/openssl/test/ssl-tests/ |
H A D | 05-sni.cnf | 9 test-4 = 4-SNI-bad-sni-ignore-mismatch 10 test-5 = 5-SNI-bad-sni-reject-mismatch 11 test-6 = 6-SNI-bad-clienthello-sni-ignore-mismatch 141 [4-SNI-bad-sni-ignore-mismatch] 144 [4-SNI-bad-sni-ignore-mismatch-ssl] 149 [4-SNI-bad-sni-ignore-mismatch-server] 154 [4-SNI-bad-sni-ignore-mismatch-client] 175 [5-SNI-bad-sni-reject-mismatch] 178 [5-SNI-bad-sni-reject-mismatch-ssl] 183 [5-SNI-bad-sni-reject-mismatch-server] [all …]
|
H A D | 23-srp.cnf | 6 test-1 = 1-srp-bad-password 8 test-3 = 3-srp-auth-bad-password 46 [1-srp-bad-password] 47 ssl_conf = 1-srp-bad-password-ssl 49 [1-srp-bad-password-ssl] 50 server = 1-srp-bad-password-server 51 client = 1-srp-bad-password-client 53 [1-srp-bad-password-server] 59 [1-srp-bad-password-client] 116 [3-srp-auth-bad-password] [all …]
|
H A D | 15-certstatus.cnf | 6 test-1 = 1-certstatus-bad 37 [1-certstatus-bad] 38 ssl_conf = 1-certstatus-bad-ssl 40 [1-certstatus-bad-ssl] 41 server = 1-certstatus-bad-server 42 client = 1-certstatus-bad-client 44 [1-certstatus-bad-server] 49 [1-certstatus-bad-client] 57 server = 1-certstatus-bad-server-extra 59 [1-certstatus-bad-server-extra]
|
H A D | 16-dtls-certstatus.cnf | 6 test-1 = 1-certstatus-bad 37 [1-certstatus-bad] 38 ssl_conf = 1-certstatus-bad-ssl 40 [1-certstatus-bad-ssl] 41 server = 1-certstatus-bad-server 42 client = 1-certstatus-bad-client 44 [1-certstatus-bad-server] 49 [1-certstatus-bad-client] 57 server = 1-certstatus-bad-server-extra 59 [1-certstatus-bad-server-extra]
|
H A D | 23-srp.cnf.in | 40 name => "srp-bad-password", 58 # Server fails first with bad client Finished. 85 name => "srp-auth-bad-password", 103 # Server fails first with bad client Finished.
|
H A D | 05-sni.cnf.in | 82 name => "SNI-bad-sni-ignore-mismatch", 99 name => "SNI-bad-sni-reject-mismatch", 116 name => "SNI-bad-clienthello-sni-ignore-mismatch", 133 name => "SNI-bad-clienthello-sni-reject-mismatch",
|
H A D | 16-dtls-certstatus.cnf.in | 40 name => "certstatus-bad", 76 name => "certstatus-bad",
|
H A D | 04-client_auth.cnf | 10 test-5 = 5-client-auth-flex-rsa-pss-bad 30 test-25 = 25-client-auth-TLSv1.2-rsa-pss-bad 180 [5-client-auth-flex-rsa-pss-bad] 181 ssl_conf = 5-client-auth-flex-rsa-pss-bad-ssl 183 [5-client-auth-flex-rsa-pss-bad-ssl] 187 [5-client-auth-flex-rsa-pss-bad-server] 195 [5-client-auth-flex-rsa-pss-bad-client] 789 [25-client-auth-TLSv1.2-rsa-pss-bad] 792 [25-client-auth-TLSv1.2-rsa-pss-bad-ssl] 796 [25-client-auth-TLSv1.2-rsa-pss-bad-server] [all …]
|
H A D | 15-certstatus.cnf.in | 33 name => "certstatus-bad",
|
H A D | 04-client_auth.cnf.in | 186 # Failed handshake with client RSA-PSS cert, StrictCertCheck, bad CA 188 name => "client-auth-${protocol_name}-rsa-pss-bad"
|
/openssl/util/ |
H A D | ck_errf.pl | 97 my $bad = 0; 115 $bad = 1; 120 $bad = 1; 133 $bad = 1; 140 $bad = 1; 150 if ( $bad && $err_strict ) {
|
/openssl/test/recipes/ |
H A D | 15-test_genrsa.t | 44 my $bad = 3; # Log2 of number of bits (2 << 3 == 8) 47 while ($good > $bad + 1) { 48 my $checked = int(($good + $bad + 1) / 2); 59 $bad = $checked; 62 $good++ if $good == $bad;
|
/openssl/crypto/err/ |
H A D | openssl.txt | 14 ASN1_R_BAD_TEMPLATE:230:bad template 557 DSA_R_BAD_Q_VALUE:102:bad q value 712 EVP_R_BAD_DECRYPT:100:bad decrypt 1036 PROV_R_BAD_LENGTH:142:bad length 1330 SSL_R_BAD_CIPHER:186:bad cipher 1332 SSL_R_BAD_DATA:390:bad data 1348 SSL_R_BAD_LENGTH:271:bad length 1349 SSL_R_BAD_PACKET:240:bad packet 1352 SSL_R_BAD_PSK:219:bad psk 1362 SSL_R_BAD_VALUE:384:bad value [all …]
