Lines Matching refs:WITH
4 // purpose with or without fee is hereby granted, provided that the above
8 // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
57 mallocTest = flag.Int64("malloc-test", -1, "If non-negative, run each test with each malloc in turn failing from the given number onwards.")
58 mallocTestDebug = flag.Bool("malloc-test-debug", false, "If true, ask bssl_shim to abort rather than fail a malloc. This can be used with a specific value for --malloc-test to identity the malloc failing that is causing problems.")
77 // ShimConfigurations is used with the ?json? package and represents a shim
97 // Setup shimConfig defaults aligning with BoringSSL.
258 // expectedAlgo is the signature scheme that should be used with this
259 // delegated credential. If zero, ECDSA with P-256 is assumed.
261 // tlsVersion is the version of TLS that should be used with this delegated
265 // signed with. Cannot be zero.
495 // negotiated a Channel ID with channelIDKey.
560 // message before doing a roundtrip with the runner.
617 // with any of the fields that send a KeyUpdate otherwise any received
1262 flags = append(flags, "-read-with-unfinished-write")
1425 // binaries with the DF_1_PIE, which the runtime linker on Android N
2405 // Test empty fragments for a message with a
3614 // inconsistent with their configured certificate.
4175 for _, with := range []bool{false, true} {
4177 if with {
4193 if with || ver.version >= VersionTLS13 {
4204 NoExtendedMasterSecret: !with,
4205 RequireExtendedMasterSecret: with,
4365 // various conditions. Some of these are redundant with other tests, but they
4396 // Basic handshake, with resumption. Client and server,
4491 // configuration. Assert this with ExpectMissingKeyShare.
4565 "-on-resume-read-with-unfinished-write",
4594 "-on-resume-read-with-unfinished-write",
5531 // Bidirectional shutdown with the runner initiating.
5543 // Bidirectional shutdown with the shim initiating. The runner,
6015 // TLS 1.3 must be negotiated with the supported_versions
6322 // tests for both. Also test interaction with 0-RTT when implemented.
6572 // Test NPN and the interaction with ALPN.
7122 // Resume with a corrupt ticket.
7138 // Test the ticket callback, with and without renewal.
7184 // Resume with various lengths of ticket session id.
8722 // signature algorithm works with P-224.
8783 // BoringSSL will sign SHA-1 and SHA-512 with ECDSA but not accept them.
9554 // RSASSA-PSS with SHA-512 is too large for 1024-bit RSA. Test that the
9607 // Sign with Ed25519 even though it is TLS 1.1.
9635 // Sign with Ed25519 even though it is TLS 1.1.
9707 // nothing in common with.
9918 // opcode. It must then immediately respond with a timeout ACK and act
10143 // server handshake, so we test it with ProtocolBugs.
11230 // Test that the server does not send session tickets with no matching key exchange mode.
11243 // Test that the server does not accept a session with no matching key exchange mode.
11492 // rejected. Test both with and without handshake packing to handle both
11742 // message in the TLS handshake. These may be used with bugs like
12221 // Test that enabling TLS 1.3 does not interfere with TLS 1.2 session ID
12609 // HelloRetryRequest is incompatible with it.
13058 // The client must fail with a dedicated error code if the server
13059 // responds with TLS 1.2 when offering 0-RTT.
13288 // with ALPN preferences.
13381 // Test that we reject early data with mismatched ALPN.
13949 // Test that a certificate chain with intermediate may be sent
14117 // An ECC certificate with only the keyAgreement key usgae may
14118 // be used with ECDH, but not ECDSA.
14458 // With no client extensions, the ServerHello must not have
14474 // With no client extensions, the ServerHello must not have
14587 // With compression algorithms configured, an duplicate values should still
14647 // With both algorithms configured, the server should pick its most
14794 // The above with supported_versions and
14800 // The above with a padding extension added at the end.
14815 // A JDK 11 ClientHello with EMS disabled.
14820 // A JDK 11 ClientHello with OCSP stapling disabled.
14825 // A JDK 11 ClientHello configured with a smaller set of
14831 // The above with TLS_CHACHA20_POLY1305_SHA256 added,
14837 // The above with X25519 added, which JDK 11 does not
14843 // A JDK 11 ClientHello with ALPN protocols configured.
14858 // With the workaround enabled, we should negotiate TLS 1.2 on
14875 // With the workaround disabled, we always negotiate TLS 1.3.