Home
last modified time | relevance | path

Searched refs:success (Results 1 – 25 of 411) sorted by relevance

12345678910>>...17

/openssl/test/helpers/
H A Dpkcs12.c110 pb->success = 1; in new_pkcs12_builder()
131 if (!pb->success) in end_pkcs12()
139 if (!pb->success) in end_pkcs12_with_mac()
151 if (!pb->success) in generate_p12()
382 if (!pb->success) in add_certbag()
415 if (!pb->success) in add_keybag()
446 if (!pb->success) in add_secretbag()
549 if (!pb->success) in check_certbag()
585 if (!pb->success) in check_keybag()
643 if (!pb->success) in check_secretbag()
[all …]
/openssl/test/ssl-tests/
H A D03-custom_verify.cnf5 test-0 = 0-verify-success
9 test-4 = 4-noverify-success
17 [0-verify-success]
18 ssl_conf = 0-verify-success-ssl
20 [0-verify-success-ssl]
24 [0-verify-success-server]
29 [0-verify-success-client]
122 [4-noverify-success]
125 [4-noverify-success-ssl]
129 [4-noverify-success-server]
[all …]
H A D03-custom_verify.cnf.in19 name => "verify-success",
71 name => "noverify-success",
81 # The callback return has no impact on handshake success in this mode.
98 # The callback return has no impact on handshake success in this mode.
131 name => "verify-custom-success-no-root",
/openssl/fuzz/
H A Dbndiv.c48 int success = 0; in FuzzerTestOneInput() local
79 success = 1; in FuzzerTestOneInput()
85 success = BN_is_zero(b3) && BN_is_zero(b4); in FuzzerTestOneInput()
87 success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput()
90 success = (BN_is_negative(b3) == BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput()
95 success = success && BN_cmp(b5, b1) == 0; in FuzzerTestOneInput()
96 if (!success) { in FuzzerTestOneInput()
117 OPENSSL_assert(success); in FuzzerTestOneInput()
H A Dbignum.c32 int success = 0; in FuzzerTestOneInput() local
73 success = 1; in FuzzerTestOneInput()
80 success = BN_cmp(b4, b5) == 0; in FuzzerTestOneInput()
81 if (!success) { in FuzzerTestOneInput()
95 OPENSSL_assert(success); in FuzzerTestOneInput()
/openssl/test/
H A Dthreadstest_fips.c17 static int success; variable
24 success = 0; in thread_fips_rand_fetch()
32 success = 1; in test_fips_rand_leak()
38 return TEST_true(success); in test_fips_rand_leak()
H A Dasn1_encode_test.c187 ASN1_BOOLEAN success; member
277 ASN1_BOOLEAN success; member
325 ASN1_BOOLEAN success; member
373 ASN1_BOOLEAN success; member
422 ASN1_BOOLEAN success; member
473 ASN1_BOOLEAN success; member
495 if (expected->success == 0) { in do_decode()
534 if (input->success == 0) { in do_encode()
750 if (expected->success) { in test_intern()
773 if (expected->success) { in test_intern()
[all …]
H A Dbio_tfo_test.c121 goto success; in test_bio_tfo()
152 goto success; in test_bio_tfo()
183 success: in test_bio_tfo()
318 goto success; in test_fd_tfo()
353 goto success; in test_fd_tfo()
392 success: in test_fd_tfo()
H A Ddrbgtest.c404 int success = 1; in test_rand_reseed_on_fork() local
472 success = 0; in test_rand_reseed_on_fork()
478 success = 0; in test_rand_reseed_on_fork()
495 success = 0; in test_rand_reseed_on_fork()
498 if (verbose || !success) { in test_rand_reseed_on_fork()
514 return success; in test_rand_reseed_on_fork()
519 int success = 1; in test_rand_fork_safety() local
531 success = 0; in test_rand_fork_safety()
535 success = 0; in test_rand_fork_safety()
537 return success; in test_rand_fork_safety()
H A Ddtlsv1listentest.c299 int ret, success = 0; in dtls_listen_test() local
339 success = 1; in dtls_listen_test()
347 return success; in dtls_listen_test()
H A Dct_test.c226 int success = 0; in execute_cert_test() local
321 success = 1; in execute_cert_test()
330 return success; in execute_cert_test()
474 int success = 0; in test_default_ct_policy_eval_ctx_time_is_now() local
484 success = 1; in test_default_ct_policy_eval_ctx_time_is_now()
487 return success; in test_default_ct_policy_eval_ctx_time_is_now()
/openssl/test/recipes/
H A D70-test_key_share.t87 ok(TLSProxy::Message->success(), "Success after HRR");
111 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
138 ok(TLSProxy::Message->success(), "Non preferred key_share");
149 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
195 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE3072),
198 ok(TLSProxy::Message->success() && ($selectedgroupid == P_256),
211 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE2048),
214 ok(TLSProxy::Message->success() && ($selectedgroupid == X25519),
263 ok(TLSProxy::Message->success()
275 ok(TLSProxy::Message->success(), "Ignore key_share for TLS<=1.2 server");
H A D70-test_sslsigalgs.t59 ok(TLSProxy::Message->success, "Default sigalgs");
99 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3");
134 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server");
149 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0");
