39 [TLSProxy::Message::MT_CLIENT_HELLO, 41 [TLSProxy::Message::MT_SERVER_HELLO, 43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 47 [TLSProxy::Message::MT_CERTIFICATE, 49 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE, 51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 53 [TLSProxy::Message::MT_FINISHED, 55 [TLSProxy::Message::MT_COMPRESSED_CERTIFICATE [all...] |
| 70-test_tls13messages.t | 35 [TLSProxy::Message::MT_CLIENT_HELLO, 37 [TLSProxy::Message::MT_SERVER_HELLO, 39 [TLSProxy::Message::MT_CLIENT_HELLO, 41 [TLSProxy::Message::MT_SERVER_HELLO, 43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 47 [TLSProxy::Message::MT_CERTIFICATE, 49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 51 [TLSProxy::Message::MT_FINISHED, 53 [TLSProxy::Message::MT_CERTIFICATE [all...] |
| 70-test_tls13kexmodes.t | 35 [TLSProxy::Message::MT_CLIENT_HELLO, 37 [TLSProxy::Message::MT_SERVER_HELLO, 39 [TLSProxy::Message::MT_CLIENT_HELLO, 41 [TLSProxy::Message::MT_SERVER_HELLO, 43 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 45 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 47 [TLSProxy::Message::MT_CERTIFICATE, 49 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 51 [TLSProxy::Message::MT_FINISHED, 53 [TLSProxy::Message::MT_CERTIFICATE [all...] |
| 70-test_sslmessages.t | 40 [TLSProxy::Message::MT_CLIENT_HELLO, 42 [TLSProxy::Message::MT_SERVER_HELLO, 44 [TLSProxy::Message::MT_CERTIFICATE, 48 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE, 50 [TLSProxy::Message::MT_CERTIFICATE_STATUS, 53 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 55 [TLSProxy::Message::MT_SERVER_HELLO_DONE, 58 [TLSProxy::Message::MT_CERTIFICATE, 60 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE, 63 [TLSProxy::Message::MT_CERTIFICATE_VERIFY [all...] |
| 70-test_sslsigalgs.t | 66 # is expected to ensure that a ServerKeyExchange message is sent that uses 73 ok(TLSProxy::Message->success, "Default sigalgs"); 86 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 92 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 98 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 105 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 113 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 122 ok(TLSProxy::Message->fail, 140 ok(TLSProxy::Message->fail, 154 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs") [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_tls13messages.t | 37 [TLSProxy::Message::MT_CLIENT_HELLO, 39 [TLSProxy::Message::MT_SERVER_HELLO, 41 [TLSProxy::Message::MT_CLIENT_HELLO, 43 [TLSProxy::Message::MT_SERVER_HELLO, 45 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 47 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 49 [TLSProxy::Message::MT_CERTIFICATE, 51 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 53 [TLSProxy::Message::MT_FINISHED, 55 [TLSProxy::Message::MT_CERTIFICATE [all...] |
| 70-test_tls13kexmodes.t | 38 [TLSProxy::Message::MT_CLIENT_HELLO, 40 [TLSProxy::Message::MT_SERVER_HELLO, 42 [TLSProxy::Message::MT_CLIENT_HELLO, 44 [TLSProxy::Message::MT_SERVER_HELLO, 46 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 48 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 50 [TLSProxy::Message::MT_CERTIFICATE, 52 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 54 [TLSProxy::Message::MT_FINISHED, 56 [TLSProxy::Message::MT_CERTIFICATE [all...] |
| 70-test_sslmessages.t | 42 [TLSProxy::Message::MT_CLIENT_HELLO, 44 [TLSProxy::Message::MT_SERVER_HELLO, 46 [TLSProxy::Message::MT_CERTIFICATE, 50 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE, 52 [TLSProxy::Message::MT_CERTIFICATE_STATUS, 55 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 57 [TLSProxy::Message::MT_SERVER_HELLO_DONE, 60 [TLSProxy::Message::MT_CERTIFICATE, 62 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE, 65 [TLSProxy::Message::MT_CERTIFICATE_VERIFY [all...] |
| 70-test_sslsigalgs.t | 53 # is expected to ensure that a ServerKeyExchange message is sent that uses 60 ok(TLSProxy::Message->success, "Default sigalgs"); 73 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 79 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 85 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 92 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 100 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 108 ok(TLSProxy::Message->fail, 121 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs"); 135 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server") [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_tls13messages.t | 36 [TLSProxy::Message::MT_CLIENT_HELLO, 38 [TLSProxy::Message::MT_SERVER_HELLO, 40 [TLSProxy::Message::MT_CLIENT_HELLO, 42 [TLSProxy::Message::MT_SERVER_HELLO, 44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 48 [TLSProxy::Message::MT_CERTIFICATE, 50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 52 [TLSProxy::Message::MT_FINISHED, 54 [TLSProxy::Message::MT_CERTIFICATE [all...] |
| 70-test_tls13kexmodes.t | 36 [TLSProxy::Message::MT_CLIENT_HELLO, 38 [TLSProxy::Message::MT_SERVER_HELLO, 40 [TLSProxy::Message::MT_CLIENT_HELLO, 42 [TLSProxy::Message::MT_SERVER_HELLO, 44 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, 46 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 48 [TLSProxy::Message::MT_CERTIFICATE, 50 [TLSProxy::Message::MT_CERTIFICATE_VERIFY, 52 [TLSProxy::Message::MT_FINISHED, 54 [TLSProxy::Message::MT_CERTIFICATE [all...] |