|
/openssl/crypto/asn1/ |
H A D | asn1_gen.c | 413 goto bad; in asn1_multi() 416 goto bad; in asn1_multi() 419 goto bad; in asn1_multi() 425 goto bad; in asn1_multi() 427 goto bad; in asn1_multi() 441 goto bad; in asn1_multi() 443 goto bad; in asn1_multi() 445 goto bad; in asn1_multi() 453 bad: in asn1_multi()
|
/openssl/test/ |
H A D | ssl_old_test.c | 1022 goto bad; in main() 1027 goto bad; in main() 1049 goto bad; in main() 1055 goto bad; in main() 1066 goto bad; in main() 1070 goto bad; in main() 1074 goto bad; in main() 1078 goto bad; in main() 1126 goto bad; in main() 1132 goto bad; in main() [all …]
|
H A D | evp_pkey_dparams_test.c | 31 int bad; member 290 if (keys[i].bad) { in set_enc_pubkey_test()
|
/openssl/test/certs/ |
H A D | setup.sh | 243 ./mkcert.sh req bad-pc3-key "0.CN = server.example" "1.CN = proxy 3" | \ 244 ./mkcert.sh genpc bad-pc3-key bad-pc3-cert pc1-key pc1-cert \ 247 ./mkcert.sh req bad-pc4-key "0.CN = server.example" "1.CN = proxy 1" "2.CN = proxy 4" | \ 248 ./mkcert.sh genpc bad-pc4-key bad-pc4-cert pc1-key pc1-cert \ 255 ./mkcert.sh req bad-pc6-key "0.CN = server.example" "1.CN = proxy 1" "2.+CN = proxy 6" | \ 256 ./mkcert.sh genpc bad-pc6-key bad-pc6-cert pc1-key pc1-cert \ 421 ./mkcert.sh geneealt bad-othername-key bad-othername-cert \ 477 ./mkcert.sh geneeextra server.example ee-key ee-cert-policies-bad ca-key ca-cert "certificatePolici…
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_connection.csv | 14 0,server port bad syntax: leading garbage, -section,, -server,_SERVER_HOST:x/+80,,,,,BLANK,,,,BLANK… 15 0,server port bad syntax: trailing garbage, -section,, -server,_SERVER_HOST:_SERVER_PORT+/x.,,,,,BL… 19 0,proxy port bad syntax: leading garbage, -section,, -server,_SERVER_HOST:_SERVER_PORT, -proxy,127.…
|
H A D | test_commands.csv | 53 0,bad issuer DN for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,-1,BLANK,,, … 55 0,bad serial for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,-1,BLANK,,, -ex… 117 0,geninfo bad OID num: leading '.', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke… 120 0,geninfo bad OID name: trailing '_', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke… 121 0,geninfo bad syntax: missing ':int', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke… 122 0,geninfo bad type tag, -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke… 123 0,geninfo bad syntax: missing ':', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke… 124 0,geninfo bad int syntax: double ':', -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke… 125 0,geninfo bad int syntax: extra char, -section,, -cmd,cr,, -cert,signer.crt,, -key,signer.p12,, -ke…
|
H A D | test_verification.csv | 19 0,bad syntax in expected sender name: leading double '/', -section,, -recipient,_CA_DN, -expect_sen… 20 0,bad syntax in expected sender name: trailing double '/', -section,, -recipient,_CA_DN, -expect_se… 21 0,bad syntax in expected sender name: missing '=', -section,, -recipient,_CA_DN, -expect_sender,/C=…
|
/openssl/engines/ |
H A D | e_loader_attic.txt | 10 ATTIC_R_BAD_PASSWORD_READ:101:bad password read
|
/openssl/doc/man3/ |
H A D | SSL_set_session.pod | 26 session is still B<open>, it is considered bad and will be removed from the
|
H A D | SSL_set_shutdown.pod | 48 it is considered bad and removed according to RFC2246.
|
H A D | SSL_clear.pod | 22 If a session is still B<open>, it is considered bad and will be removed
|
H A D | SSL_alert_type_string.pod | 82 =item "BM"/"bad record mac" 104 =item "BC"/"bad certificate"
|