Home
last modified time | relevance | path

Searched refs:subtest (Results 1 – 25 of 26) sorted by relevance

12

/openssl-master/test/recipes/
A D20-test_dhparam.t88 subtest "Read: 1024 bit PKCS3 params, generator 2, PEM file" => sub {
92 subtest "Read: 1024 bit PKCS3 params, generator 5, PEM file" => sub {
96 subtest "Read: 2048 bit PKCS3 params, generator 2, PEM file" => sub {
100 subtest "Read: 1024 bit X9.42 params, PEM file" => sub {
104 subtest "Read: 1024 bit PKCS3 params, generator 2, DER file" => sub {
108 subtest "Read: 1024 bit PKCS3 params, generator 5, DER file" => sub {
112 subtest "Read: 2048 bit PKCS3 params, generator 2, DER file" => sub {
116 subtest "Read: 1024 bit X9.42 params, DER file" => sub {
122 subtest "Generate: 512 bit PKCS3 params, generator 2, PEM file" => sub {
134 subtest "Generate: 512 bit PKCS3 params, generator 5, PEM file" => sub {
[all …]
A D15-test_ec.t30 subtest 'EC conversions -- private key' => sub {
34 subtest 'EC conversions -- private key PKCS#8' => sub {
39 subtest 'EC conversions -- public key' => sub {
45 subtest 'PKEY conversions -- private key' => sub {
49 subtest 'PKEY conversions -- private key PKCS#8' => sub {
54 subtest 'PKEY conversions -- public key' => sub {
60 subtest 'Ed25519 conversions -- private key' => sub {
69 subtest 'Ed25519 conversions -- public key' => sub {
74 subtest 'Ed448 conversions -- private key' => sub {
78 subtest 'Ed448 conversions -- private key PKCS#8' => sub {
[all …]
A D80-test_tsa.t112 unless subtest 'creating tsa_cert1.pem TSA server cert' => sub {
130 subtest 'generating valid response for req1.req' => sub {
142 subtest 'verifying valid response' => sub {
147 unless subtest 'verifying valid token' => sub {
168 unless subtest 'generating valid response for req2.req' => sub {
197 subtest 'verifying invalid resp1 with wrong 2nd certid' => sub {
205 subtest 'verifying resp2 against wrong req1 should fail' => sub {
209 subtest 'verifying resp1 against wrong req2 should fail' => sub {
213 subtest 'verifying resp1 using wrong untrusted should fail' => sub {
217 subtest 'verifying resp1 using wrong root should fail' => sub {
[all …]
A D15-test_ecparam.t62 subtest "Check loading valid parameters by ecparam with -check" => sub {
67 subtest "Check loading valid parameters by ecparam with -check_named" => sub {
72 subtest "Check loading valid parameters by pkeyparam with -check" => sub {
77 subtest "Check loading non-canonically encoded parameters by ecparam with -check" => sub {
82 subtest "Check loading non-canonically encoded parameters by ecparam with -check_named" => sub {
87 subtest "Check loading non-canonically encoded parameters by pkeyparam with -check" => sub {
92 subtest "Check loading invalid parameters by ecparam with -check" => sub {
97 subtest "Check loading invalid parameters by ecparam with -check_named" => sub {
102 subtest "Check loading invalid parameters by pkeyparam with -check" => sub {
107 subtest "Check ecparam does not change the parameter file on output" => sub {
[all …]
A D80-test_ocsp.t54 subtest "=== VALID OCSP RESPONSES ===" => sub {
73 subtest "=== INVALID SIGNATURE on the OCSP RESPONSE ===" => sub {
90 subtest "=== WRONG RESPONDERID in the OCSP RESPONSE ===" => sub {
107 subtest "=== WRONG ISSUERNAMEHASH in the OCSP RESPONSE ===" => sub {
124 subtest "=== WRONG ISSUERKEYHASH in the OCSP RESPONSE ===" => sub {
141 subtest "=== WRONG KEY in the DELEGATED OCSP SIGNING CERTIFICATE ===" => sub {
152 subtest "=== INVALID SIGNATURE on the DELEGATED OCSP SIGNING CERTIFICATE ===" => sub {
163 subtest "=== WRONG SUBJECT NAME in the ISSUER CERTIFICATE ===" => sub {
180 subtest "=== WRONG KEY in the ISSUER CERTIFICATE ===" => sub {
197 subtest "=== INVALID SIGNATURE on the ISSUER CERTIFICATE ===" => sub {
[all …]
A D20-test_dgst.t58 subtest "RSA signature generation and verification with `dgst` CLI" => sub {
69 subtest "DSA signature generation and verification with `dgst` CLI" => sub {
80 subtest "ECDSA signature generation and verification with `dgst` CLI" => sub {
