$err = Net::SSLeay::get_error($ssl, $len);
isnt($err, Net::SSLeay::ERROR_WANT_READ(), "peek err $err is not retryable WANT_READ");
isnt($err, Net::SSLeay::ERROR_WANT_WRITE(), "peek err $e
$err = Net::SSLeay::get_error($ssl, $len);
isnt($err, Net::SSLeay::ERROR_WANT_READ(), "read err $err is not retryable WANT_READ");
isnt($err, Net::SSLeay::ERROR_WANT_WRITE(), "read err $e
$err = Net::SSLeay::get_error($ssl, $ret);
isnt($err, Net::SSLeay::ERROR_WANT_READ(), "1.1.1: peek_ex err $err is not retryable WANT_READ");
isnt($err, Net::SSLeay::ERROR_WANT_WRITE(), "1.1.1:
.9.3, 0x0090600f ~ 0.6.9
ok( Net::SSLeay::SSLeay() >= 0x00903100, 'SSLeay (version min 0.9.3)' );
isnt( Net::SSLeay::SSLeay_version(), '', 'SSLeay (version string)' );
is( Net::SSLeay::SSLeay_version(
ok won't fail this:
# cmp_ok(undef, '>=', 0)
isnt($major, undef, 'major is defined');
isnt($minor, undef, 'minor is defined');
isnt($patch, undef, 'patch is defined');
cmp_ok($maj
SSL_version_patch are equal');
isnt(defined Net::SSLeay::OPENSSL_version_pre_release(), undef, 'OPENSSL_version_pre_release returns a defined value');
isnt(defined Net::SSLeay::OPENSSL_versio
returns $ver_max, hex " . sprintf('0x%04x', $ver_max));
isnt($ver_1_0, $ver_min, 'Version 1_0 and 1_1 values are different');
isnt($ver_min, $ver_max, 'Version 1_1 and 1_2 values are differen
$ver_1_3));
isnt($ver_1_2, $ver_1_3, 'Version 1_2 and 1_3 values are different');
my $rv = 0;
ok(eval {$rv = Net::SSLeay::OP_NO_TLSv1_3()}, 'Have OP_NO_TLSv1_3');
isnt($rv, 0, 'OP_NO_
: empty and undefined context yields equal values");
isnt($bytes2_2_64, $bytes1_2, "$tls_version: export length does matter");
} else {
isnt($bytes1_0, $bytes1_2, "$tls_version: empty and undefi
values");
is($bytes2_2_64, $bytes1_2, "$tls_version: export length does not matter");
}
isnt($bytes1_3, $bytes1_0, "$tls_version: different context");
return;
}
# For SSL_export_keying
print "connect failed: $ret: " . Net::SSLeay::print_errs() . "\n" unless $ret == 1;
} else {
isnt($ret, 1, 'connect not ok: policy checks must fail') if !$ok;
is($verify_result, Net::SSLeay::X50
t "connect failed: $ret: " . Net::SSLeay::print_errs() . "\n" unless $ret == 1;
} else {
isnt($ret, 1, 'connect not ok: hostname checks must fail') if !$ok;
is($verify_result, Net::SSLeay:
my $ssl = client_get_ssl($ctx, $cl, $pm);
my $ret = Net::SSLeay::connect($ssl);
isnt($ret, 1, 'Connect must fail in wildcard test');
is($verify_result, Net::SSLeay::get_verify_
ssl
{
my $file_name = Net::SSLeay::RAND_file_name(300);
isnt($file_name, undef, 'RAND_file_name returns defined value');
isnt($file_name, q{}, "RAND_file_name returns non-empty string: $fi
d not honour RANDFILE. 1.1.0a is an
# educated guess when it starts working with all platforms.
isnt($file_name, q{}, "RAND_file_name returns non-empty string when RANDFILE is set: $file_name");
t::SSLeay::CIPHER_get_handshake_digest($cipher);
my $nid = Net::SSLeay::EVP_MD_type($md);
isnt($nid, Net::SSLeay::NID_undef(), "Net::SSLeay::CIPHER_get_handshake_digest returns MD with a NID:
'', 'digest init OK');
SKIP: {
skip "pre-1.0.0", 1 unless Net::SSLeay::SSLeay >= 0x1000000f;
isnt(scalar(keys %all_digests), 0, 'non-empty digest list');
}
my $file = data_file_path('binary-test