/openssl/engines/ |
H A D | e_afalg.txt | 9 AFALG_R_EVENTFD_FAILED:108:eventfd failed 10 AFALG_R_FAILED_TO_GET_PLATFORM_INFO:111:failed to get platform info 11 AFALG_R_INIT_FAILED:100:init failed 12 AFALG_R_IO_SETUP_FAILED:105:io setup failed 16 AFALG_R_MEM_ALLOC_FAILED:102:mem alloc failed 17 AFALG_R_SOCKET_ACCEPT_FAILED:110:socket accept failed 18 AFALG_R_SOCKET_BIND_FAILED:103:socket bind failed 19 AFALG_R_SOCKET_CREATE_FAILED:109:socket create failed 20 AFALG_R_SOCKET_OPERATION_FAILED:104:socket operation failed 21 AFALG_R_SOCKET_SET_KEY_FAILED:106:socket set key failed
|
H A D | e_dasync.txt | 9 DASYNC_R_INIT_FAILED:100:init failed
|
H A D | e_ossltest.txt | 9 OSSLTEST_R_INIT_FAILED:100:init failed
|
H A D | e_loader_attic.txt | 12 ATTIC_R_INIT_FAILED:103:init failed
|
/openssl/test/ |
H A D | x509_check_cert_pkey_test.c | 46 goto failed; in test_x509_check_cert_pkey() 55 goto failed; in test_x509_check_cert_pkey() 60 goto failed; in test_x509_check_cert_pkey() 63 goto failed; in test_x509_check_cert_pkey() 69 goto failed; in test_x509_check_cert_pkey() 76 goto failed; in test_x509_check_cert_pkey() 85 goto failed; in test_x509_check_cert_pkey() 97 goto failed; in test_x509_check_cert_pkey() 101 failed: in test_x509_check_cert_pkey()
|
H A D | pbelutest.c | 20 int i, failed = 0; in test_pbelu() local 26 failed = 1; in test_pbelu() 31 if (!failed) in test_pbelu() 36 failed = pbe_type < last_type in test_pbelu() 39 OBJ_nid2sn(pbe_nid), failed ? "ERROR" : "OK"); in test_pbelu()
|
H A D | v3nametest.c | 283 int failed = 0; in run_cert() local 298 failed = 1; in run_cert() 307 failed = 1; in run_cert() 313 failed = 1; in run_cert() 323 failed = 1; in run_cert() 335 failed = 1; in run_cert() 339 return failed == 0; in run_cert() 344 int failed = 0; in call_run_cert() local 354 failed = 1; in call_run_cert() 357 return failed == 0; in call_run_cert()
|
H A D | exptest.c | 52 int ret = 1, failed = 0; in test_mod_exp_zero() local 71 failed = 1; in test_mod_exp_zero() 77 failed = 1; in test_mod_exp_zero() 83 failed = 1; in test_mod_exp_zero() 89 failed = 1; in test_mod_exp_zero() 95 failed = 1; in test_mod_exp_zero() 111 ret = !failed; in test_mod_exp_zero()
|
H A D | x509_time_test.c | 281 int cmp_result, failed = 0; in test_x509_cmp_time_current() local 288 failed = 1; in test_x509_cmp_time_current() 292 failed = 1; in test_x509_cmp_time_current() 297 return failed == 0; in test_x509_cmp_time_current()
|
H A D | README.md | 23 Full verbosity, showing full output of all successful and failed test cases 30 Verbosity on failed (sub-)tests only 35 Verbosity on failed (sub-)tests, in addition progress on succeeded (sub-)tests
|
/openssl/util/ |
H A D | dofile.pl | 62 my $failed = 0; 66 $failed++;
|
/openssl/crypto/err/ |
H A D | openssl.txt | 127 ASYNC_R_INIT_FAILED:105:init failed 251 CMP_R_POLLING_FAILED:172:polling failed 530 DSO_R_CTRL_FAILED:100:control command failed 636 ENGINE_R_FINISH_FAILED:106:finish failed 638 ENGINE_R_INIT_FAILED:109:init failed 719 EVP_R_KEY_SETUP_FAILED:180:key setup failed 974 PROP_R_PARSE_FAILED:108:parse failed 998 PROV_R_FAILED_TO_SIGN:175:failed to sign 1036 PROV_R_KEY_SETUP_FAILED:101:key setup failed 1295 SSL_R_CALLBACK_FAILED:234:callback failed [all …]
|
/openssl/doc/man3/ |
H A D | RAND_egd.pod | 40 daemon on success, or -1 if the connection failed or the daemon did not 44 success, or -1 if the connection failed.
|
H A D | BIO_should_retry.pod | 27 They will typically be called after a failed BIO_read_ex() or BIO_write_ex() 80 signal a retry then it need not call BIO_should_retry() after a failed 85 occurs during a call to BIO_read(). An application can retry the failed 89 While an application may retry a failed non blocking call immediately
|
H A D | SSL_get_fd.pod | 31 The operation failed, because the underlying BIO is not of the correct type
|
H A D | SSL_alert_type_string.pod | 131 =item "DC"/"decryption failed" 164 A handshake cryptographic operation failed, including being 185 failed specifically because the server requires ciphers more
|
H A D | BN_CTX_start.pod | 39 Once BN_CTX_get() has failed, the subsequent calls will return B<NULL>
|
H A D | X509_STORE_CTX_set_verify_cb.pod | 69 when a certificate verification has failed, adds an entry to the error queue 71 including the most relevant fields of the target certificate that failed to
|
H A D | EVP_OpenInit.pod | 52 EVP_OpenFinal() returns 0 if the decrypt failed or 1 for success.
|
H A D | SSL_set_fd.pod | 40 The operation failed. Check the error stack to find out why.
|
H A D | SSL_set_session.pod | 47 The operation failed; check the error stack to find out the reason.
|
H A D | SSL_CTX_load_verify_locations.pod | 131 The operation failed because B<CAfile> and B<CApath> are NULL or the 132 processing at one of the locations specified failed. Check the error
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_poly1305.txt | 175 # poly1305_ieee754.c failed this in final stage 183 # AVX2 in poly1305-x86.pl failed this with 176+32 split
|
/openssl/apps/lib/ |
H A D | apps.c | 879 const char *failed = FAIL_NAME; in load_key_certs_crls() local 884 if (failed == NULL) { in load_key_certs_crls() 948 failed = NULL; in load_key_certs_crls() 1023 failed = OSSL_STORE_INFO_type_string(type); in load_key_certs_crls() 1035 if (failed == NULL) { in load_key_certs_crls() 1036 failed = FAIL_NAME; in load_key_certs_crls() 1037 if (failed != NULL) in load_key_certs_crls() 1040 if (failed != NULL) { in load_key_certs_crls() 1046 BIO_printf(bio_err, " %s", failed); in load_key_certs_crls() 1061 if (bio_err == NULL || failed == NULL) in load_key_certs_crls() [all …]
|
/openssl/VMS/ |
H A D | openssl_ivp.com.in | 55 $ WRITE SYS$ERROR "OpenSSL IVP failed"
|