/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/test/ |
H A D | stubs.c | 113 ONN("this code shouldn't run", dn != NULL); 115 ONN("this code shouldn't run", dn != NULL); 117 ONN("this code shouldn't run", issuer != NULL); 118 ONN("this code shouldn't run", ne_ssl_cert_digest(cert, digest)); 120 ONN("this code shouldn't run", 123 ONN("this code shouldn't run", ne_ssl_cert_identity(issuer) != NULL); 124 ONN("this code shouldn't run", ne_ssl_cert_export(cert) != NULL); 127 ONN("this code shouldn't run", ne_ssl_cert_import("foo") != NULL); 128 ONN("this code shouldn't run", ne_ssl_cert_read("Makefile") != NULL); 129 ONN("thi [all...] |
H A D | util-tests.c | 131 ONN("MD5(null)", strcmp(ascii, "d41d8cd98f00b204e9800998ecf8427e")); 134 ONN("MD5(foobar)", strcmp(ascii, "b4258860eea29e875e2ee4019763b2bb")); 140 ONN("MD5(\"z\"x512)", strcmp(ascii, "8b9323bd72250ea7f1b2b3fb5046391a")); 256 ONN("version string too long", strlen(buf) > 200); 257 ONN("version string contained newline", strchr(buf, '\n') != NULL); 265 ONN("SSL support not advertised", !ne_has_support(NE_FEATURE_SSL)); 267 ONN("SSL support advertised", ne_has_support(NE_FEATURE_SSL)); 270 ONN("zlib support not advertised", !ne_has_support(NE_FEATURE_ZLIB)); 272 ONN("zlib support advertised", ne_has_support(NE_FEATURE_ZLIB)); 275 ONN("IPv [all...] |
H A D | redirect.c | 67 ONN("did not get NE_REDIRECT", any_request(sess, path) != NE_REDIRECT); 82 ONN("redirect location was NULL", loc == NULL); 145 ONN("followed looping redirect", 160 ONN("redirect non-NULL before register", ne_redirect_location(sess)); 162 ONN("initial redirect non-NULL", ne_redirect_location(sess)); 169 ONN("redirect non-NULL after non-redir req", ne_redirect_location(sess));
|
H A D | ssl.c | 166 ONN("could not retrieve session ID", 184 ONN("cached session not used", 291 ONN("invalid CA cert file loaded successfully", cert != NULL); 294 ONN("non-existent 'nonesuch.pem' loaded successfully", cert != NULL); 297 ONN("could not load ssigned.pem", cert == NULL); 321 ONN("could not load client.p12", cc == NULL); 322 ONN("client.p12 not encrypted!?", !ne_ssl_clicert_encrypted(cc)); 329 ONN("failed to decrypt", ne_ssl_clicert_decrypt(cc, P12_PASSPHRASE)); 333 ONN("decrypted client.p12 with incorrect password!?", 339 ONN("coul [all...] |
H A D | session.c | 44 ONN("port mis-match", uri.port != 7777); 60 ONN("no proxy host should be set", uri.host != NULL); 61 ONN("no proxy port should be set", uri.port != 0); 68 ONN("proxy port mis-match", uri.port != 345); 144 ONN(msg, ne_get_session_private(sess, id) != val) 178 ONN("persist flag was not set", 182 ONN("unsupported flag was recognized",
|
H A D | string-tests.c | 138 ONN(res ": return", tok == NULL); \ 139 ONN(res ": compare", strcmp(tok, (res))); \ 140 ONN(res ": modify", pnt == NULL); \ 145 ONN(res ": last return", tok == NULL); \ 146 ONN(res ": last compare", strcmp(tok, (res))); \ 147 ONN(res ": last modify", pnt != NULL); \ 152 ONN(res ": return", tok == NULL); \ 153 ONN(res ": compare", strcmp(tok, (res))); \ 154 ONN(res ": modify", pnt == NULL); \ 159 ONN(re [all...] |