93 subtest "Ed25519 signature generation and verification with `dgst` CLI" => sub {
99 subtest "Ed448 signature generation and verification with `dgst` CLI" => sub {
106 subtest "HMAC generation with `dgst` CLI" => sub {
120 subtest "HMAC generation with `dgst` CLI, default digest" => sub {
134 subtest "HMAC generation with `dgst` CLI, key via option" => sub {
149 subtest "Custom length XOF digest generation with `dgst` CLI" => sub {
A D20-test_pkeyutl.t132 subtest "RSA CLI signature generation and verification" => sub {
139 subtest "RSA CLI signature and verification with pkeyopt" => sub {
152 subtest "DSA CLI signature generation and verification" => sub {
164 subtest "ECDSA CLI signature generation and verification" => sub {
176 subtest "Ed2559 CLI signature generation and verification" => sub {
183 subtest "Ed448 CLI signature generation and verification" => sub {
A D15-test_dsa.t28 subtest "dsa conversions using 'openssl dsa' -- private key" => sub {
32 subtest "dsa conversions using 'openssl dsa' -- public key" => sub {
38 subtest "dsa conversions using 'openssl pkey' -- private key PKCS#8" => sub {
43 subtest "dsa conversions using 'openssl pkey' -- public key" => sub {
A D25-test_req.t52 subtest "generating alt certificate requests with RSA" => sub {
80 subtest "generating certificate requests with RSA" => sub {
136 subtest "generating certificate requests with RSA-PSS" => sub {
217 subtest "generating certificate requests with DSA" => sub {
237 subtest "generating certificate requests with ECDSA" => sub {
257 subtest "generating certificate requests with Ed25519" => sub {
277 subtest "generating certificate requests with Ed448" => sub {
297 subtest "generating certificate requests" => sub {
310 subtest "generating SM2 certificate requests" => sub {
355 subtest $title => sub {
A D15-test_rsa.t39 subtest "$cmd conversions -- private key" => sub {
43 subtest "$cmd conversions -- private key PKCS#8" => sub {
54 subtest "$cmd conversions -- public key" => sub {
A D25-test_x509.t85 subtest 'x509 -- x.509 v1 certificate' => sub {
89 subtest 'x509 -- first x.509 v3 certificate' => sub {
93 subtest 'x509 -- second x.509 v3 certificate' => sub {
98 subtest 'x509 -- pathlen' => sub {
A D80-test_ssl_old.t86 subtest 'test_ss' => sub {
182 subtest 'DSA certificate creation' => sub {
226 subtest 'ECDSA/ECDH certificate creation' => sub {
351 subtest 'standard SSL tests' => sub {
424 subtest "Testing ciphersuites" => sub {
520 subtest 'RSA/(EC)DHE/PSK tests' => sub {
573 subtest 'Custom Extension tests' => sub {
587 subtest 'Serverinfo tests' => sub {
A D25-test_pkcs7.t22 subtest 'pkcs7 conversions -- pkcs7' => sub {
26 subtest 'pkcs7 conversions -- pkcs7d' => sub {
A D20-test_cli_fips.t165 subtest EC => sub {
219 subtest RSA => sub {
267 subtest DSA => sub {
A D25-test_sid.t26 subtest 'sid conversions' => sub {
A D25-test_crl.t26 subtest 'crl conversions' => sub {
A D15-test_genec.t246 subtest "test curves that only support explicit parameters encoding" => sub {
A D80-test_ssl_new.t120 subtest "Test configuration $conf" => sub {
A D70-test_tlsextms.t209 subtest $testname => sub {
A D80-test_ca.t120 subtest "Revoke certificate and generate CRL: $filename" => sub {
A D70-test_sslsessiontick.t220 subtest $testname => sub {
A D80-test_cmp_http.t151 subtest "CMP app CLI $server_name $aspect\n" => sub {
/openssl-master/test/testutil/
A Ddriver.c37 int subtest:1; member
70 int num, int subtest) in add_all_tests() argument
76 all_tests[num_tests].subtest = subtest; in add_all_tests()
78 if (subtest) in add_all_tests()
345 if (all_tests[i].subtest) { in run_tests()
381 if (all_tests[i].subtest) in run_tests()
391 if (all_tests[i].subtest) { in run_tests()
397 if (all_tests[i].num == -1 || all_tests[i].subtest) in run_tests()
/openssl-master/util/perl/OpenSSL/
A DTest.pm1319 sub subtest { subroutine
1322 Test::More::subtest @_;
/openssl-master/util/perl/
A Dcheckhandshake.pm67 subtest $testname => sub {

Completed in 31 milliseconds

12