Home
last modified time | relevance | path

Searched refs:bad (Results 1 – 25 of 34) sorted by relevance

12

/openssl/test/ssl-tests/
H A D05-sni.cnf9 test-4 = 4-SNI-bad-sni-ignore-mismatch
10 test-5 = 5-SNI-bad-sni-reject-mismatch
11 test-6 = 6-SNI-bad-clienthello-sni-ignore-mismatch
141 [4-SNI-bad-sni-ignore-mismatch]
144 [4-SNI-bad-sni-ignore-mismatch-ssl]
149 [4-SNI-bad-sni-ignore-mismatch-server]
154 [4-SNI-bad-sni-ignore-mismatch-client]
175 [5-SNI-bad-sni-reject-mismatch]
178 [5-SNI-bad-sni-reject-mismatch-ssl]
183 [5-SNI-bad-sni-reject-mismatch-server]
[all …]
H A D23-srp.cnf6 test-1 = 1-srp-bad-password
8 test-3 = 3-srp-auth-bad-password
46 [1-srp-bad-password]
47 ssl_conf = 1-srp-bad-password-ssl
49 [1-srp-bad-password-ssl]
50 server = 1-srp-bad-password-server
51 client = 1-srp-bad-password-client
53 [1-srp-bad-password-server]
59 [1-srp-bad-password-client]
116 [3-srp-auth-bad-password]
[all …]
H A D15-certstatus.cnf6 test-1 = 1-certstatus-bad
37 [1-certstatus-bad]
38 ssl_conf = 1-certstatus-bad-ssl
40 [1-certstatus-bad-ssl]
41 server = 1-certstatus-bad-server
42 client = 1-certstatus-bad-client
44 [1-certstatus-bad-server]
49 [1-certstatus-bad-client]
57 server = 1-certstatus-bad-server-extra
59 [1-certstatus-bad-server-extra]
H A D16-dtls-certstatus.cnf6 test-1 = 1-certstatus-bad
37 [1-certstatus-bad]
38 ssl_conf = 1-certstatus-bad-ssl
40 [1-certstatus-bad-ssl]
41 server = 1-certstatus-bad-server
42 client = 1-certstatus-bad-client
44 [1-certstatus-bad-server]
49 [1-certstatus-bad-client]
57 server = 1-certstatus-bad-server-extra
59 [1-certstatus-bad-server-extra]
H A D23-srp.cnf.in40 name => "srp-bad-password",
58 # Server fails first with bad client Finished.
85 name => "srp-auth-bad-password",
103 # Server fails first with bad client Finished.
H A D05-sni.cnf.in82 name => "SNI-bad-sni-ignore-mismatch",
99 name => "SNI-bad-sni-reject-mismatch",
116 name => "SNI-bad-clienthello-sni-ignore-mismatch",
133 name => "SNI-bad-clienthello-sni-reject-mismatch",
H A D16-dtls-certstatus.cnf.in40 name => "certstatus-bad",
76 name => "certstatus-bad",
H A D04-client_auth.cnf10 test-5 = 5-client-auth-flex-rsa-pss-bad
30 test-25 = 25-client-auth-TLSv1.2-rsa-pss-bad
180 [5-client-auth-flex-rsa-pss-bad]
181 ssl_conf = 5-client-auth-flex-rsa-pss-bad-ssl
183 [5-client-auth-flex-rsa-pss-bad-ssl]
187 [5-client-auth-flex-rsa-pss-bad-server]
195 [5-client-auth-flex-rsa-pss-bad-client]
789 [25-client-auth-TLSv1.2-rsa-pss-bad]
792 [25-client-auth-TLSv1.2-rsa-pss-bad-ssl]
796 [25-client-auth-TLSv1.2-rsa-pss-bad-server]
[all …]
H A D15-certstatus.cnf.in33 name => "certstatus-bad",
H A D04-client_auth.cnf.in186 # Failed handshake with client RSA-PSS cert, StrictCertCheck, bad CA
188 name => "client-auth-${protocol_name}-rsa-pss-bad"
/openssl/util/
H A Dck_errf.pl97 my $bad = 0;
115 $bad = 1;
120 $bad = 1;
133 $bad = 1;
140 $bad = 1;
150 if ( $bad && $err_strict ) {
/openssl/test/recipes/
H A D15-test_genrsa.t44 my $bad = 3; # Log2 of number of bits (2 << 3 == 8)
47 while ($good > $bad + 1) {
48 my $checked = int(($good + $bad + 1) / 2);
59 $bad = $checked;
62 $good++ if $good == $bad;
/openssl/crypto/err/
H A Dopenssl.txt14 ASN1_R_BAD_TEMPLATE:230:bad template
557 DSA_R_BAD_Q_VALUE:102:bad q value
712 EVP_R_BAD_DECRYPT:100:bad decrypt
1036 PROV_R_BAD_LENGTH:142:bad length
1330 SSL_R_BAD_CIPHER:186:bad cipher
1332 SSL_R_BAD_DATA:390:bad data
1348 SSL_R_BAD_LENGTH:271:bad length
1349 SSL_R_BAD_PACKET:240:bad packet
1352 SSL_R_BAD_PSK:219:bad psk