H A D | socket.c | 91 ONN("could not create socket", *sock == NULL); 117 ONN("sock_init failed", ne_sock_init()); 119 ONN("SSL_CTX_new failed", server_ctx == NULL); 124 ONN("SSL_CTX_new failed for client", client_ctx == NULL); 127 ONN("could not load ca/cert.pem", cert == NULL); 198 ONN("ne_addr_first returned NULL", ne_addr_first(addr) == NULL); 199 ONN("ne_iaddr_print didn't return buffer", 234 ONN("bogus ne_iaddr_typeof return", ne_iaddr_typeof(ia) != ne_iaddr_ipv4); 235 ONN("ne_iaddr_raw gave bad retval", ne_iaddr_raw(ia, raw) != raw); 236 ONN("ra [all...] |
H A D | util-socks.c | 130 ONN("bad v4A bogus address", 134 ONN("v4 server with no expected address! fail", 138 ONN("v4 address mismatch", 198 ONN("client did not advertise no-auth method", 204 ONN("client did not advertise authn method", 247 ONN("bad address type byte", 252 ONN("unexpected FQDN from client", srv->expect_fqdn == NULL); 262 ONN("unexpected IP literal from client", srv->expect_addr == NULL); 279 ONN("address mismatch", memcmp(raw, buf, len) != 0);
|
H A D | lock.c | 145 ONN("create failed", store == NULL); 147 ONN("new lock store not empty", ne_lockstore_first(store) != NULL); 151 ONN("lock not found in store", ne_lockstore_first(store) != lk); 153 ONN(">1 locks in store?", ne_lockstore_next(store) != NULL); 157 ONN("lock not found by URI", lk2 == NULL); 158 ONN("other lock found by URI", lk2 != lk); 162 ONN("store not empty after removing lock", 165 ONN("lock still found after removing lock", 181 ONN("create failed", store == NULL); 187 ONN("loc [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/test/ |
H A D | stubs.c | 113 ONN("this code shouldn't run", dn != NULL); 115 ONN("this code shouldn't run", dn != NULL); 117 ONN("this code shouldn't run", issuer != NULL); 118 ONN("this code shouldn't run", ne_ssl_cert_digest(cert, digest)); 120 ONN("this code shouldn't run", 123 ONN("this code shouldn't run", ne_ssl_cert_identity(issuer) != NULL); 124 ONN("this code shouldn't run", ne_ssl_cert_export(cert) != NULL); 127 ONN("this code shouldn't run", ne_ssl_cert_import("foo") != NULL); 128 ONN("this code shouldn't run", ne_ssl_cert_read("Makefile") != NULL); 129 ONN("thi [all...] |
H A D | util-tests.c | 131 ONN("MD5(null)", strcmp(ascii, "d41d8cd98f00b204e9800998ecf8427e")); 134 ONN("MD5(foobar)", strcmp(ascii, "b4258860eea29e875e2ee4019763b2bb")); 140 ONN("MD5(\"z\"x512)", strcmp(ascii, "8b9323bd72250ea7f1b2b3fb5046391a")); 256 ONN("version string too long", strlen(buf) > 200); 257 ONN("version string contained newline", strchr(buf, '\n') != NULL); 265 ONN("SSL support not advertised", !ne_has_support(NE_FEATURE_SSL)); 267 ONN("SSL support advertised", ne_has_support(NE_FEATURE_SSL)); 270 ONN("zlib support not advertised", !ne_has_support(NE_FEATURE_ZLIB)); 272 ONN("zlib support advertised", ne_has_support(NE_FEATURE_ZLIB)); 275 ONN("IPv [all...] |
H A D | redirect.c | 67 ONN("did not get NE_REDIRECT", any_request(sess, path) != NE_REDIRECT); 82 ONN("redirect location was NULL", loc == NULL); 145 ONN("followed looping redirect", 160 ONN("redirect non-NULL before register", ne_redirect_location(sess)); 162 ONN("initial redirect non-NULL", ne_redirect_location(sess)); 169 ONN("redirect non-NULL after non-redir req", ne_redirect_location(sess));
|
