/openssl/test/helpers/ |
H A D | quictestlib.c | 150 if (fault != NULL) { in qtest_create_quic_objects() 151 *fault = OPENSSL_zalloc(sizeof(**fault)); in qtest_create_quic_objects() 154 bdata->fault = *fault; in qtest_create_quic_objects() 343 if (fault != NULL) in qtest_create_quic_objects() 358 if (fault != NULL) in qtest_create_quic_objects() 781 fault->pplaincb(fault, &fault->pplainhdr, in packet_plain_mutate() 783 fault->pplainio.buf_len, fault->pplaincbarg); in packet_plain_mutate() 920 if (!fault->encextcb(fault, &ee, payloadlen, fault->encextcbarg)) in handshake_mutate() 930 && !fault->handshakecb(fault, buf, fault->handbuflen, in handshake_mutate() 1154 if (!bdata->fault->pciphercb(bdata->fault, &hdr, in pcipher_sendmmsg() [all …]
|
H A D | quictestlib.h | 18 struct qtest_fault *fault; member 69 void qtest_fault_free(QTEST_FAULT *fault); 124 int qtest_fault_set_packet_plain_listener(QTEST_FAULT *fault, 150 typedef int (*qtest_fault_on_handshake_cb)(QTEST_FAULT *fault, 155 int qtest_fault_set_handshake_listener(QTEST_FAULT *fault, 181 typedef int (*qtest_fault_on_enc_ext_cb)(QTEST_FAULT *fault, 186 int qtest_fault_set_hand_enc_ext_listener(QTEST_FAULT *fault, 210 int qtest_fault_delete_extension(QTEST_FAULT *fault, 240 typedef int (*qtest_fault_on_datagram_cb)(QTEST_FAULT *fault, 245 int qtest_fault_set_datagram_listener(QTEST_FAULT *fault, [all …]
|
/openssl/test/ |
H A D | quicfaultstest.c | 87 return qtest_fault_prepend_frame(fault, unknown_frame, in add_unknown_frame_cb() 101 QTEST_FAULT *fault = NULL; in test_unknown_frame() local 118 if (!TEST_true(qtest_fault_set_packet_plain_listener(fault, in test_unknown_frame() 153 qtest_fault_free(fault); in test_unknown_frame() 164 static int drop_extensions_cb(QTEST_FAULT *fault, in drop_extensions_cb() argument 183 QTEST_FAULT *fault = NULL; in test_drop_extensions() local 201 if (!TEST_true(qtest_fault_set_hand_enc_ext_listener(fault, in test_drop_extensions() 218 qtest_fault_free(fault); in test_drop_extensions() 248 if (!qtest_fault_resize_datagram(fault, m->data_len - 1)) in on_datagram_cb() 262 QTEST_FAULT *fault = NULL; in test_corrupted_data() local [all …]
|
H A D | quic_newcid_test.c | 23 static int add_ncid_frame_cb(QTEST_FAULT *fault, QUIC_PKT_HDR *hdr, in add_ncid_frame_cb() argument 45 return qtest_fault_prepend_frame(fault, new_conn_id_frame, in add_ncid_frame_cb() 60 QTEST_FAULT *fault = NULL; in test_ncid_frame() local 71 &qtserv, &cssl, &fault, NULL))) in test_ncid_frame() 97 if (!TEST_true(qtest_fault_set_packet_plain_listener(fault, in test_ncid_frame() 142 qtest_fault_free(fault); in test_ncid_frame()
|
H A D | quicapitest.c | 1643 QTEST_FAULT *fault = NULL; in test_noisy_dgram() local 1652 &clientquic, &fault, NULL))) in test_noisy_dgram() 1726 qtest_fault_free(fault); in test_noisy_dgram() 1749 QTEST_FAULT *fault = NULL; in test_bw_limit() local 1756 &clientquic, &fault, NULL))) in test_bw_limit() 1764 if (!TEST_true(qtest_fault_set_bw_limit(fault, 1000, 1000, 0))) in test_bw_limit() 1818 qtest_fault_free(fault); in test_bw_limit()
|
H A D | quic_multistream_test.c | 771 bdata->fault = h->qtf; in helper_init() 981 static int helper_handshake_listener(QTEST_FAULT *fault, in helper_handshake_listener() argument 990 static int helper_datagram_listener(QTEST_FAULT *fault, in helper_datagram_listener() argument
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fault-injector.md | 15 fault) into an otherwise normal QUIC connection. Therefore the fault injector 223 void ossl_quic_fault_free(OSSL_QUIC_FAULT *fault); 343 int ossl_quic_fault_delete_extension(OSSL_QUIC_FAULT *fault, 377 int ossl_quic_fault_set_datagram_listener(OSSL_QUIC_FAULT *fault, 423 return ossl_quic_fault_prepend_frame(fault, unknown_frame, 437 OSSL_QUIC_FAULT *fault = NULL; 484 ossl_quic_fault_free(fault); 502 static int drop_transport_params_cb(OSSL_QUIC_FAULT *fault, 506 if (!ossl_quic_fault_delete_extension(fault, 520 OSSL_QUIC_FAULT *fault = NULL; [all …]
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 62 It should be noted that this approach isn't entirely fault free.
|
/openssl/ |
H A D | NEWS.md | 627 * Fixed segmentation fault in SSL_check_chain() ([CVE-2020-1967]) 977 * Segmentation fault in DTLSv1_listen fix ([CVE-2015-0207]) 978 * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286]) 979 * Segmentation fault for invalid PSS parameters fix ([CVE-2015-0208]) 1075 * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286]) 1199 * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286])
|
H A D | CHANGES.md | 3843 * Fixed segmentation fault in SSL_check_chain() 7466 various sizes and potentially cause a segmentation fault, resulting in 7542 fault will be triggered, thus enabling a potential DoS attack. 7549 * Segmentation fault in DTLSv1_listen fix 7556 that can lead to a segmentation fault. Errors processing the initial 7566 * Segmentation fault in ASN1_TYPE_cmp fix 7578 * Segmentation fault for invalid PSS parameters fix 8637 various sizes and potentially cause a segmentation fault, resulting in 8694 * Segmentation fault in ASN1_TYPE_cmp fix 9759 * Segmentation fault in ASN1_TYPE_cmp fix [all …]
|
/openssl/Configurations/ |
H A D | descrip.mms.tmpl | 1455 @ ! fault or warning. 1457 @ ! At this point, if link_severity shows that there was a fault
|