/openssl/test/helpers/ |
H A D | pkcs12.c | 110 pb->success = 1; in new_pkcs12_builder() 131 if (!pb->success) in end_pkcs12() 139 if (!pb->success) in end_pkcs12_with_mac() 151 if (!pb->success) in generate_p12() 382 if (!pb->success) in add_certbag() 415 if (!pb->success) in add_keybag() 446 if (!pb->success) in add_secretbag() 549 if (!pb->success) in check_certbag() 585 if (!pb->success) in check_keybag() 643 if (!pb->success) in check_secretbag() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 9 test-4 = 4-noverify-success 17 [0-verify-success] 18 ssl_conf = 0-verify-success-ssl 20 [0-verify-success-ssl] 24 [0-verify-success-server] 29 [0-verify-success-client] 122 [4-noverify-success] 125 [4-noverify-success-ssl] 129 [4-noverify-success-server] [all …]
|
H A D | 03-custom_verify.cnf.in | 19 name => "verify-success", 71 name => "noverify-success", 81 # The callback return has no impact on handshake success in this mode. 98 # The callback return has no impact on handshake success in this mode. 131 name => "verify-custom-success-no-root",
|
/openssl/fuzz/ |
H A D | bndiv.c | 48 int success = 0; in FuzzerTestOneInput() local 79 success = 1; in FuzzerTestOneInput() 85 success = BN_is_zero(b3) && BN_is_zero(b4); in FuzzerTestOneInput() 87 success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput() 90 success = (BN_is_negative(b3) == BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput() 95 success = success && BN_cmp(b5, b1) == 0; in FuzzerTestOneInput() 96 if (!success) { in FuzzerTestOneInput() 117 OPENSSL_assert(success); in FuzzerTestOneInput()
|
H A D | bignum.c | 32 int success = 0; in FuzzerTestOneInput() local 73 success = 1; in FuzzerTestOneInput() 80 success = BN_cmp(b4, b5) == 0; in FuzzerTestOneInput() 81 if (!success) { in FuzzerTestOneInput() 95 OPENSSL_assert(success); in FuzzerTestOneInput()
|
/openssl/test/ |
H A D | threadstest_fips.c | 17 static int success; variable 24 success = 0; in thread_fips_rand_fetch() 32 success = 1; in test_fips_rand_leak() 38 return TEST_true(success); in test_fips_rand_leak()
|
H A D | asn1_encode_test.c | 187 ASN1_BOOLEAN success; member 277 ASN1_BOOLEAN success; member 325 ASN1_BOOLEAN success; member 373 ASN1_BOOLEAN success; member 422 ASN1_BOOLEAN success; member 473 ASN1_BOOLEAN success; member 495 if (expected->success == 0) { in do_decode() 534 if (input->success == 0) { in do_encode() 750 if (expected->success) { in test_intern() 773 if (expected->success) { in test_intern() [all …]
|
H A D | bio_tfo_test.c | 121 goto success; in test_bio_tfo() 152 goto success; in test_bio_tfo() 183 success: in test_bio_tfo() 318 goto success; in test_fd_tfo() 353 goto success; in test_fd_tfo() 392 success: in test_fd_tfo()
|
H A D | drbgtest.c | 404 int success = 1; in test_rand_reseed_on_fork() local 472 success = 0; in test_rand_reseed_on_fork() 478 success = 0; in test_rand_reseed_on_fork() 495 success = 0; in test_rand_reseed_on_fork() 498 if (verbose || !success) { in test_rand_reseed_on_fork() 514 return success; in test_rand_reseed_on_fork() 519 int success = 1; in test_rand_fork_safety() local 531 success = 0; in test_rand_fork_safety() 535 success = 0; in test_rand_fork_safety() 537 return success; in test_rand_fork_safety()
|
H A D | dtlsv1listentest.c | 299 int ret, success = 0; in dtls_listen_test() local 339 success = 1; in dtls_listen_test() 347 return success; in dtls_listen_test()
|
H A D | ct_test.c | 226 int success = 0; in execute_cert_test() local 321 success = 1; in execute_cert_test() 330 return success; in execute_cert_test() 474 int success = 0; in test_default_ct_policy_eval_ctx_time_is_now() local 484 success = 1; in test_default_ct_policy_eval_ctx_time_is_now() 487 return success; in test_default_ct_policy_eval_ctx_time_is_now()
|
/openssl/test/recipes/ |
H A D | 70-test_key_share.t | 87 ok(TLSProxy::Message->success(), "Success after HRR"); 111 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 138 ok(TLSProxy::Message->success(), "Non preferred key_share"); 149 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 195 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE3072), 198 ok(TLSProxy::Message->success() && ($selectedgroupid == P_256), 211 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE2048), 214 ok(TLSProxy::Message->success() && ($selectedgroupid == X25519), 263 ok(TLSProxy::Message->success() 275 ok(TLSProxy::Message->success(), "Ignore key_share for TLS<=1.2 server");
|
