/test/helpers/ |
A D | handshake.c | 311 int len, status; in client_ocsp_cb() local 330 int len, status; in client_ocsp_cb_ext() local 529 switch (status) { in decrypt_session_ticket_cb() 857 peer_status_t status; member 1154 peer->status = PEER_SUCCESS; in do_reneg_setup_step() 1653 client.status = PEER_RETRY; in do_handshake_internal() 1654 server.status = PEER_WAITING; in do_handshake_internal() 1669 status = handshake_status(client.status, server.status, in do_handshake_internal() 1675 status = handshake_status(server.status, client.status, in do_handshake_internal() 1679 switch (status) { in do_handshake_internal() [all …]
|
/test/ |
A D | bn_internal_test.c | 30 int status = 0; in test_is_prime_enhanced() local 38 &status)) in test_is_prime_enhanced() 39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced() 51 int status = 0; in test_is_composite_enhanced() local 58 &status)) in test_is_composite_enhanced() 59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
|
A D | cmp_status_test.c | 43 int status; in execute_PKISI_test() local 52 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test() 53 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test() 54 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
|
A D | provider_status_test.c | 112 int status; in get_provider_params() local 125 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params() 136 || !TEST_true(status == 1)) in get_provider_params() 147 unsigned int status = 0; in test_provider_status() local 160 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status() 163 || !TEST_true(status == 1)) in test_provider_status() 192 || !TEST_uint_eq(status, 0)) in test_provider_status()
|
A D | http_test.c | 50 char status[4] = "200"; in mock_http_server() local 64 if (hdr == suggested_status + sizeof(status) - 1) in mock_http_server() 65 strncpy(status, suggested_status, sizeof(status) - 1); in mock_http_server() 95 if (BIO_printf(out, "HTTP/1.%c %s %s\r\n", version, status, in mock_http_server() 97 strcmp(status, "200") == 0 ? "OK" : in mock_http_server() 98 strcmp(status, "400") >= 0 ? "error" : "fatal") <= 0) in mock_http_server() 105 if (strcmp(status, "399") == 0) /* HTTP_STATUS_CODES_FATAL_ERROR */ in mock_http_server()
|
A D | threadpool_test.c | 103 int status = 0; in test_thread_internal() local 129 status = 1; in test_thread_internal() 241 status = 1; in test_thread_internal() 244 return status; in test_thread_internal()
|
A D | fake_rsaprov.c | 50 int status; member 102 fake_rsa_key->status = FAKE_RSA_STATUS_IMPORTED; in fake_rsa_keymgmt_import() 239 if (key->status != FAKE_RSA_STATUS_IMPORTED && key->status != FAKE_RSA_STATUS_DECODED) in fake_rsa_keymgmt_load() 274 keydata->status = FAKE_RSA_STATUS_GENERATED; in fake_rsa_gen() 337 if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0)) in fake_rsa_sig_sign_init() 400 if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0)) in fake_rsa_dgstsgnvfy_init() 861 key->status = FAKE_RSA_STATUS_DECODED; in fake_rsa_d2i_PUBKEY() 1090 key->status = FAKE_RSA_STATUS_DECODED; in fake_rsa_key_from_pkcs8()
|
A D | crltest.c | 345 int status = X509_V_ERR_UNSPECIFIED; in verify() local 374 status = X509_verify_cert(ctx) == 1 ? X509_V_OK in verify() 382 return status; in verify()
|
A D | cmp_client_test.c | 128 int status = OSSL_CMP_CTX_get_status(ctx); in execute_exec_certrequest_ses_test() local 131 if (!TEST_int_eq(status, fixture->expected) in execute_exec_certrequest_ses_test() 133 && TEST_int_eq(status, OSSL_CMP_PKISTATUS_trans))) in execute_exec_certrequest_ses_test()
|
A D | drbgtest.c | 335 int rv = 0, status; in test_drbg_reseed_in_child() local 353 if (TEST_int_eq(waitpid(pid, &status, 0), pid) in test_drbg_reseed_in_child() 354 && TEST_int_eq(status, 0) in test_drbg_reseed_in_child()
|
A D | README-external.md | 162 - Go to root directory, there should be a new git status: 165 $ git status
|
A D | quic_txp_test.c | 1310 QUIC_TXP_STATUS status; in run_script() local 1322 if (!TEST_true(ossl_quic_tx_packetiser_generate(h.txp, &status)) in run_script() 1323 && !TEST_size_t_gt(status.sent_pkt, 0)) in run_script() 1330 if (!TEST_true(ossl_quic_tx_packetiser_generate(h.txp, &status)) in run_script() 1331 && !TEST_size_t_eq(status.sent_pkt, 0)) in run_script()
|
A D | cmp_ctx_test.c | 69 ctx->status = 1; in execute_CTX_reinit_test() 88 if (!TEST_true(ctx->status == -1 in execute_CTX_reinit_test() 801 DEFINE_SET_GET_INT_TEST(ossl_cmp, ctx, status) in DEFINE_SET_CB_TEST()
|
A D | sslapitest.c | 809 int testresult = 0, status; in test_no_ems() local 825 status = create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE); in test_no_ems() 827 if (status == 1) { in test_no_ems() 832 if (!status) { in test_no_ems() 1858 static OCSP_RESPONSE *create_ocsp_resp(X509 *ssl_cert, X509 *issuer, int status, in create_ocsp_resp() argument 1886 ocsp_resp = OCSP_response_create(status, NULL); in create_ocsp_resp() 8723 SSL_TICKET_STATUS status, in dec_tick_cb() argument 8731 if (status == SSL_TICKET_EMPTY) in dec_tick_cb() 8734 if (!TEST_true(status == SSL_TICKET_SUCCESS in dec_tick_cb() 8735 || status == SSL_TICKET_SUCCESS_RENEW)) in dec_tick_cb() [all …]
|