/openssl/test/helpers/ |
H A D | pkcs12.c | 110 pb->success = 1; in new_pkcs12_builder() 131 if (!pb->success) in end_pkcs12() 139 if (!pb->success) in end_pkcs12_with_mac() 151 if (!pb->success) in generate_p12() 390 if (!pb->success) in add_certbag() 423 if (!pb->success) in add_keybag() 454 if (!pb->success) in add_secretbag() 556 if (!pb->success) in check_certbag() 592 if (!pb->success) in check_keybag() 650 if (!pb->success) in check_secretbag() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 9 test-4 = 4-noverify-success 17 [0-verify-success] 18 ssl_conf = 0-verify-success-ssl 20 [0-verify-success-ssl] 24 [0-verify-success-server] 29 [0-verify-success-client] 122 [4-noverify-success] 125 [4-noverify-success-ssl] 129 [4-noverify-success-server] [all …]
|
H A D | 03-custom_verify.cnf.in | 19 name => "verify-success", 71 name => "noverify-success", 81 # The callback return has no impact on handshake success in this mode. 98 # The callback return has no impact on handshake success in this mode. 131 name => "verify-custom-success-no-root",
|
/openssl/fuzz/ |
H A D | bndiv.c | 48 int success = 0; in FuzzerTestOneInput() local 79 success = 1; in FuzzerTestOneInput() 85 success = BN_is_zero(b3) && BN_is_zero(b4); in FuzzerTestOneInput() 87 success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput() 90 success = (BN_is_negative(b3) == BN_is_negative(b2) || BN_is_zero(b3)) in FuzzerTestOneInput() 95 success = success && BN_cmp(b5, b1) == 0; in FuzzerTestOneInput() 96 if (!success) { in FuzzerTestOneInput() 117 OPENSSL_assert(success); in FuzzerTestOneInput()
|
H A D | bignum.c | 32 int success = 0; in FuzzerTestOneInput() local 74 success = 1; in FuzzerTestOneInput() 81 success = BN_cmp(b4, b5) == 0; in FuzzerTestOneInput() 82 if (!success) { in FuzzerTestOneInput() 96 OPENSSL_assert(success); in FuzzerTestOneInput()
|
/openssl/test/recipes/ |
H A D | 05-test_rand.t | 33 my $success; 38 capture => 1, statusvar => \$success); 40 ok($success && $randdata[0] eq $expected, 44 capture => 1, statusvar => \$success); 48 capture => 1, statusvar => \$success); 50 ok($success && length($randdata[0]) == 32,
|
H A D | 70-test_key_share.t | 88 ok(TLSProxy::Message->success(), "Success after HRR"); 112 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 139 ok(TLSProxy::Message->success(), "Non preferred key_share"); 150 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 196 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE3072), 199 ok(TLSProxy::Message->success() && ($selectedgroupid == P_256), 212 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE2048), 215 ok(TLSProxy::Message->success() && ($selectedgroupid == X25519), 264 ok(TLSProxy::Message->success() 276 ok(TLSProxy::Message->success(), "Ignore key_share for TLS<=1.2 server"); [all …]
|
H A D | 70-test_sslsigalgs.t | 59 ok(TLSProxy::Message->success, "Default sigalgs"); 99 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.3"); 134 ok(TLSProxy::Message->success, "TLSv1.3 client TLSv1.2 server"); 149 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0"); 194 ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs"); 202 ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2"); 236 ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA"); 277 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3"); 284 ok(TLSProxy::Message->success, "sigalgs_cert in TLSv1.3 with PKCS#1 cert"); 307 ok(TLSProxy::Message->success(), "Unrecognized sigalg_cert in ClientHello"); [all …]
|
H A D | 70-test_sslversions.t | 75 ok(TLSProxy::Message->success() 91 ok(TLSProxy::Message->success() 104 ok(TLSProxy::Message->success() 113 ok(TLSProxy::Message->success()
|
/openssl/test/ |
H A D | threadstest_fips.c | 17 static int success; variable 24 success = 0; in thread_fips_rand_fetch() 32 success = 1; in test_fips_rand_leak() 38 return TEST_true(success); in test_fips_rand_leak()
|
H A D | asn1_encode_test.c | 187 ASN1_BOOLEAN success; member 277 ASN1_BOOLEAN success; member 325 ASN1_BOOLEAN success; member 373 ASN1_BOOLEAN success; member 422 ASN1_BOOLEAN success; member 473 ASN1_BOOLEAN success; member 495 if (expected->success == 0) { in do_decode() 534 if (input->success == 0) { in do_encode() 749 if (expected->success) { in test_intern() 772 if (expected->success) { in test_intern() [all …]
|