194 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs");
202 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2");
236 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
277 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3");
284 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert");
307 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello");
[all …]
H A D70-test_sslversions.t75 ok(TLSProxy::Message->success()
91 ok(TLSProxy::Message->success()
104 ok(TLSProxy::Message->success()
113 ok(TLSProxy::Message->success()
H A D70-test_sslextension.t212 ok(TLSProxy::Message->success, "Zero extension length test");
230 ok(TLSProxy::Message->success(), "Cryptopro extension in ClientHello");
242 ok(TLSProxy::Message->success(), "Noncompliant supported_groups extension");
/openssl/apps/lib/
H A Ds_socket.c246 int success = 1; in report_server_accept() local
254 success = hostname != NULL && service != NULL; in report_server_accept()
255 if (success) in report_server_accept()
256 success = BIO_printf(out, in report_server_accept()
267 success *= BIO_printf(out, " PID=%d", getpid()) > 0; in report_server_accept()
268 success *= BIO_printf(out, "\n") > 0; in report_server_accept()
271 return success; in report_server_accept()
/openssl/util/perl/TLSProxy/
H A DMessage.pm142 my $success = 0;
156 $success = 0;
275 $success = 1;
285 $success = 1;
402 sub success subroutine
405 return $success;
410 return !$success && $end;
/openssl/include/openssl/
H A Dct.h.in104 * Returns 1 on success, 0 otherwise.
114 * Returns 1 on success, 0 otherwise.
190 * Returns 1 on success, 0 otherwise.
204 * Returns 1 on success, 0 otherwise.
211 * Returns 1 on success, 0 otherwise.
237 * Returns 1 on success, 0 otherwise.
257 * Returns 1 on success, 0 otherwise.
277 * Returns 1 on success, 0 otherwise.
289 * Returns 1 on success, 0 otherwise.
356 * on success.
[all …]
/openssl/doc/man3/
H A DBIO_ctrl.pod98 BIO_reset() normally returns 1 for success and <=0 for failure. File
99 BIOs are an exception, they return 0 for success and -1 for failure.
101 BIO_seek() and BIO_tell() both return the current file position on success
103 for success and -1 for failure.
105 BIO_flush() returns 1 for success and <=0 for failure.
109 BIO_set_close() returns 1 on success or <=0 for failure.
122 BIO_set_conn_mode() returns 1 for success and 0 for failure. BIO_get_conn_mode()
133 BIO_set_tfo() returns 1 for success, and 0 for failure.
H A DX509_STORE_set_verify_cb_func.pod137 on success.
144 On success it assigns to I<*issuer> the first match that has a suitable validity
160 been issued with I<issuer>) and 1 on success.
168 It must return 0 on failure and 1 on success.
175 This function must return 0 on failure and 1 on success.
181 This function must return 0 on failure and 1 on success.
187 This function must return 0 on failure and 1 on success.
193 This function must return 0 on failure and 1 on success.
202 success.
H A DSSL_CTX_set_client_hello_cb.pod40 success, normal handshake processing will continue from that point.
66 both required, and on success the caller must release the storage allocated for
71 success with B<*out> set to NULL and B<*outlen> set to 0.
83 A ClientHello that contained no extensions is treated as success, with B<*num_exts>
110 SSL_CLIENT_HELLO_SUCCESS on success, SSL_CLIENT_HELLO_ERROR on failure, and
124 SSL_client_hello_get1_extensions_present() returns 1 on success and 0 on failure.
126 SSL_client_hello_get_extension_order() returns 1 on success and 0 on failure.
H A DEVP_PKEY_ASN1_METHOD.pod167 They MUST return 0 on error, 1 on success.
177 It MUST return 0 on error, 1 on success.
187 They MUST return 0 on error, 1 on success.
192 It MUST return 0 on error, 1 on success.
216 They MUST return 0 on error, 1 on success.
225 It MUST return 0 on error, 1 on success.
235 It MUST return 0 on error, 1 on success.
247 It MUST return 0 on error, 1 on success.
272 old_priv_decode() MUST return 0 on error, 1 on success.
340 It MUST return 0 on error, or 1 on success.
[all …]
/openssl/doc/internal/man3/
H A Dossl_cmp_msg_create.pod90 Returns 1 on success, 0 on error.
97 Returns pointer to created B<OSSL_CMP_MSG> on success, NULL on error.
101 Returns 1 on success, 0 on error.
106 Returns 1 on success, 0 on error.
H A Dossl_punycode_decode.pod36 ossl_a2ulabel() returns 1 on success, 0 on not enough buf passed,
43 ossl_punycode_decode() returns 1 on success, 0 on error. On success,
/openssl/.github/workflows/
H A Dfips-label.yml27 if: ${{ github.event.workflow_run.conclusion == 'success' }}
48 if: ${{ github.event.workflow_run.conclusion == 'success' }}
50 if: ${{ github.event.workflow_run.conclusion == 'success' }}

Completed in 69 milliseconds

12345678910>>...17