/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 70-test_sslextension.t | 57 if ($proxy->flight == 1) { 67 if ($proxy->flight != 0) { 106 if ($proxy->flight == 0) { 120 if ($proxy->flight == 0) { 122 } elsif ($proxy->flight == 1) { 137 if ($proxy->flight == 0) { 143 if ($proxy->flight != 1) { 183 if ($proxy->flight != 0) {
|
H A D | 70-test_tls13psk.t | 111 my $flight; 115 $flight = 0; 117 $flight = 2; 121 return if $proxy->flight != $flight; 147 return if $proxy->flight != 0;
|
H A D | 70-test_sslsignature.t | 114 my $flight; 120 $flight = 1; 122 $flight = 2; 125 # We're only interested in the initial server flight 126 return if ($proxy->flight != $flight);
|
H A D | 70-test_tls13hrr.t | 81 if ($proxy->flight != 1) { 98 if ($proxy->flight == 4) { 103 if ($proxy->flight != 3) { 109 for ($i = 0; ${$proxy->record_list}[$i]->flight() < 1; $i++) { 129 if ($proxy->flight != 0) {
|
H A D | 70-test_comp.t | 88 my $flight; 93 return if $proxy->flight != 0;
|
H A D | 70-test_tls13alerts.t | 50 if ($proxy->flight != 1) {
|
H A D | 70-test_tls13cookie.t | 68 return if ($proxy->flight > 2); 78 && ${$message->records}[0]->flight == 1) { 84 if (${$message->records}[0]->flight == 0) {
|
H A D | 70-test_sslcertstatus.t | 53 if ($proxy->flight != 1) {
|
H A D | 70-test_sslrecords.t | 238 if ($proxy->flight != 0) { 266 if ($proxy->flight != 0) { 322 if ($proxy->flight != 0) { 469 if ($proxy->flight == 0) { 472 } elsif ($proxy->flight != 1 || $added_record) { 491 for ($i = 0; ${$proxy->record_list}[$i]->flight() < 1; $i++) { 506 if ($proxy->flight != 1) { 523 if ($proxy->flight != 1) { 545 #Find server's first flight 546 if ($proxy->flight ! [all...] |
H A D | 70-test_sslskewith0p.t | 53 # We're only interested in the SKE - always in flight 1 54 if ($proxy->flight != 1) {
|
H A D | 70-test_sslcbcpadding.t | 68 if ($proxy->flight == 0) { 113 $proxy->flight,
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 70-test_tls13psk.t | 118 my $flight; 122 $flight = 0; 124 $flight = 2; 128 return if $proxy->flight != $flight; 154 return if $proxy->flight != 0;
|
H A D | 70-test_sslsignature.t | 116 my $flight; 122 $flight = 1; 124 $flight = 2; 127 # We're only interested in the initial server flight 128 return if ($proxy->flight != $flight);
|
H A D | 70-test_tls13hrr.t | 108 if ($proxy->flight != 1) { 125 if ($proxy->flight == 4) { 130 if ($proxy->flight != 3) { 136 for ($i = 0; ${$proxy->record_list}[$i]->flight() < 1; $i++) { 155 if ($proxy->flight != 0) {
|
H A D | 70-test_sslextension.t | 57 if ($proxy->flight == 1) { 67 if ($proxy->flight != 0) { 106 if ($proxy->flight == 0) { 120 if ($proxy->flight == 0) { 122 } elsif ($proxy->flight == 1) { 137 if ($proxy->flight == 0) { 143 if ($proxy->flight != 1) { 183 if ($proxy->flight != 0) {
|
H A D | 70-test_comp.t | 88 my $flight; 93 return if $proxy->flight != 0;
|
H A D | 70-test_tls13alerts.t | 50 if ($proxy->flight != 1) {
|
H A D | 70-test_tls13cookie.t | 78 return if ($proxy->flight > 2); 88 && ${$message->records}[0]->flight == 1) { 94 if (${$message->records}[0]->flight == 0) {
|
H A D | 70-test_sslrecords.t | 260 if ($proxy->flight != 0) { 288 if ($proxy->flight != 0) { 344 if ($proxy->flight != 0) { 491 if ($proxy->flight == 0) { 494 } elsif ($proxy->flight != 1 || $added_record) { 513 for ($i = 0; ${$proxy->record_list}[$i]->flight() < 1; $i++) { 528 if ($proxy->flight != 1) { 545 if ($proxy->flight != 1) { 567 #Find server's first flight 568 if ($proxy->flight ! [all...] |
H A D | 70-test_sslskewith0p.t | 53 # We're only interested in the SKE - always in flight 1 54 if ($proxy->flight != 1) {
|
H A D | 70-test_sslcertstatus.t | 53 if ($proxy->flight != 1) {
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
H A D | Record.pm | 61 my $flight = shift; 88 $flight, 167 my ($flight, 178 flight => $flight, 232 #A TLS1.3 client, when processing the server's initial flight, could 280 if ($self->{sent} || ($self->flight & 1) != $server) { 303 sub flight subroutine 306 return $self->{flight}; 394 if (($self->{flight} [all...] |
H A D | Proxy.pm | 104 flight => -1, 150 $self->{flight} = -1; 481 $self->{flight} = $self->{flight} + 1; 486 print "Processing flight ".$self->flight."\n"; 490 my @ret = TLSProxy::Record->get_records($server, $self->flight, 542 sub flight subroutine 545 return $self->{flight};
|
/netbsd-current/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
H A D | Record.pm | 61 my $flight = shift; 88 $flight, 167 my ($flight, 178 flight => $flight, 232 #A TLS1.3 client, when processing the server's initial flight, could 280 if ($self->{sent} || ($self->flight & 1) != $server) { 303 sub flight subroutine 306 return $self->{flight}; 394 if (($self->{flight} [all...] |
H A D | Proxy.pm | 104 flight => -1, 150 $self->{flight} = -1; 481 $self->{flight} = $self->{flight} + 1; 486 print "Processing flight ".$self->flight."\n"; 490 my @ret = TLSProxy::Record->get_records($server, $self->flight, 542 sub flight subroutine 545 return $self->{flight};
|