H A D | ssl.c | 166 ONN("could not retrieve session ID", 184 ONN("cached session not used", 291 ONN("invalid CA cert file loaded successfully", cert != NULL); 294 ONN("non-existent 'nonesuch.pem' loaded successfully", cert != NULL); 297 ONN("could not load ssigned.pem", cert == NULL); 321 ONN("could not load client.p12", cc == NULL); 322 ONN("client.p12 not encrypted!?", !ne_ssl_clicert_encrypted(cc)); 329 ONN("failed to decrypt", ne_ssl_clicert_decrypt(cc, P12_PASSPHRASE)); 333 ONN("decrypted client.p12 with incorrect password!?", 339 ONN("coul [all...] |
H A D | session.c | 44 ONN("port mis-match", uri.port != 7777); 60 ONN("no proxy host should be set", uri.host != NULL); 61 ONN("no proxy port should be set", uri.port != 0); 68 ONN("proxy port mis-match", uri.port != 345); 144 ONN(msg, ne_get_session_private(sess, id) != val) 178 ONN("persist flag was not set", 182 ONN("unsupported flag was recognized",
|
H A D | string-tests.c | 138 ONN(res ": return", tok == NULL); \ 139 ONN(res ": compare", strcmp(tok, (res))); \ 140 ONN(res ": modify", pnt == NULL); \ 145 ONN(res ": last return", tok == NULL); \ 146 ONN(res ": last compare", strcmp(tok, (res))); \ 147 ONN(res ": last modify", pnt != NULL); \ 152 ONN(res ": return", tok == NULL); \ 153 ONN(res ": compare", strcmp(tok, (res))); \ 154 ONN(res ": modify", pnt == NULL); \ 159 ONN(re [all...] |
H A D | socket.c | 91 ONN("could not create socket", *sock == NULL); 117 ONN("sock_init failed", ne_sock_init()); 119 ONN("SSL_CTX_new failed", server_ctx == NULL); 124 ONN("SSL_CTX_new failed for client", client_ctx == NULL); 127 ONN("could not load ca/cert.pem", cert == NULL); 198 ONN("ne_addr_first returned NULL", ne_addr_first(addr) == NULL); 199 ONN("ne_iaddr_print didn't return buffer", 234 ONN("bogus ne_iaddr_typeof return", ne_iaddr_typeof(ia) != ne_iaddr_ipv4); 235 ONN("ne_iaddr_raw gave bad retval", ne_iaddr_raw(ia, raw) != raw); 236 ONN("ra [all...] |
H A D | util-socks.c | 130 ONN("bad v4A bogus address", 134 ONN("v4 server with no expected address! fail", 138 ONN("v4 address mismatch", 198 ONN("client did not advertise no-auth method", 204 ONN("client did not advertise authn method", 247 ONN("bad address type byte", 252 ONN("unexpected FQDN from client", srv->expect_fqdn == NULL); 262 ONN("unexpected IP literal from client", srv->expect_addr == NULL); 279 ONN("address mismatch", memcmp(raw, buf, len) != 0);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/test/ |
H A D | stubs.c | 113 ONN("this code shouldn't run", dn != NULL); 115 ONN("this code shouldn't run", dn != NULL); 117 ONN("this code shouldn't run", issuer != NULL); 118 ONN("this code shouldn't run", ne_ssl_cert_digest(cert, digest)); 120 ONN("this code shouldn't run", 123 ONN("this code shouldn't run", ne_ssl_cert_identity(issuer) != NULL); 124 ONN("this code shouldn't run", ne_ssl_cert_export(cert) != NULL); 127 ONN("this code shouldn't run", ne_ssl_cert_import("foo") != NULL); 128 ONN("this code shouldn't run", ne_ssl_cert_read("Makefile") != NULL); 129 ONN("thi [all...] |
