Home
last modified time | relevance | path

Searched refs:fail (Results 1 – 25 of 131) sorted by relevance

123456

/openssl-master/test/
A Dasn1_dsa_internal_test.c100 goto fail; in test_decode()
111 goto fail; in test_decode()
121 goto fail; in test_decode()
131 goto fail; in test_decode()
138 goto fail; in test_decode()
146 goto fail; in test_decode()
154 goto fail; in test_decode()
162 goto fail; in test_decode()
170 goto fail; in test_decode()
174 fail: in test_decode()
A Dasn1_encode_test.c733 int fail = 0; in test_intern() local
754 fail++; in test_intern()
761 fail++; in test_intern()
777 fail++; in test_intern()
784 fail++; in test_intern()
807 fail++; in test_intern()
813 fail++; in test_intern()
826 fail++; in test_intern()
829 return fail == 0; in test_intern()
/openssl-master/test/ssl-tests/
A D03-custom_verify.cnf12 test-7 = 7-verify-fail-no-root
14 test-9 = 9-verify-custom-fail-no-root
193 [7-verify-fail-no-root]
194 ssl_conf = 7-verify-fail-no-root-ssl
196 [7-verify-fail-no-root-ssl]
197 server = 7-verify-fail-no-root-server
198 client = 7-verify-fail-no-root-client
200 [7-verify-fail-no-root-server]
205 [7-verify-fail-no-root-client]
242 [9-verify-custom-fail-no-root]
[all …]
A D04-client_auth.cnf7 test-2 = 2-client-auth-flex-require-fail
13 test-8 = 8-client-auth-TLSv1-require-fail
90 [2-client-auth-flex-require-fail]
93 [2-client-auth-flex-require-fail-ssl]
97 [2-client-auth-flex-require-fail-server]
104 [2-client-auth-flex-require-fail-client]
257 [8-client-auth-TLSv1-require-fail]
260 [8-client-auth-TLSv1-require-fail-ssl]
440 [14-client-auth-TLSv1.1-require-fail]
623 [20-client-auth-TLSv1.2-require-fail]
[all …]
A D26-tls13_client_auth.cnf7 test-2 = 2-client-auth-TLSv1.3-require-fail
12 test-7 = 7-client-auth-TLSv1.3-require-fail-post-handshake
76 [2-client-auth-TLSv1.3-require-fail]
77 ssl_conf = 2-client-auth-TLSv1.3-require-fail-ssl
79 [2-client-auth-TLSv1.3-require-fail-ssl]
80 server = 2-client-auth-TLSv1.3-require-fail-server
81 client = 2-client-auth-TLSv1.3-require-fail-client
83 [2-client-auth-TLSv1.3-require-fail-server]
92 [2-client-auth-TLSv1.3-require-fail-client]
239 [7-client-auth-TLSv1.3-require-fail-post-handshake]
[all …]
A D03-custom_verify.cnf.in117 name => "verify-fail-no-root",
146 name => "verify-custom-fail-no-root",
/openssl-master/test/recipes/
A D70-test_key_share.t93 ok(TLSProxy::Message->fail(), "Server asks for group already provided");
99 ok(TLSProxy::Message->fail(), "Missing key_shares extension");
127 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
163 ok(TLSProxy::Message->fail(), "Group id too short");
169 ok(TLSProxy::Message->fail(), "key_exchange length mismatch");
175 ok(TLSProxy::Message->fail(), "zero length key_exchange data");
181 ok(TLSProxy::Message->fail(), "key_share list trailing data");
227 ok(TLSProxy::Message->fail(), "Non offered key_share");
233 ok(TLSProxy::Message->fail(), "Group id too short in ServerHello");
251 ok(TLSProxy::Message->fail(), "key_share trailing data in ServerHello");
[all …]
A D70-test_sslsigalgs.t72 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs");
78 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs");
84 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
91 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs");
107 ok(TLSProxy::Message->fail,
120 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs");
159 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 1");
177 ok(TLSProxy::Message->fail, "Empty TLSv1.2 sigalgs");
185 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs");
213 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
[all …]
A D70-test_tls13downgrade.t49 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2");
55 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.1");
62 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.2 to TLSv1.1");
71 ok(TLSProxy::Message->fail()
A D70-test_sslversions.t61 ok(TLSProxy::Message->fail(), "Empty supported versions");
68 ok(TLSProxy::Message->fail(), "No recognised versions");
83 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)");
122 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions");
A D70-test_comp.t62 ok(TLSProxy::Message->fail(), "NULL compression missing");
74 ok(TLSProxy::Message->fail(), "Non null compression (TLSv1.3)");
80 ok(TLSProxy::Message->fail(), "NULL compression missing (TLSv1.3)");
A D70-test_sslsignature.t60 ok(TLSProxy::Message->fail, "Corrupt server TLSv1.3 CertVerify");
95 ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 CertVerify");
108 ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
A D70-test_renegotiation.t52 ok(TLSProxy::Message->fail(), "No client SCSV");
95 ok(TLSProxy::Message->fail(), "client_sig_algs instead of sig_algs");
108 ok(TLSProxy::Message->fail(),
A D70-test_tls13hrr.t52 ok(TLSProxy::Message->fail(), "Server ciphersuite changes");
65 ok(TLSProxy::Message->fail(), "Client ciphersuite changes");
A D70-test_tlsextms.t137 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption");
154 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1");
171 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2");
A D70-test_sslrecords.t112 ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test");
133 ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
143 ok(TLSProxy::Message->fail(), "Alert before SSLv2 ClientHello test");
185 ok(TLSProxy::Message->fail(), "Changed record version in TLS1.3");
A D91-test_pkey_check.t33 fail("Missing file $f");
A D70-test_tls13alerts.t42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecryp…
A D70-test_sslsessiontick.t142 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test");
152 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test");
A D70-test_sslskewith0p.t46 ok(TLSProxy::Message->fail, "ServerKeyExchange with 0 p");
A D20-test_enc_more.t28 my $fail = "";
A D70-test_tls13kexmodes.t204 ok(TLSProxy::Message->fail(), "Resume with no kex modes");
212 ok(TLSProxy::Message->fail(), "Resume with empty kex modes");
322 ok(TLSProxy::Message->fail(), "Resume with dhe kex mode, no overlapping groups");
/openssl-master/external/perl/Text-Template-1.56/t/
A Dtaint.t43 fail q[didn't fail];
51 fail $@;
/openssl-master/test/recipes/90-test_includes_data/
A Dincdir.cnf2 # Set includedir and expect to fail
/openssl-master/doc/man3/
A DASN1_INTEGER_get_int64.pod99 fail if a memory allocation error occurs.
102 and 0 for failure. They will fail if the passed type is incorrect (this will
108 only fail due to a memory allocation error.
111 of NULL if an error occurs. They can fail if the passed type is incorrect

Completed in 16 milliseconds

123456