/openssl-master/test/ |
A D | asn1_dsa_internal_test.c | 100 goto fail; in test_decode() 111 goto fail; in test_decode() 121 goto fail; in test_decode() 131 goto fail; in test_decode() 138 goto fail; in test_decode() 146 goto fail; in test_decode() 154 goto fail; in test_decode() 162 goto fail; in test_decode() 170 goto fail; in test_decode() 174 fail: in test_decode()
|
A D | asn1_encode_test.c | 733 int fail = 0; in test_intern() local 754 fail++; in test_intern() 761 fail++; in test_intern() 777 fail++; in test_intern() 784 fail++; in test_intern() 807 fail++; in test_intern() 813 fail++; in test_intern() 826 fail++; in test_intern() 829 return fail == 0; in test_intern()
|
/openssl-master/test/ssl-tests/ |
A D | 03-custom_verify.cnf | 12 test-7 = 7-verify-fail-no-root 14 test-9 = 9-verify-custom-fail-no-root 193 [7-verify-fail-no-root] 194 ssl_conf = 7-verify-fail-no-root-ssl 196 [7-verify-fail-no-root-ssl] 197 server = 7-verify-fail-no-root-server 198 client = 7-verify-fail-no-root-client 200 [7-verify-fail-no-root-server] 205 [7-verify-fail-no-root-client] 242 [9-verify-custom-fail-no-root] [all …]
|
A D | 04-client_auth.cnf | 7 test-2 = 2-client-auth-flex-require-fail 13 test-8 = 8-client-auth-TLSv1-require-fail 90 [2-client-auth-flex-require-fail] 93 [2-client-auth-flex-require-fail-ssl] 97 [2-client-auth-flex-require-fail-server] 104 [2-client-auth-flex-require-fail-client] 257 [8-client-auth-TLSv1-require-fail] 260 [8-client-auth-TLSv1-require-fail-ssl] 440 [14-client-auth-TLSv1.1-require-fail] 623 [20-client-auth-TLSv1.2-require-fail] [all …]
|
A D | 26-tls13_client_auth.cnf | 7 test-2 = 2-client-auth-TLSv1.3-require-fail 12 test-7 = 7-client-auth-TLSv1.3-require-fail-post-handshake 76 [2-client-auth-TLSv1.3-require-fail] 77 ssl_conf = 2-client-auth-TLSv1.3-require-fail-ssl 79 [2-client-auth-TLSv1.3-require-fail-ssl] 80 server = 2-client-auth-TLSv1.3-require-fail-server 81 client = 2-client-auth-TLSv1.3-require-fail-client 83 [2-client-auth-TLSv1.3-require-fail-server] 92 [2-client-auth-TLSv1.3-require-fail-client] 239 [7-client-auth-TLSv1.3-require-fail-post-handshake] [all …]
|
A D | 03-custom_verify.cnf.in | 117 name => "verify-fail-no-root", 146 name => "verify-custom-fail-no-root",
|
/openssl-master/test/recipes/ |
A D | 70-test_key_share.t | 93 ok(TLSProxy::Message->fail(), "Server asks for group already provided"); 99 ok(TLSProxy::Message->fail(), "Missing key_shares extension"); 127 ok(TLSProxy::Message->fail(), "No acceptable key_shares"); 163 ok(TLSProxy::Message->fail(), "Group id too short"); 169 ok(TLSProxy::Message->fail(), "key_exchange length mismatch"); 175 ok(TLSProxy::Message->fail(), "zero length key_exchange data"); 181 ok(TLSProxy::Message->fail(), "key_share list trailing data"); 227 ok(TLSProxy::Message->fail(), "Non offered key_share"); 233 ok(TLSProxy::Message->fail(), "Group id too short in ServerHello"); 251 ok(TLSProxy::Message->fail(), "key_share trailing data in ServerHello"); [all …]
|
A D | 70-test_sslsigalgs.t | 72 ok(TLSProxy::Message->fail, "No TLSv1.3 sigalgs"); 78 ok(TLSProxy::Message->fail, "Empty TLSv1.3 sigalgs"); 84 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 91 ok(TLSProxy::Message->fail, "No PSS TLSv1.3 sigalgs"); 107 ok(TLSProxy::Message->fail, 120 ok(TLSProxy::Message->fail, "No matching TLSv1.3 sigalgs"); 159 ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 1"); 177 ok(TLSProxy::Message->fail, "Empty TLSv1.2 sigalgs"); 185 ok(TLSProxy::Message->fail, "No known TLSv1.3 sigalgs"); 213 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2"); [all …]