1362 SSL_R_BAD_VALUE:384:bad value
[all …]
/openssl/crypto/asn1/
H A Dasn1_gen.c413 goto bad; in asn1_multi()
416 goto bad; in asn1_multi()
419 goto bad; in asn1_multi()
425 goto bad; in asn1_multi()
427 goto bad; in asn1_multi()
441 goto bad; in asn1_multi()
443 goto bad; in asn1_multi()
445 goto bad; in asn1_multi()
453 bad: in asn1_multi()
/openssl/test/
H A Dssl_old_test.c1022 goto bad; in main()
1027 goto bad; in main()
1049 goto bad; in main()
1055 goto bad; in main()
1066 goto bad; in main()
1070 goto bad; in main()
1074 goto bad; in main()
1078 goto bad; in main()
1126 goto bad; in main()
1132 goto bad; in main()
[all …]
H A Devp_pkey_dparams_test.c31 int bad; member
290 if (keys[i].bad) { in set_enc_pubkey_test()
/openssl/test/certs/
H A Dsetup.sh243 ./mkcert.sh req bad-pc3-key "0.CN = server.example" "1.CN = proxy 3" | \
244 ./mkcert.sh genpc bad-pc3-key bad-pc3-cert pc1-key pc1-cert \
247 ./mkcert.sh req bad-pc4-key "0.CN = server.example" "1.CN = proxy 1" "2.CN = proxy 4" | \
248 ./mkcert.sh genpc bad-pc4-key bad-pc4-cert pc1-key pc1-cert \
255 ./mkcert.sh req bad-pc6-key "0.CN = server.example" "1.CN = proxy 1" "2.+CN = proxy 6" | \
256 ./mkcert.sh genpc bad-pc6-key bad-pc6-cert pc1-key pc1-cert \
421 ./mkcert.sh geneealt bad-othername-key bad-othername-cert \
477 ./mkcert.sh geneeextra server.example ee-key ee-cert-policies-bad ca-key ca-cert "certificatePolici…
/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_connection.csv14 0,server port bad syntax: leading garbage, -section,, -server,_SERVER_HOST:x/+80,,,,,BLANK,,,,BLANK…
15 0,server port bad syntax: trailing garbage, -section,, -server,_SERVER_HOST:_SERVER_PORT+/x.,,,,,BL…
19 0,proxy port bad syntax: leading garbage, -section,, -server,_SERVER_HOST:_SERVER_PORT, -proxy,127.…
H A Dtest_commands.csv53 0,bad issuer DN for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,-1,BLANK,,, …
55 0,bad serial for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,-1,BLANK,,, -ex…
117 0,geninfo bad OID num: leading '.', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
120 0,geninfo bad OID name: trailing '_', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
121 0,geninfo bad syntax: missing ':int', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
122 0,geninfo bad type tag, -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
123 0,geninfo bad syntax: missing ':', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
124 0,geninfo bad int syntax: double ':', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
125 0,geninfo bad int syntax: extra char, -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
H A Dtest_verification.csv19 0,bad syntax in expected sender name: leading double '/', -section,, -recipient,_CA_DN, -expect_sen…
20 0,bad syntax in expected sender name: trailing double '/', -section,, -recipient,_CA_DN, -expect_se…
21 0,bad syntax in expected sender name: missing '=', -section,, -recipient,_CA_DN, -expect_sender,/C=…
/openssl/engines/
H A De_loader_attic.txt10 ATTIC_R_BAD_PASSWORD_READ:101:bad password read
/openssl/doc/man3/
H A DSSL_set_session.pod26 session is still B<open>, it is considered bad and will be removed from the
H A DSSL_set_shutdown.pod48 it is considered bad and removed according to RFC2246.
H A DSSL_clear.pod22 If a session is still B<open>, it is considered bad and will be removed
H A DSSL_alert_type_string.pod82 =item "BM"/"bad record mac"
104 =item "BC"/"bad certificate"

Completed in 54 milliseconds

12