H A D | quic_cc_test.c | 75 int success; member 143 int success; in net_sim_send() local 156 success = (sz <= s->spare_capacity); in net_sim_send() 159 pkt->success = success; in net_sim_send() 160 if (success) { in net_sim_send() 211 if (pkt->success && !pkt->arrived in net_sim_process_one() 228 if (!TEST_true(!pkt->success || pkt->arrived)) in net_sim_process_one() 231 if (!pkt->success) { in net_sim_process_one()
|
H A D | bio_tfo_test.c | 121 goto success; in test_bio_tfo() 152 goto success; in test_bio_tfo() 183 success: in test_bio_tfo() 318 goto success; in test_fd_tfo() 353 goto success; in test_fd_tfo() 392 success: in test_fd_tfo()
|
H A D | bio_comp_test.c | 82 int success = 0; in do_bio_comp() local 115 success = 1; in do_bio_comp() 119 return success; in do_bio_comp()
|
H A D | drbgtest.c | 406 int success = 1; in test_rand_reseed_on_fork() local 474 success = 0; in test_rand_reseed_on_fork() 480 success = 0; in test_rand_reseed_on_fork() 497 success = 0; in test_rand_reseed_on_fork() 500 if (verbose || !success) { in test_rand_reseed_on_fork() 516 return success; in test_rand_reseed_on_fork() 521 int success = 1; in test_rand_fork_safety() local 533 success = 0; in test_rand_fork_safety() 537 success = 0; in test_rand_fork_safety() 539 return success; in test_rand_fork_safety()
|
H A D | dtlsv1listentest.c | 299 int ret, success = 0; in dtls_listen_test() local 339 success = 1; in dtls_listen_test() 347 return success; in dtls_listen_test()
|
H A D | ct_test.c | 226 int success = 0; in execute_cert_test() local 321 success = 1; in execute_cert_test() 330 return success; in execute_cert_test() 479 int success = 0; in test_default_ct_policy_eval_ctx_time_is_now() local 489 success = 1; in test_default_ct_policy_eval_ctx_time_is_now() 492 return success; in test_default_ct_policy_eval_ctx_time_is_now()
|
/openssl/.github/workflows/ |
H A D | fips-label.yml | 27 if: ${{ github.event.workflow_run.conclusion == 'success' }} 48 if: ${{ github.event.workflow_run.conclusion == 'success' }} 50 if: ${{ github.event.workflow_run.conclusion == 'success' }} 83 if: ${{ github.event.workflow_run.conclusion == 'success' }} 87 if: ${{ github.event.workflow_run.conclusion == 'success' }} 108 if: ${{ github.event.workflow_run.conclusion == 'success' }} 110 if: ${{ github.event.workflow_run.conclusion == 'success' }}
|
H A D | prov-compat-label.yml | 228 if: steps.early_exit.outcome == 'success' 232 if: steps.early_exit.outcome == 'success' 236 if: steps.early_exit.outcome == 'success' 240 if: steps.early_exit.outcome == 'success' 244 if: steps.early_exit.outcome == 'success' 251 if: steps.early_exit.outcome == 'success' 262 if: steps.early_exit.outcome == 'success' 269 if: steps.early_exit.outcome == 'success'
|
H A D | provider-compatibility.yml | 222 if: steps.early_exit.outcome == 'success' 226 if: steps.early_exit.outcome == 'success' 230 if: steps.early_exit.outcome == 'success' 234 if: steps.early_exit.outcome == 'success' 238 if: steps.early_exit.outcome == 'success' 245 if: steps.early_exit.outcome == 'success' 256 if: steps.early_exit.outcome == 'success' 263 if: steps.early_exit.outcome == 'success'
|
/openssl/apps/lib/ |
H A D | s_socket.c | 239 int success = 1; in report_server_accept() local 247 success = hostname != NULL && service != NULL; in report_server_accept() 248 if (success) in report_server_accept() 249 success = BIO_printf(out, in report_server_accept() 260 success *= BIO_printf(out, " PID=%d", getpid()) > 0; in report_server_accept() 261 success *= BIO_printf(out, "\n") > 0; in report_server_accept() 264 return success; in report_server_accept()
|
/openssl/util/perl/TLSProxy/ |
H A D | Proxy.pm | 333 my $success = 1; 419 last if TLSProxy::Message->success() 423 last if TLSProxy::Message->success() 460 $success = 0; 492 return $success; 583 sub success subroutine 586 return $self->{success};
|
H A D | Message.pm | 154 my $success = 0; 168 $success = 0; 310 $success = 1; 320 $success = 1; 506 sub success subroutine 509 return $success; 514 return !$success && $end;
|
/openssl/doc/internal/man3/ |
H A D | ossl_punycode_decode.pod | 31 ossl_a2ulabel() returns 1 on success, 0 if the output buffer is too small and 34 ossl_punycode_decode() returns 1 on success, 0 on error. On success,
|
/openssl/include/openssl/ |
H A D | ct.h.in | 104 * Returns 1 on success, 0 otherwise. 114 * Returns 1 on success, 0 otherwise. 190 * Returns 1 on success, 0 otherwise. 204 * Returns 1 on success, 0 otherwise. 211 * Returns 1 on success, 0 otherwise. 237 * Returns 1 on success, 0 otherwise. 257 * Returns 1 on success, 0 otherwise. 277 * Returns 1 on success, 0 otherwise. 289 * Returns 1 on success, 0 otherwise. 356 * on success. [all …]
|