|
A D | 70-test_tls13downgrade.t | 49 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2"); 55 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.1"); 62 ok(TLSProxy::Message->fail(), "Downgrade TLSv1.2 to TLSv1.1"); 71 ok(TLSProxy::Message->fail()
|
A D | 70-test_sslversions.t | 61 ok(TLSProxy::Message->fail(), "Empty supported versions"); 68 ok(TLSProxy::Message->fail(), "No recognised versions"); 83 ok(TLSProxy::Message->fail(), "No supported versions extension (only TLS1.3)"); 122 ok(TLSProxy::Message->fail(), "Legacy version is SSLv3 with supported versions");
|
A D | 70-test_comp.t | 62 ok(TLSProxy::Message->fail(), "NULL compression missing"); 74 ok(TLSProxy::Message->fail(), "Non null compression (TLSv1.3)"); 80 ok(TLSProxy::Message->fail(), "NULL compression missing (TLSv1.3)");
|
A D | 70-test_sslsignature.t | 60 ok(TLSProxy::Message->fail, "Corrupt server TLSv1.3 CertVerify"); 95 ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 CertVerify"); 108 ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
|
A D | 70-test_renegotiation.t | 52 ok(TLSProxy::Message->fail(), "No client SCSV"); 95 ok(TLSProxy::Message->fail(), "client_sig_algs instead of sig_algs"); 108 ok(TLSProxy::Message->fail(),
|
A D | 70-test_tls13hrr.t | 52 ok(TLSProxy::Message->fail(), "Server ciphersuite changes"); 65 ok(TLSProxy::Message->fail(), "Client ciphersuite changes");
|
A D | 70-test_tlsextms.t | 137 ok(TLSProxy::Message->fail(), "Client inconsistent session resumption"); 154 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 1"); 171 ok(TLSProxy::Message->fail(), "Server inconsistent session resumption 2");
|
A D | 70-test_sslrecords.t | 112 ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test"); 133 ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test"); 143 ok(TLSProxy::Message->fail(), "Alert before SSLv2 ClientHello test"); 185 ok(TLSProxy::Message->fail(), "Changed record version in TLS1.3");
|
A D | 91-test_pkey_check.t | 33 fail("Missing file $f");
|
A D | 70-test_tls13alerts.t | 42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecryp…
|
A D | 70-test_sslsessiontick.t | 142 ok(TLSProxy::Message->fail, "Server sends ticket extension but no ticket test"); 152 ok(TLSProxy::Message->fail, "No server ticket extension but ticket sent test");
|
A D | 70-test_sslskewith0p.t | 46 ok(TLSProxy::Message->fail, "ServerKeyExchange with 0 p");
|
A D | 20-test_enc_more.t | 28 my $fail = "";
|
A D | 70-test_tls13kexmodes.t | 204 ok(TLSProxy::Message->fail(), "Resume with no kex modes"); 212 ok(TLSProxy::Message->fail(), "Resume with empty kex modes"); 322 ok(TLSProxy::Message->fail(), "Resume with dhe kex mode, no overlapping groups");
|
/openssl-master/external/perl/Text-Template-1.56/t/ |
A D | taint.t | 43 fail q[didn't fail]; 51 fail $@;
|
/openssl-master/test/recipes/90-test_includes_data/ |
A D | incdir.cnf | 2 # Set includedir and expect to fail
|
/openssl-master/doc/man3/ |
A D | ASN1_INTEGER_get_int64.pod | 99 fail if a memory allocation error occurs. 102 and 0 for failure. They will fail if the passed type is incorrect (this will 108 only fail due to a memory allocation error. 111 of NULL if an error occurs. They can fail if the passed type is incorrect
|