Lines Matching +full:message +full:- +full:based

2  * Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved.
33 0, DTLS1_HM_HEADER_LENGTH + DUMMY_CERT_STATUS_LEN - 2,
34 SSL3_MT_CERTIFICATE_STATUS, /* Cert Status handshake message type */
35 0, 0, DUMMY_CERT_STATUS_LEN, /* Message len */
36 0, 5, /* Message sequence */
38 0, 0, DUMMY_CERT_STATUS_LEN - 2, /* Fragment len */
87 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "AES128-SHA"))) in test_dtls_unprocessed()
90 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_dtls_unprocessed()
91 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "AES128-SHA:@SECLEVEL=0")) in test_dtls_unprocessed()
93 "AES128-SHA:@SECLEVEL=0"))) in test_dtls_unprocessed()
113 * get used because the message sequence number is too big. In test 1 we set in test_dtls_unprocessed()
163 * In this case we have no ServerKeyExchange message, because we don't have
187 * We are assuming a ServerKeyExchange message is sent in this test. If we don't
209 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_dtls_drop_records()
242 idx -= TOTAL_FULL_HAND_RECORDS; in test_dtls_drop_records()
267 /* Work out which record to drop based on the test number */ in test_dtls_drop_records()
270 idx -= cli_to_srv_cookie + cli_to_srv_epoch0 + cli_to_srv_epoch1; in test_dtls_drop_records()
273 idx -= SRV_TO_CLI_COOKIE_EXCH + srv_to_cli_epoch0; in test_dtls_drop_records()
279 idx -= cli_to_srv_cookie + cli_to_srv_epoch0; in test_dtls_drop_records()
294 NULL), -1)) in test_dtls_drop_records()
326 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_cookie()
362 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_dtls_duplicate_records()
393 * Test just sending a Finished message as the first message. Should fail due
394 * to an unexpected message.
411 /* Message header */ in test_just_finished()
412 SSL3_MT_FINISHED, /* message type */ in test_just_finished()
413 0, 0, SHA_DIGEST_LENGTH, /* message length */ in test_just_finished()
414 0, 0, /* message sequence */ in test_just_finished()
418 /* Message body */ in test_just_finished()
450 /* We expect the attempt to process the message to fail */ in test_just_finished()
494 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "AES128-SHA"))) in test_swap_records()
497 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_swap_records()
498 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "AES128-SHA:@SECLEVEL=0")) in test_swap_records()
500 "AES128-SHA:@SECLEVEL=0"))) in test_swap_records()
607 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "AES128-SHA"))) in test_duplicate_app_data()
610 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_duplicate_app_data()
611 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "AES128-SHA:@SECLEVEL=0")) in test_duplicate_app_data()
613 "AES128-SHA:@SECLEVEL=0"))) in test_duplicate_app_data()
703 /* Default sigalgs are SHA1 based in <DTLS1.2 which is in security level 0 */ in test_listen()