| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_sslextension.t | 42 my $fatal_alert = 0; # set by filter on fatal alert 112 $fatal_alert = 1 if $last_record->is_fatal_alert(1); 128 $fatal_alert = 1 if $last_record->is_fatal_alert(0); 146 $fatal_alert = 1 if $last_record->is_fatal_alert(0); 195 ok($fatal_alert, "Duplicate ClientHello extension"); 197 $fatal_alert = 0; 201 ok($fatal_alert, "Duplicate ServerHello extension"); 213 $fatal_alert = 0; 219 ok($fatal_alert, "Unsolicited server name extension"); 234 $fatal_alert = 0 [all...] |
| 70-test_sslrecords.t | 40 my $fatal_alert = 0; # set by filters at expected fatal alerts 48 ok($fatal_alert, "Out of context empty records test"); 58 $fatal_alert = 0; 64 ok($fatal_alert, "Too many in context empty records test"); 69 $fatal_alert = 0; 74 ok($fatal_alert, "Fragmented alert records test"); 130 $fatal_alert = 0; 135 ok($fatal_alert, "Unrecognised record type in TLS1.2"); 141 $fatal_alert = 0; 145 ok($fatal_alert, "Unrecognised record type in TLS1.1") [all...] |
| 70-test_sslcbcpadding.t | 52 my $fatal_alert; # set by add_maximal_padding_filter on client's fatal alert 56 $fatal_alert = 0; 59 ok($fatal_alert, "Invalid padding byte $bad_padding_offset"); 129 $fatal_alert = 1 if $last_record->is_fatal_alert(0) == 20;
|
| 70-test_tls13hrr.t | 64 my $fatal_alert = 0; 73 ok($fatal_alert, "Server duplicated HRR"); 99 $fatal_alert = 1
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_sslrecords.t | 40 my $fatal_alert = 0; # set by filters at expected fatal alerts 49 ok($fatal_alert, "Out of context empty records test"); 60 $fatal_alert = 0; 67 ok($fatal_alert, "Too many in context empty records test"); 72 $fatal_alert = 0; 78 ok($fatal_alert, "Fragmented alert records test"); 149 $fatal_alert = 0; 155 ok($fatal_alert, "Unrecognised record type in TLS1.2"); 161 $fatal_alert = 0; 166 ok($fatal_alert, "Unrecognised record type in TLS1.1") [all...] |
| 70-test_sslextension.t | 42 my $fatal_alert = 0; # set by filter on fatal alert 112 $fatal_alert = 1 if $last_record->is_fatal_alert(1); 128 $fatal_alert = 1 if $last_record->is_fatal_alert(0); 146 $fatal_alert = 1 if $last_record->is_fatal_alert(0); 195 ok($fatal_alert, "Duplicate ClientHello extension"); 200 $fatal_alert = 0; 205 ok($fatal_alert, "Duplicate ServerHello extension"); 216 $fatal_alert = 0; 222 ok($fatal_alert, "Unsolicited server name extension"); 250 $fatal_alert = 0 [all...] |
| 70-test_sslcbcpadding.t | 53 my $fatal_alert; # set by add_maximal_padding_filter on client's fatal alert 57 $fatal_alert = 0; 61 ok($fatal_alert, "Invalid padding byte $bad_padding_offset"); 131 $fatal_alert = 1 if $last_record->is_fatal_alert(0) == 20;
|
| 70-test_tls13hrr.t | 73 my $fatal_alert = 0; 82 ok($fatal_alert, "Server duplicated HRR"); 126 $fatal_alert = 1
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_sslextension.t | 42 my $fatal_alert = 0; # set by filter on fatal alert 111 $fatal_alert = 1 if $last_record->is_fatal_alert(1); 127 $fatal_alert = 1 if $last_record->is_fatal_alert(0); 145 $fatal_alert = 1 if $last_record->is_fatal_alert(0); 194 ok($fatal_alert, "Duplicate ClientHello extension"); 199 $fatal_alert = 0; 204 ok($fatal_alert, "Duplicate ServerHello extension"); 216 $fatal_alert = 0; 222 ok($fatal_alert, "Unsolicited server name extension"); 250 $fatal_alert = 0 [all...] |
| 70-test_sslrecords.t | 32 my $fatal_alert = undef; # set by filters at expected fatal alerts 71 $fatal_alert = 0; # set by filters at expected fatal alerts 78 $fatal_alert = 0; 82 ok($fatal_alert, "Out of context empty records test"); 109 $fatal_alert = 0; 116 ok($fatal_alert, "Too many in context empty records test"); 121 $fatal_alert = 0; 127 ok($fatal_alert, "Fragmented alert records test"); 198 $fatal_alert = 0; 213 ok($fatal_alert, "Unrecognised record type in TLS1.2") [all...] |
| 70-test_tls13hrr.t | 73 my $fatal_alert = 0; 82 ok($fatal_alert, "Server duplicated HRR"); 104 $fatal_alert = 0; 113 ok($fatal_alert, "supported_versions missing from HRR"); 138 $fatal_alert = 1 158 $fatal_alert = 1
|
| 70-test_sslcbcpadding.t | 52 my $fatal_alert; # set by add_maximal_padding_filter on client's fatal alert 56 $fatal_alert = 0; 60 ok($fatal_alert, "Invalid padding byte $bad_padding_offset"); 130 $fatal_alert = 1 if $last_record->is_fatal_alert(0) == TLSProxy::Message::AL_DESC_BAD_RECORD_MAC;
|
| /src/crypto/external/apache2/openssl/dist/ssl/record/ |
| rec_layer_d1.c | 447 sc->s3.fatal_alert = alert_descr;
|
| rec_layer_s3.c | 917 s->s3.fatal_alert = alert_descr;
|
| /src/crypto/external/bsd/openssl/dist/ssl/record/ |
| rec_layer_d1.c | 612 s->s3.fatal_alert = alert_descr;
|
| rec_layer_s3.c | 1604 s->s3.fatal_alert = alert_descr;
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
| rec_layer_d1.c | 613 s->s3->fatal_alert = alert_descr;
|
| rec_layer_s3.c | 1561 s->s3->fatal_alert = alert_descr;
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_local.h | 1332 int fatal_alert; member in struct:ssl_connection_st::__anon626
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_local.h | 1291 int fatal_alert; member in struct:ssl_st::__anon1657
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_local.h | 1555 int fatal_alert; member in struct:ssl3_state_st
|