/openssl-master/test/recipes/ |
A D | 15-test_gendhparam.t | 27 expect => [ 'ERROR' ], 46 expect => [ "BEGIN X9.42 DH PARAMETERS" ], 52 expect => [ "ERROR" ], 57 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 63 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 69 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 76 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:'], 81 expect => [ 'BEGIN X9.42 DH PARAMETERS', 'GROUP:' ], 105 expect => [ 'ERROR' ], 124 expect => [ 'ERROR' ], [all …]
|
A D | 20-test_mac.t | 140 my ($cmdarray_orig, $type, $input, $expect, $err) = @_; 142 if (defined($expect)) { 143 $expect = uc $expect; 159 if (defined($expect)) { 160 if ($lines[0] =~ m|^\Q${expect}\E\R$|) { 164 print "Exp: $expect\n"; 192 my ($cmdarray, $type, $input, $expect) = @_; 193 $expect = uc $expect; 217 if ($line eq $expect) { 221 print "Exp: $expect\n";
|
A D | 20-test_kdf.t | 95 my ($cmdarray, $expect) = @_; 96 if (defined($expect)) { 97 $expect = uc $expect; 102 if (defined($expect)) { 103 if ($lines[0] =~ m|^\Q${expect}\E\R$|) { 107 print "Exp: $expect\n";
|
A D | 25-test_req.t | 392 my $expect = shift @_; 393 cert_contains($cert, "Subject Key Identifier", $expect); 397 my $expect = shift @_; 398 cert_contains($cert, "Authority Key Identifier", $expect); 402 my $expect = shift @_; 403 cert_contains($cert, "Key Usage", $expect); 407 my $expect = shift @_; 411 "-partial_chain", $cert])) == $expect,
|
/openssl-master/test/ |
A D | destest.c | 715 int clen, clen_upd, clen_fin, plen, plen_upd, plen_fin, expect, bs, i; in test_des_key_wrap() local 745 expect = (in_bytes + (bs - 1)) / bs * bs + 2 * bs; in test_des_key_wrap() 746 if (!TEST_int_eq(clen_upd, expect)) in test_des_key_wrap() 785 int expect; member 813 return TEST_int_eq(DES_is_weak_key(key), weak_keys[n].expect); in test_des_weak_keys() 818 int expect; member 839 return TEST_int_eq(DES_check_key_parity(key), bad_parity_keys[n].expect); in test_des_check_bad_parity()
|
/openssl-master/test/recipes/90-test_includes_data/ |
A D | incdir.cnf | 2 # Set includedir and expect to fail
|
/openssl-master/doc/man3/ |
A D | PKCS12_key_gen_utf8_ex.pod | 67 PKCS12_key_gen_asc() and PKCS12_key_gen_asc_ex() expect an ASCII-formatted password. 71 PKCS12_key_gen_uni() and PKCS12_key_gen_uni_ex() expect a Unicode-formatted password. 75 PKCS12_key_gen_utf8() and PKCS12_key_gen_utf8_ex() expect a UTF-8 encoded password.
|
A D | BIO_f_base64.pod | 29 to encode the data all on one line or expect the data to be all
|
A D | SSL_in_init.pod | 51 may define more states so applications should expect to receive unrecognised
|
A D | SSL_CTX_sess_set_get_cb.pod | 72 at all). This means that applications should expect the new_session_cb()
|
A D | PKCS7_sign.pod | 34 Many S/MIME clients expect the signed content to include valid MIME headers. If
|
A D | CMS_sign.pod | 40 Many S/MIME clients expect the signed content to include valid MIME headers. If
|
A D | ASYNC_WAIT_CTX_new.pod | 169 should not expect to receive a callback from the engine even if one has been
|
A D | OSSL_STORE_LOADER.pod | 287 OSSL_STORE_LOADER_set_expect() sets the expect function for the
|
/openssl-master/crypto/store/ |
A D | store_local.h | 90 OSSL_STORE_expect_fn expect; member
|
A D | store_register.c | 98 loader->expect = expect_function; in OSSL_STORE_LOADER_set_expect()
|
A D | store_lib.c | 300 && ctx->loader->expect != NULL) { in OSSL_STORE_expect() 301 ret = ctx->loader->expect(ctx->loader_ctx, expected_type); in OSSL_STORE_expect()
|
/openssl-master/apps/lib/ |
A D | apps.c | 836 #define SET_EXPECT(expect, val) ((expect) = (expect) < 0 ? (val) : ((expect) == (val) ? (val) : 0)) argument 871 int expect = -1; in load_key_certs_crls_suppress() local 879 SET_EXPECT(expect, OSSL_STORE_INFO_PKEY); in load_key_certs_crls_suppress() 884 SET_EXPECT(expect, OSSL_STORE_INFO_PUBKEY); in load_key_certs_crls_suppress() 889 SET_EXPECT(expect, OSSL_STORE_INFO_PARAMS); in load_key_certs_crls_suppress() 894 SET_EXPECT(expect, OSSL_STORE_INFO_CERT); in load_key_certs_crls_suppress() 902 SET_EXPECT(expect, OSSL_STORE_INFO_CERT); in load_key_certs_crls_suppress() 907 SET_EXPECT(expect, OSSL_STORE_INFO_CRL); in load_key_certs_crls_suppress() 915 SET_EXPECT(expect, OSSL_STORE_INFO_CRL); in load_key_certs_crls_suppress() 957 if (expect > 0 && !OSSL_STORE_expect(ctx, expect)) in load_key_certs_crls_suppress()
|
/openssl-master/test/ssl-tests/ |
A D | 05-sni.cnf.in | 74 # We expect that the callback is still called
|
/openssl-master/doc/man7/ |
A D | provider-storemgmt.pod | 89 kind of data to expect, search criteria, and so on. More on those below, in 112 =item "expect" (B<OSSL_STORE_PARAM_EXPECT>) <integer>
|
A D | provider-digest.pod | 259 expect the digest size to be larger than EVP_MAX_MD_SIZE. Any algorithm which
|
/openssl-master/ |
A D | SUPPORT.md | 33 Please keep in mind: Just because something doesn't work the way you expect
|
A D | CONTRIBUTING.md | 52 3. Patches should be as current as possible; expect to have to rebase
|
A D | README-PROVIDERS.md | 18 providers distributed with OpenSSL. In the future we expect third parties to
|
/openssl-master/include/openssl/ |
A D | cmp.h.in | 182 * -- the request body part has not yet been processed; expect to
|