H A D | 70-test_sslsigalgs.t | 59 ok(TLSProxy::Message->success, "Default sigalgs"); 99 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 134 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server"); 149 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0"); 194 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs"); 202 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2"); 236 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA"); 277 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3"); 284 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert"); 307 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello"); [all …]
|
H A D | 70-test_sslversions.t | 75 ok(TLSProxy::Message->success() 91 ok(TLSProxy::Message->success() 104 ok(TLSProxy::Message->success() 113 ok(TLSProxy::Message->success()
|
H A D | 70-test_sslextension.t | 212 ok(TLSProxy::Message->success, "Zero extension length test"); 230 ok(TLSProxy::Message->success(), "Cryptopro extension in ClientHello"); 242 ok(TLSProxy::Message->success(), "Noncompliant supported_groups extension");
|
/openssl/apps/lib/ |
H A D | s_socket.c | 246 int success = 1; in report_server_accept() local 254 success = hostname != NULL && service != NULL; in report_server_accept() 255 if (success) in report_server_accept() 256 success = BIO_printf(out, in report_server_accept() 267 success *= BIO_printf(out, " PID=%d", getpid()) > 0; in report_server_accept() 268 success *= BIO_printf(out, "\n") > 0; in report_server_accept() 271 return success; in report_server_accept()
|
/openssl/util/perl/TLSProxy/ |
H A D | Message.pm | 142 my $success = 0; 156 $success = 0; 275 $success = 1; 285 $success = 1; 402 sub success subroutine 405 return $success; 410 return !$success && $end;
|
/openssl/include/openssl/ |
H A D | ct.h.in | 104 * Returns 1 on success, 0 otherwise. 114 * Returns 1 on success, 0 otherwise. 190 * Returns 1 on success, 0 otherwise. 204 * Returns 1 on success, 0 otherwise. 211 * Returns 1 on success, 0 otherwise. 237 * Returns 1 on success, 0 otherwise. 257 * Returns 1 on success, 0 otherwise. 277 * Returns 1 on success, 0 otherwise. 289 * Returns 1 on success, 0 otherwise. 356 * on success. [all …]
|
/openssl/doc/man3/ |
H A D | BIO_ctrl.pod | 98 BIO_reset() normally returns 1 for success and <=0 for failure. File 99 BIOs are an exception, they return 0 for success and -1 for failure. 101 BIO_seek() and BIO_tell() both return the current file position on success 103 for success and -1 for failure. 105 BIO_flush() returns 1 for success and <=0 for failure. 109 BIO_set_close() returns 1 on success or <=0 for failure. 122 BIO_set_conn_mode() returns 1 for success and 0 for failure. BIO_get_conn_mode() 133 BIO_set_tfo() returns 1 for success, and 0 for failure.
|
H A D | X509_STORE_set_verify_cb_func.pod | 137 on success. 144 On success it assigns to I<*issuer> the first match that has a suitable validity 160 been issued with I<issuer>) and 1 on success. 168 It must return 0 on failure and 1 on success. 175 This function must return 0 on failure and 1 on success. 181 This function must return 0 on failure and 1 on success. 187 This function must return 0 on failure and 1 on success. 193 This function must return 0 on failure and 1 on success. 202 success.
|
H A D | SSL_CTX_set_client_hello_cb.pod | 40 success, normal handshake processing will continue from that point. 66 both required, and on success the caller must release the storage allocated for 71 success with B<*out> set to NULL and B<*outlen> set to 0. 83 A ClientHello that contained no extensions is treated as success, with B<*num_exts> 110 SSL_CLIENT_HELLO_SUCCESS on success, SSL_CLIENT_HELLO_ERROR on failure, and 124 SSL_client_hello_get1_extensions_present() returns 1 on success and 0 on failure. 126 SSL_client_hello_get_extension_order() returns 1 on success and 0 on failure.
|
H A D | EVP_PKEY_ASN1_METHOD.pod | 167 They MUST return 0 on error, 1 on success. 177 It MUST return 0 on error, 1 on success. 187 They MUST return 0 on error, 1 on success. 192 It MUST return 0 on error, 1 on success. 216 They MUST return 0 on error, 1 on success. 225 It MUST return 0 on error, 1 on success. 235 It MUST return 0 on error, 1 on success. 247 It MUST return 0 on error, 1 on success. 272 old_priv_decode() MUST return 0 on error, 1 on success. 340 It MUST return 0 on error, or 1 on success. [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_msg_create.pod | 90 Returns 1 on success, 0 on error. 97 Returns pointer to created B<OSSL_CMP_MSG> on success, NULL on error. 101 Returns 1 on success, 0 on error. 106 Returns 1 on success, 0 on error.
|
H A D | ossl_punycode_decode.pod | 36 ossl_a2ulabel() returns 1 on success, 0 on not enough buf passed, 43 ossl_punycode_decode() returns 1 on success, 0 on error. On success,
|
/openssl/.github/workflows/ |
H A D | fips-label.yml | 27 if: ${{ github.event.workflow_run.conclusion == 'success' }} 48 if: ${{ github.event.workflow_run.conclusion == 'success' }} 50 if: ${{ github.event.workflow_run.conclusion == 'success' }}
|