/openssl-master/test/helpers/ |
A D | pkcs12.c | 110 pb->success = 1; in new_pkcs12_builder() 131 if (!pb->success) in end_pkcs12() 139 if (!pb->success) in end_pkcs12_with_mac() 151 if (!pb->success) in generate_p12() 382 if (!pb->success) in add_certbag() 415 if (!pb->success) in add_keybag() 446 if (!pb->success) in add_secretbag() 549 if (!pb->success) in check_certbag() 585 if (!pb->success) in check_keybag() 643 if (!pb->success) in check_secretbag() [all …]
|
/openssl-master/test/ssl-tests/ |
A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 9 test-4 = 4-noverify-success 17 [0-verify-success] 18 ssl_conf = 0-verify-success-ssl 20 [0-verify-success-ssl] 24 [0-verify-success-server] 29 [0-verify-success-client] 122 [4-noverify-success] 125 [4-noverify-success-ssl] 129 [4-noverify-success-server] [all …]
|
A D | 03-custom_verify.cnf.in | 19 name => "verify-success", 71 name => "noverify-success", 81 # The callback return has no impact on handshake success in this mode. 98 # The callback return has no impact on handshake success in this mode. 131 name => "verify-custom-success-no-root",
|
/openssl-master/fuzz/ |
A D | bndiv.c | 48 int success = 0; in FuzzerTestOneInput() local 79 success = 1; in FuzzerTestOneInput() 85 success = BN_is_zero(b3) && BN_is_zero(b4); in FuzzerTestOneInput() 87 success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput() 90 success = (BN_is_negative(b3) == BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput() 95 success = success && BN_cmp(b5, b1) == 0; in FuzzerTestOneInput() 96 if (!success) { in FuzzerTestOneInput() 117 OPENSSL_assert(success); in FuzzerTestOneInput()
|
A D | bignum.c | 32 int success = 0; in FuzzerTestOneInput() local 73 success = 1; in FuzzerTestOneInput() 80 success = BN_cmp(b4, b5) == 0; in FuzzerTestOneInput() 81 if (!success) { in FuzzerTestOneInput() 95 OPENSSL_assert(success); in FuzzerTestOneInput()
|
/openssl-master/test/ |
A D | threadstest_fips.c | 17 static int success; variable 24 success = 0; in thread_fips_rand_fetch() 32 success = 1; in test_fips_rand_leak() 38 return TEST_true(success); in test_fips_rand_leak()
|
A D | asn1_encode_test.c | 187 ASN1_BOOLEAN success; member 277 ASN1_BOOLEAN success; member 325 ASN1_BOOLEAN success; member 373 ASN1_BOOLEAN success; member 422 ASN1_BOOLEAN success; member 473 ASN1_BOOLEAN success; member 495 if (expected->success == 0) { in do_decode() 534 if (input->success == 0) { in do_encode() 750 if (expected->success) { in test_intern() 773 if (expected->success) { in test_intern() [all …]
|
A D | drbgtest.c | 404 int success = 1; in test_rand_reseed_on_fork() local 472 success = 0; in test_rand_reseed_on_fork() 478 success = 0; in test_rand_reseed_on_fork() 495 success = 0; in test_rand_reseed_on_fork() 498 if (verbose || !success) { in test_rand_reseed_on_fork() 514 return success; in test_rand_reseed_on_fork() 519 int success = 1; in test_rand_fork_safety() local 531 success = 0; in test_rand_fork_safety() 535 success = 0; in test_rand_fork_safety() 537 return success; in test_rand_fork_safety()
|
A D | dtlsv1listentest.c | 299 int ret, success = 0; in dtls_listen_test() local 339 success = 1; in dtls_listen_test() 347 return success; in dtls_listen_test()
|
A D | ct_test.c | 226 int success = 0; in execute_cert_test() local 321 success = 1; in execute_cert_test() 330 return success; in execute_cert_test() 471 int success = 0; in test_default_ct_policy_eval_ctx_time_is_now() local 481 success = 1; in test_default_ct_policy_eval_ctx_time_is_now() 484 return success; in test_default_ct_policy_eval_ctx_time_is_now()
|
/openssl-master/test/recipes/ |
A D | 70-test_key_share.t | 87 ok(TLSProxy::Message->success(), "Success after HRR"); 111 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 138 ok(TLSProxy::Message->success(), "Non preferred key_share"); 149 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 195 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE3072), 198 ok(TLSProxy::Message->success() && ($selectedgroupid == P_256), 211 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE2048), 214 ok(TLSProxy::Message->success() && ($selectedgroupid == X25519), 263 ok(TLSProxy::Message->success() 275 ok(TLSProxy::Message->success(), "Ignore key_share for TLS<=1.2 server");
|