H A D | util-tests.c | 131 ONN("MD5(null)", strcmp(ascii, "d41d8cd98f00b204e9800998ecf8427e")); 134 ONN("MD5(foobar)", strcmp(ascii, "b4258860eea29e875e2ee4019763b2bb")); 140 ONN("MD5(\"z\"x512)", strcmp(ascii, "8b9323bd72250ea7f1b2b3fb5046391a")); 256 ONN("version string too long", strlen(buf) > 200); 257 ONN("version string contained newline", strchr(buf, '\n') != NULL); 265 ONN("SSL support not advertised", !ne_has_support(NE_FEATURE_SSL)); 267 ONN("SSL support advertised", ne_has_support(NE_FEATURE_SSL)); 270 ONN("zlib support not advertised", !ne_has_support(NE_FEATURE_ZLIB)); 272 ONN("zlib support advertised", ne_has_support(NE_FEATURE_ZLIB)); 275 ONN("IPv [all...] |
H A D | redirect.c | 67 ONN("did not get NE_REDIRECT", any_request(sess, path) != NE_REDIRECT); 82 ONN("redirect location was NULL", loc == NULL); 145 ONN("followed looping redirect", 160 ONN("redirect non-NULL before register", ne_redirect_location(sess)); 162 ONN("initial redirect non-NULL", ne_redirect_location(sess)); 169 ONN("redirect non-NULL after non-redir req", ne_redirect_location(sess));
|
H A D | ssl.c | 166 ONN("could not retrieve session ID", 184 ONN("cached session not used", 291 ONN("invalid CA cert file loaded successfully", cert != NULL); 294 ONN("non-existent 'nonesuch.pem' loaded successfully", cert != NULL); 297 ONN("could not load ssigned.pem", cert == NULL); 321 ONN("could not load client.p12", cc == NULL); 322 ONN("client.p12 not encrypted!?", !ne_ssl_clicert_encrypted(cc)); 329 ONN("failed to decrypt", ne_ssl_clicert_decrypt(cc, P12_PASSPHRASE)); 333 ONN("decrypted client.p12 with incorrect password!?", 339 ONN("coul [all...] |
H A D | session.c | 44 ONN("port mis-match", uri.port != 7777); 60 ONN("no proxy host should be set", uri.host != NULL); 61 ONN("no proxy port should be set", uri.port != 0); 68 ONN("proxy port mis-match", uri.port != 345); 144 ONN(msg, ne_get_session_private(sess, id) != val) 178 ONN("persist flag was not set", 182 ONN("unsupported flag was recognized",
|
H A D | string-tests.c | 138 ONN(res ": return", tok == NULL); \ 139 ONN(res ": compare", strcmp(tok, (res))); \ 140 ONN(res ": modify", pnt == NULL); \ 145 ONN(res ": last return", tok == NULL); \ 146 ONN(res ": last compare", strcmp(tok, (res))); \ 147 ONN(res ": last modify", pnt != NULL); \ 152 ONN(res ": return", tok == NULL); \ 153 ONN(res ": compare", strcmp(tok, (res))); \ 154 ONN(res ": modify", pnt == NULL); \ 159 ONN(re [all...] |
H A D | socket.c | 91 ONN("could not create socket", *sock == NULL); 117 ONN("sock_init failed", ne_sock_init()); 119 ONN("SSL_CTX_new failed", server_ctx == NULL); 124 ONN("SSL_CTX_new failed for client", client_ctx == NULL); 127 ONN("could not load ca/cert.pem", cert == NULL); 198 ONN("ne_addr_first returned NULL", ne_addr_first(addr) == NULL); 199 ONN("ne_iaddr_print didn't return buffer", 234 ONN("bogus ne_iaddr_typeof return", ne_iaddr_typeof(ia) != ne_iaddr_ipv4); 235 ONN("ne_iaddr_raw gave bad retval", ne_iaddr_raw(ia, raw) != raw); 236 ONN("ra [all...] |
H A D | util-socks.c | 130 ONN("bad v4A bogus address", 134 ONN("v4 server with no expected address! fail", 138 ONN("v4 address mismatch", 198 ONN("client did not advertise no-auth method", 204 ONN("client did not advertise authn method", 247 ONN("bad address type byte", 252 ONN("unexpected FQDN from client", srv->expect_fqdn == NULL); 262 ONN("unexpected IP literal from client", srv->expect_addr == NULL); 279 ONN("address mismatch", memcmp(raw, buf, len) != 0);
|