Lines Matching full:message
53 # is expected to ensure that a ServerKeyExchange message is sent that uses
60 ok(TLSProxy::Message->success, "Default sigalgs");
73 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
79 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
85 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
92 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
100 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
108 ok(TLSProxy::Message->fail,
121 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
135 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
150 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0");
160 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 1");
170 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");
178 ok(TLSProxy::Message->fail, "Empty TLSv1.2 sigalgs");
186 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
195 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs");
203 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2");
214 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
223 ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs");
237 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
278 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3");
285 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert");
292 ok(TLSProxy::Message->fail, "No matching certificate for sigalgs_cert");
308 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello");
322 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
336 foreach my $message (@{$proxy->message_list}) {
337 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
339 $message->delete_extension(TLSProxy::Message::EXT_SIG_ALGS);
353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
356 $message->repack();
368 foreach my $message (@{$proxy->message_list}) {
372 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
375 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS};
380 if ($_ == TLSProxy::Message::SIG_ALG_DSA_SHA256
381 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA384
382 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA512
383 || $_ == TLSProxy::Message::OSSL_SIG_ALG_DSA_SHA224
384 || $_ == TLSProxy::Message::SIG_ALG_RSA_PKCS1_SHA1
385 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA1
386 || $_ == TLSProxy::Message::SIG_ALG_ECDSA_SHA1) {
392 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS};
397 if ($_ == TLSProxy::Message::SIG_ALG_DSA_SHA256
398 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA384
399 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA512) {
402 if ($_ == TLSProxy::Message::SIG_ALG_RSA_PKCS1_SHA1
403 || $_ == TLSProxy::Message::SIG_ALG_DSA_SHA1
404 || $_ == TLSProxy::Message::SIG_ALG_ECDSA_SHA1) {
407 if ($_ == TLSProxy::Message::OSSL_SIG_ALG_RSA_PKCS1_SHA224
408 || $_ == TLSProxy::Message::OSSL_SIG_ALG_DSA_SHA224
409 || $_ == TLSProxy::Message::OSSL_SIG_ALG_ECDSA_SHA224) {
427 foreach my $message (@{$proxy->message_list}) {
428 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
448 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS_CERT, $sigs);
449 $message->repack();
463 foreach my $message (@{$proxy->message_list}) {
464 if ($message->mt == TLSProxy::Message::MT_CERTIFICATE_VERIFY) {
465 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
466 $message->repack();
481 $type = TLSProxy::Message::EXT_SIG_ALGS_CERT;
483 $type = TLSProxy::Message::EXT_SIG_ALGS;
493 my $message = ${$proxy->message_list}[0];
494 $message->set_extension($type, $ext);
495 $message->repack;