A D | 70-test_sslsigalgs.t | 59 ok(TLSProxy::Message->success, "Default sigalgs"); 99 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 134 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server"); 149 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0"); 194 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs"); 202 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2"); 236 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA"); 277 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3"); 284 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert"); 307 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello"); [all …]
|
A D | 70-test_sslversions.t | 75 ok(TLSProxy::Message->success() 91 ok(TLSProxy::Message->success() 104 ok(TLSProxy::Message->success() 113 ok(TLSProxy::Message->success()
|
A D | 70-test_sslextension.t | 212 ok(TLSProxy::Message->success, "Zero extension length test"); 230 ok(TLSProxy::Message->success(), "Cryptopro extension in ClientHello"); 242 ok(TLSProxy::Message->success(), "Noncompliant supported_groups extension");
|
A D | 70-test_tls13cookie.t | 52 ok(TLSProxy::Message->success() && $cookieseen == 1, "Cookie seen"); 69 ok(TLSProxy::Message->success() && $cookieseen == 1, "Cookie seen");
|
A D | 70-test_tls13downgrade.t | 84 ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole"); 91 ok(TLSProxy::Message->success(), "TLSv1.2 server-side protocol hole");
|
/openssl-master/apps/lib/ |
A D | s_socket.c | 212 int success = 1; in report_server_accept() local 225 success = BIO_printf(out, in report_server_accept() 232 success = 0; in report_server_accept() 239 success = success && BIO_printf(out, " PID=%d", getpid()) > 0; in report_server_accept() 240 success = success && BIO_printf(out, "\n") > 0; in report_server_accept() 243 return success; in report_server_accept()
|
/openssl-master/util/perl/TLSProxy/ |
A D | Message.pm | 142 my $success = 0; 156 $success = 0; 275 $success = 1; 285 $success = 1; 402 sub success subroutine 405 return $success; 410 return !$success && $end;
|
/openssl-master/include/openssl/ |
A D | ct.h.in | 104 * Returns 1 on success, 0 otherwise. 114 * Returns 1 on success, 0 otherwise. 190 * Returns 1 on success, 0 otherwise. 204 * Returns 1 on success, 0 otherwise. 211 * Returns 1 on success, 0 otherwise. 237 * Returns 1 on success, 0 otherwise. 257 * Returns 1 on success, 0 otherwise. 277 * Returns 1 on success, 0 otherwise. 289 * Returns 1 on success, 0 otherwise. 356 * on success. [all …]
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_msg_create.pod | 90 Returns 1 on success, 0 on error. 97 Returns pointer to created B<OSSL_CMP_MSG> on success, NULL on error. 101 Returns 1 on success, 0 on error. 106 Returns 1 on success, 0 on error.
|
A D | ossl_punycode_decode.pod | 36 ossl_a2ulabel() returns 1 on success, 0 on not enough buf passed, 43 ossl_punycode_decode() returns 1 on success, 0 on error. On success,
|
/openssl-master/doc/man3/ |
A D | X509_STORE_set_verify_cb_func.pod | 137 on success. 143 On success it assigns to I<*issuer> the first match that is currently valid, 158 been issued with I<issuer>) and 1 on success. 166 It must return 0 on failure and 1 on success. 173 This function must return 0 on failure and 1 on success. 179 This function must return 0 on failure and 1 on success. 185 This function must return 0 on failure and 1 on success. 191 This function must return 0 on failure and 1 on success. 200 success.
|
A D | EVP_PKEY_ASN1_METHOD.pod | 167 They MUST return 0 on error, 1 on success. 177 It MUST return 0 on error, 1 on success. 187 They MUST return 0 on error, 1 on success. 192 It MUST return 0 on error, 1 on success. 216 They MUST return 0 on error, 1 on success. 225 It MUST return 0 on error, 1 on success. 235 It MUST return 0 on error, 1 on success. 247 It MUST return 0 on error, 1 on success. 272 old_priv_decode() MUST return 0 on error, 1 on success. 340 It MUST return 0 on error, or 1 on success. [all …]
|
A D | BIO_s_file.pod | 90 BIO_set_fp() and BIO_get_fp() return 1 for success or <=0 for failure 93 BIO_seek() returns 0 for success or negative values for failure. 98 BIO_rw_filename() return 1 for success or <=0 for failure. 145 stream. The return value for fseek() is 0 for success or -1 if an error 147 1 for success and a non positive value if an error occurred.
|
A D | BIO_ctrl.pod | 86 BIO_reset() normally returns 1 for success and <=0 for failure. File 87 BIOs are an exception, they return 0 for success and -1 for failure. 89 BIO_seek() and BIO_tell() both return the current file position on success 91 for success and -1 for failure. 93 BIO_flush() returns 1 for success and <=0 for failure. 97 BIO_set_close() returns 1 on success or <=0 for failure.
|