| 70-test_sslmessages.t | 43 [TLSProxy::Message::MT_CLIENT_HELLO, 45 [TLSProxy::Message::MT_SERVER_HELLO, 47 [TLSProxy::Message::MT_CERTIFICATE, 51 [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE, 53 [TLSProxy::Message::MT_CERTIFICATE_STATUS, 56 [TLSProxy::Message::MT_CERTIFICATE_REQUEST, 58 [TLSProxy::Message::MT_SERVER_HELLO_DONE, 61 [TLSProxy::Message::MT_CERTIFICATE, 63 [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE, 66 [TLSProxy::Message::MT_CERTIFICATE_VERIFY [all...] |
| 70-test_sslsigalgs.t | 53 # is expected to ensure that a ServerKeyExchange message is sent that uses 59 ok(TLSProxy::Message->success, "Default sigalgs"); 71 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 77 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 83 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 90 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 98 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 106 ok(TLSProxy::Message->fail, 119 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs"); 133 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server") [all...] |
| 70-test_key_share.t | 80 ok(TLSProxy::Message->success(), "Success after HRR"); 86 ok(TLSProxy::Message->fail(), "Server asks for group already provided"); 92 ok(TLSProxy::Message->fail(), "Missing key_shares extension"); 100 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 108 ok(TLSProxy::Message->fail(), "No acceptable key_shares"); 114 ok(TLSProxy::Message->success(), "Non preferred key_share"); 122 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 129 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups"); 135 ok(TLSProxy::Message->fail(), "Group id too short"); 141 ok(TLSProxy::Message->fail(), "key_exchange length mismatch") [all...] |
| /src/external/apache2/llvm/dist/llvm/bindings/ocaml/irreader/ |
| irreader_ocaml.c | 21 void llvm_raise(value Prototype, char *Message); 28 char *Message; 30 if (LLVMParseIRInContext(C, MemBuf, &M, &Message)) 31 llvm_raise(*caml_named_value("Llvm_irreader.Error"), Message);
|
| /src/external/apache2/llvm/dist/llvm/utils/unittest/googletest/include/gtest/ |
| gtest-message.h | 33 // This header file defines the Message class. 60 // See Message& operator<<(...) below for why. 65 // The Message class works like an ostream repeater. 69 // 1. You stream a bunch of values to a Message object. 71 // 2. Then you stream the Message object to an ostream. 72 // This causes the text in the Message to be streamed 77 // testing::Message foo; 83 // Message is not intended to be inherited from. In particular, its 88 // latter (it causes an access violation if you do). The Message 91 class GTEST_API_ Message { [all...] |
| /src/external/apache2/llvm/dist/clang/lib/Tooling/Core/ |
| Diagnostic.cpp | 21 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message) 22 : Message(Message), FileOffset(0) {} 24 DiagnosticMessage::DiagnosticMessage(llvm::StringRef Message, 27 : Message(Message), FileOffset(0) { 54 const DiagnosticMessage &Message, 57 : DiagnosticName(DiagnosticName), Message(Message), Notes(Notes), 61 if (!D.Message.Fix.empty() [all...] |
| /src/external/apache2/llvm/dist/clang/include/clang/Basic/ |
| PrettyStackTrace.h | 24 /// If a crash happens while one of these objects are live, the message 29 const char *Message; 32 : SM(sm), Loc(L), Message(Msg) {}
|
| /src/crypto/external/apache2/openssl/dist/util/perl/ |
| checkhandshake.pm | 84 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO 85 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO); 92 my $message = undef; 108 $message = ${$proxy->message_list}[$nextmess]; 111 $message = undef; 115 next if (!defined $message); 117 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 118 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO [all...] |
| /src/crypto/external/bsd/openssl/dist/util/perl/ |
| checkhandshake.pm | 79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO 80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO); 87 my $message = undef; 103 $message = ${$proxy->message_list}[$nextmess]; 106 $message = undef; 110 next if (!defined $message); 112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO [all...] |
| /src/crypto/external/bsd/openssl.old/dist/util/perl/ |
| checkhandshake.pm | 79 $numsh++ if ($lastmt != TLSProxy::Message::MT_SERVER_HELLO 80 && $handmessages[$loop][0] == TLSProxy::Message::MT_SERVER_HELLO); 87 my $message = undef; 103 $message = ${$proxy->message_list}[$nextmess]; 106 $message = undef; 110 next if (!defined $message); 112 $chnum++ if $message->mt() == TLSProxy::Message::MT_CLIENT_HELLO; 113 $shnum++ if $message->mt() == TLSProxy::Message::MT_SERVER_HELLO [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tspi/gtk/ |
| support.h | 39 # define dgettext(Domain,Message) (Message) 40 # define dcgettext(Domain,Message,Type) (Message)
|
| /src/external/apache2/llvm/dist/llvm/bindings/ocaml/analysis/ |
| analysis_ocaml.c | 30 char *Message; 31 int Result = LLVMVerifyModule(M, LLVMReturnStatusAction, &Message); 36 String = copy_string(Message); 40 LLVMDisposeMessage(Message);
|
| /src/external/apache2/llvm/dist/llvm/bindings/ocaml/linker/ |
| linker_ocaml.c | 25 void llvm_raise(value Prototype, char *Message);
|
| /src/external/bsd/zstd/dist/contrib/pzstd/ |
| main.cpp | 20 case Options::Status::Message:
|