/openssl/test/recipes/ |
H A D | 15-test_gendhparam.t | 27 expect => [ 'ERROR' ], 46 expect => [ "BEGIN X9.42 DH PARAMETERS" ], 52 expect => [ "ERROR" ], 57 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 63 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 69 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 76 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:'], 81 expect => [ 'BEGIN X9.42 DH PARAMETERS', 'GROUP:' ], 105 expect => [ 'ERROR' ], 124 expect => [ 'ERROR' ], [all …]
|
H A D | 20-test_mac.t | 140 my ($cmdarray_orig, $type, $input, $expect, $err) = @_; 142 if (defined($expect)) { 143 $expect = uc $expect; 159 if (defined($expect)) { 160 if ($lines[0] =~ m|^\Q${expect}\E\R$|) { 164 print "Exp: $expect\n"; 192 my ($cmdarray, $type, $input, $expect) = @_; 193 $expect = uc $expect; 217 if ($line eq $expect) { 221 print "Exp: $expect\n";
|
H A D | 20-test_kdf.t | 95 my ($cmdarray, $expect) = @_; 96 if (defined($expect)) { 97 $expect = uc $expect; 102 if (defined($expect)) { 103 if ($lines[0] =~ m|^\Q${expect}\E\R$|) { 107 print "Exp: $expect\n";
|
H A D | 25-test_req.t | 398 my $expect = shift @_; 399 cert_contains($cert, "Subject Key Identifier", $expect); 403 my $expect = shift @_; 404 cert_contains($cert, "Authority Key Identifier", $expect); 408 my $expect = shift @_; 409 cert_contains($cert, "Key Usage", $expect); 413 my $expect = shift @_; 417 "-partial_chain", $cert])) == $expect,
|
/openssl/test/ |
H A D | destest.c | 715 int clen, clen_upd, clen_fin, plen, plen_upd, plen_fin, expect, bs, i; in test_des_key_wrap() local 745 expect = (in_bytes + (bs - 1)) / bs * bs + 2 * bs; in test_des_key_wrap() 746 if (!TEST_int_eq(clen_upd, expect)) in test_des_key_wrap() 785 int expect; member 813 return TEST_int_eq(DES_is_weak_key(key), weak_keys[n].expect); in test_des_weak_keys() 818 int expect; member 839 return TEST_int_eq(DES_check_key_parity(key), bad_parity_keys[n].expect); in test_des_check_bad_parity()
|
H A D | quic_ackm_test.c | 490 const char *expect; /* 1=ack, 2=lost, 4=discarded */ member 497 #define TX_OP_EXPECT(expect) \ argument 498 { TX_ACK_TIME_OP_EXPECT, 0, 0, 0, (expect) }, 591 (s->expect[i] & 1) != 0 ? 1 : 0)) in test_tx_ack_time_script() 594 (s->expect[i] & 2) != 0 ? 1 : 0)) in test_tx_ack_time_script() 597 (s->expect[i] & 4) != 0 ? 1 : 0)) in test_tx_ack_time_script()
|
/openssl/test/recipes/90-test_includes_data/ |
H A D | incdir.cnf | 2 # Set includedir and expect to fail
|
/openssl/doc/man3/ |
H A D | PKCS12_key_gen_utf8_ex.pod | 67 PKCS12_key_gen_asc() and PKCS12_key_gen_asc_ex() expect an ASCII-formatted password. 71 PKCS12_key_gen_uni() and PKCS12_key_gen_uni_ex() expect a Unicode-formatted password. 75 PKCS12_key_gen_utf8() and PKCS12_key_gen_utf8_ex() expect a UTF-8 encoded password.
|
H A D | SSL_in_init.pod | 51 may define more states so applications should expect to receive unrecognised
|
H A D | SSL_CTX_sess_set_get_cb.pod | 72 at all). This means that applications should expect the new_session_cb()
|
H A D | PKCS7_sign.pod | 34 Many S/MIME clients expect the signed content to include valid MIME headers. If
|
H A D | CMS_sign.pod | 40 Many S/MIME clients expect the signed content to include valid MIME headers. If
|
H A D | ASYNC_WAIT_CTX_new.pod | 169 should not expect to receive a callback from the engine even if one has been
|
/openssl/crypto/store/ |
H A D | store_local.h | 90 OSSL_STORE_expect_fn expect; member
|
H A D | store_register.c | 98 loader->expect = expect_function; in OSSL_STORE_LOADER_set_expect()
|
H A D | store_lib.c | 306 && ctx->loader->expect != NULL) { in OSSL_STORE_expect() 307 ret = ctx->loader->expect(ctx->loader_ctx, expected_type); in OSSL_STORE_expect()
|
/openssl/test/ssl-tests/ |
H A D | 05-sni.cnf.in | 74 # We expect that the callback is still called
|
/openssl/crypto/chacha/asm/ |
H A D | chacha-armv8-sve.pl | 709 my $expect=&compile_sve($inst); 710 if ($expect ne $hexcode) { 711 return (sprintf "%s // Encode Error! expect [%s] actual [%s]", $inst, $expect, $hexcode);
|
/openssl/doc/man7/ |
H A D | provider-storemgmt.pod | 89 kind of data to expect, search criteria, and so on. More on those below, in 121 =item "expect" (B<OSSL_STORE_PARAM_EXPECT>) <integer>
|
H A D | provider-digest.pod | 259 expect the digest size to be larger than EVP_MAX_MD_SIZE. Any algorithm which
|
/openssl/ |
H A D | SUPPORT.md | 33 Please keep in mind: Just because something doesn't work the way you expect
|
H A D | CONTRIBUTING.md | 52 3. Patches should be as current as possible; expect to have to rebase
|
H A D | README-PROVIDERS.md | 18 providers distributed with OpenSSL. In the future we expect third parties to
|
/openssl/apps/lib/ |
H A D | apps.c | 844 (expect = expect < 0 ? (val) : (expect == (val) ? (val) : 0)) 878 int ncerts = 0, ncrls = 0, expect = -1; in load_key_certs_crls() local 945 if (expect > 0 && !OSSL_STORE_expect(ctx, expect)) in load_key_certs_crls()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-requirements.md | 51 functional QUIC release (this does not imply we expect API breakage to occur as
|