/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_credentials.csv | 3 1,valid secret - wrong cert/key ignored, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.… 5 0,wrong secret without ref, -section,,BLANK,, -secret,pass:wrong,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,… 6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.… 10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key… 18 0,keypass prefix wrong, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,:12345… 19 0,wrong keypass, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:123456,B… 24 0,wrong cert, -section,,BLANK,,BLANK,, -cert,trusted.crt, -key,signer.p12, -keypass,pass:12345,BLAN…
|
H A D | test_connection.csv | 7 0,wrong server, -section,, -server,xn--rksmrgs-5wao1o.example.com:_SERVER_PORT,,,,,BLANK,,,, -msg_t… 8 0,wrong server port, -section,, -server,_SERVER_HOST:99,,,,,BLANK,,,, -msg_timeout,1,BLANK,,BLANK, 16 0,server with wrong port, -section,, -server,_SERVER_HOST:999,,,,,BLANK,,,,-msg_timeout,1,BLANK,,BL… 30 0,path wrong, -section,,,,,,,,BLANK,, -path,/publicweb/cmp/example,BLANK,,BLANK,,BLANK,
|
H A D | test_verification.csv | 8 0,wrong syntax in recipient name: trailing double '/' after value, -section,, -recipient,_CA_DN//,B… 9 0,wrong syntax in recipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,t… 10 0,wrong syntax in recipient name: C too long, -section,, -recipient,/CN=ECC Issuing CA v10/OU=For t… 14 0,wrong expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=Sample Cert/OU=R&D/O=Comp… 31 0,wrong srvcert and -trusted ignored, -section,, -recipient,"""",BLANK,, -srvcert,signer.crt,-trust… 38 0,wrong trusted cert, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,signer.crt,BLANK,,BLANK,…
|
H A D | test_commands.csv | 52 0,wrong issuer for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,-1,BLANK,,, -… 54 0,wrong serial for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,-1,BLANK,,, -… 95 0,genm crlStatusList with wrong issuer, -section,, -cmd,genm,, BLANK,,, -infotype,crlStatusList,, -… 97 0,genm crlStatusList with wrong cert and correct crl, -section,, -cmd,genm,, BLANK,,, -infotype,crl… 108 0,profile wrong value, -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keypass,pass:12345,… 131 0,reqin wrong req, -section,, -cmd,ir,,-reqin,_RESULT_DIR/cr.der _RESULT_DIR/certConf.der,,BLANK,,,…
|
H A D | test_enrollment.csv | 22 0,wrong password for encrypted pem, -section,, -cmd,ir, -newkey,cmp --help ,, -newkeypass,pass:wron… 86 0,out_trusted wrong ca, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLA… 104 TODO,p10cr wrong csr, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BL… 119 0,kur wrong oldcert, -section,, -cmd,kur, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK…
|
/openssl/test/ |
H A D | cmp_vfy_test.c | 156 static int test_validate_msg_mac_alg_protection(int miss, int wrong) in test_validate_msg_mac_alg_protection() argument 161 fixture->expected = !miss && !wrong; in test_validate_msg_mac_alg_protection() 164 wrong ? 4 : sizeof(sec_1))) in test_validate_msg_mac_alg_protection() 259 static int test_validate_msg_signature_srvcert(int bad_sig, int miss, int wrong) in test_validate_msg_signature_srvcert() argument 263 fixture->expected = !bad_sig && !wrong && !miss; in test_validate_msg_signature_srvcert() 268 wrong? clcert : srvcert)) in test_validate_msg_signature_srvcert() 400 static void setup_path(CMP_VFY_TEST_FIXTURE **fixture, X509 *wrong, int expired) in setup_path() argument 403 (*fixture)->expected = wrong == NULL && !expired; in setup_path() 410 if (!add_trusted((*fixture)->cmp_ctx, wrong == NULL ? root : wrong) in setup_path()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 21 ASN1_R_DATA_IS_WRONG:109:data is wrong 79 ASN1_R_MSTRING_WRONG_TAG:140:mstring wrong tag 124 ASN1_R_WRONG_INTEGER_TYPE:225:wrong integer type 126 ASN1_R_WRONG_TAG:168:wrong tag 301 CMP_R_WRONG_CERTID:189:wrong certid 303 CMP_R_WRONG_PBM_VALUE:155:wrong pbm value 343 messagedigest attribute wrong length 663 EC_R_WRONG_ORDER:130:wrong order 1686 SSL_R_WRONG_CURVE:378:wrong curve 1687 SSL_R_WRONG_RPK_TYPE:351:wrong rpk type [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 110 # MD5/SHA-1 combination, wrong signature digest length 122 # MD5/SHA-1 combination, wrong input digest length 129 # MD5/SHA-1 combination, wrong input and signature digest length 177 # Legacy OCTET STRING MDC-2 signature, wrong input digest length 185 # Legacy OCTET STRING MDC-2 signature, wrong signature digest length 200 # Legacy OCTET STRING MDC-2 signature, wrong input and signature digest length
|
H A D | evppkey_rsa_common.txt | 485 # an otherwise correct plaintext, but with wrong first byte 493 # an otherwise correct plaintext, but with wrong second byte 655 # otherwise correct plaintext, but with wrong first byte (0x01 instead of 0x00) 662 # otherwise correct plaintext, but with wrong second byte (0x01 instead of 0x02) 796 # an otherwise valid plaintext, but with wrong first byte (0x01 instead of 0x00) 803 # an otherwise valid plaintext, but with wrong second byte (0x01 instead of 0x02)
|
/openssl/doc/man3/ |
H A D | i2d_CMS_bio_stream.pod | 26 The prefix "i2d" is arguably wrong because the function outputs BER format.
|
H A D | i2d_PKCS7_bio_stream.pod | 26 The prefix "i2d" is arguably wrong because the function outputs BER format.
|
H A D | ERR_GET_LIB.pod | 27 occurred, the reason code is the information about what went wrong.
|
H A D | PKCS12_newpass.pod | 34 If the wrong password is used for B<oldpass> then the function will fail,
|
H A D | X509_dup.pod | 440 on X.509v3 extensions, etc., and losing it can lead to wrong validation results.
|
H A D | OSSL_STORE_LOADER.pod | 179 If something goes wrong, this function is expected to return NULL.
|
/openssl/VMS/ |
H A D | openssl_ivp.com.in | 37 $ ! If something else is wrong with the installation, we're likely
|
/openssl/test/ssl-tests/ |
H A D | 18-dtls-renegotiate.cnf.in | 70 # handshake support was first added. Neither behaviour is wrong, but the
|
/openssl/include/openssl/ |
H A D | cmp.h.in | 59 * -- the data submitted has the wrong format 78 * -- invalid recipient nonce, either missing or wrong value 89 * -- invalid sender nonce, either missing or wrong size
|
/openssl/ |
H A D | NOTES-ANDROID.md | 27 (`./Configure` will fail and give you a hint if you get it wrong.)
|
H A D | NOTES-WINDOWS.md | 96 For the full installation instructions, or if anything goes wrong at any stage,
|
/openssl/doc/man1/ |
H A D | CA.pl.pod | 49 be wrong. In this case the command:
|
H A D | openssl-x509.pod.in | 792 T61Strings use the ISO8859-1 character set. This is wrong but Netscape 803 wrong private key, using unsuitable X.509 extensions,
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 25 Using the wrong encoding is expected to cause a decryption failure.
|
/openssl/doc/designs/quic-design/ |
H A D | quic-tls.md | 104 * Called when something has gone wrong with the connection as far as the
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | Changes | 259 - Fixed some small bugs. Worked around a bug in Perl that does the wrong
|