/openssl/test/ |
H A D | x509_internal_test.c | 76 {":::1", NULL, 0}, 80 {"1", NULL, 0 }, 81 {"1.", NULL, 0 }, 82 {"1.2", NULL, 0 }, 83 {"1.2.", NULL, 0 }, 113 {"::1 ", NULL, 0 }, 114 {" ::1", NULL, 0 }, 115 {":: 1", NULL, 0 }, 116 {": :1", NULL, 0 }, 130 {":::", NULL, 0 }, [all …]
|
H A D | evp_libctx_test.c | 118 EVP_PKEY *pkey = NULL, *dup_pk = NULL; in test_dsa_param_keygen() 121 BIGNUM *p = NULL, *q = NULL, *g = NULL; in test_dsa_param_keygen() 193 BIGNUM *p = NULL, *q = NULL, *g = NULL; in do_dh_param_keygen() 408 && (!TEST_true(EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, iv)) in test_cipher_reinit() 507 if (!TEST_true(EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, iv)) in test_cipher_reinit_partialupdate() 575 EVP_PKEY_CTX *sctx = NULL, *rctx = NULL, *dctx = NULL; in kem_rsa_gen_recover() 588 && TEST_int_eq(EVP_PKEY_encapsulate(dctx, NULL, NULL, NULL, NULL), 0) in kem_rsa_gen_recover() 675 && TEST_int_eq(EVP_PKEY_encapsulate(NULL, NULL, NULL, NULL, NULL), 0) in kem_rsa_params() 677 && TEST_int_eq(EVP_PKEY_decapsulate(NULL, NULL, NULL, NULL, 0), 0) in kem_rsa_params() 679 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, NULL, NULL, NULL), -1) in kem_rsa_params() [all …]
|
H A D | tls13encryptiontest.c | 220 return NULL; in multihexstr2buf() 245 unsigned char *pt = NULL, *sq = NULL, *ivtmp = NULL; in load_record() 253 if (*key == NULL || ivtmp == NULL || sq == NULL || pt == NULL) in load_record() 272 *key = NULL; in load_record() 316 OSSL_RECORD_LAYER *rrl = NULL, *wrl = NULL; in test_tls13_encryption() 322 rec.data = NULL; in test_tls13_encryption() 340 EVP_GCM_TLS_TAG_LEN, 0, NULL, NULL, NULL, NULL, NULL, in test_tls13_encryption() 341 NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, in test_tls13_encryption() 363 EVP_GCM_TLS_TAG_LEN, 0, NULL, NULL, NULL, NULL, NULL, in test_tls13_encryption() 364 NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, in test_tls13_encryption() [all …]
|
H A D | endecoder_legacy_test.c | 234 { "RSA", EVP_PKEY_RSA, NULL, NULL }, 248 && ((ctx = EVP_PKEY_CTX_new_from_name(NULL, type, NULL)) == NULL in make_key() 263 : EVP_PKEY_CTX_new_from_name(NULL, type, NULL); in make_key() 283 return NULL; in lookup_key() 288 char *str_provided = NULL, *str_legacy = NULL; in test_membio_str_eq() 327 NULL, NULL, 0, NULL, NULL)) in test_protected_PEM() 339 NULL, NULL)) in test_protected_PEM() 342 pem_read_bio(membio_legacy, NULL, NULL, NULL)) in test_protected_PEM() 406 NULL, NULL)) in test_unprotected_PEM() 409 pem_read_bio(membio_legacy, NULL, NULL, NULL)) in test_unprotected_PEM() [all …]
|
H A D | provider_pkey_test.c | 80 ctx = NULL; in test_pkey_sig() 150 ctx = NULL; in test_alternative_keygen_init() 208 ctx = NULL; in test_pkey_eq() 223 ctx = NULL; in test_pkey_eq() 268 NULL, NULL, NULL, NULL, NULL))) in test_pkey_store() 319 NULL, NULL, NULL, NULL, NULL))) in test_pkey_delete() 334 pkey = NULL; in test_pkey_delete() 337 NULL, NULL, NULL), 1)) in test_pkey_delete() 344 NULL, NULL, NULL, NULL, NULL))) in test_pkey_delete() 406 ui_method, NULL, NULL, NULL, NULL))) in test_pkey_store_open_ex() [all …]
|
H A D | pkcs12_api_test.c | 29 return TEST_false(PKCS12_parse(NULL, NULL, NULL, NULL, NULL)); in test_null_args() 34 BIO *bio = NULL; in PKCS12_load() 55 return NULL; in PKCS12_load() 156 return NULL; in pkcs12_create_ex2_setup() 162 PKCS12 *ptr = NULL, *p12 = NULL; in pkcs12_create_ex2_test() 173 ptr = PKCS12_create_ex2(NULL, NULL, NULL, in pkcs12_create_ex2_test() 177 NULL, NULL); in pkcs12_create_ex2_test() 187 ptr = PKCS12_create_ex2(NULL, NULL, NULL, in pkcs12_create_ex2_test() 198 ptr = PKCS12_create_ex2(NULL, NULL, NULL, in pkcs12_create_ex2_test() 209 ptr = PKCS12_create_ex2(NULL, NULL, NULL, in pkcs12_create_ex2_test() [all …]
|
/openssl/crypto/cmp/ |
H A D | cmp_msg.c | 88 if (!ossl_assert(msg != NULL && msg->body != NULL)) in ossl_cmp_msg_set_bodytype() 455 if (!ossl_assert(ctx != NULL && si != NULL)) in ossl_cmp_certrep_new() 589 if (!ossl_assert(ctx != NULL && si != NULL)) in ossl_cmp_rp_new() 732 const char *lib = NULL, *reason = NULL; in ossl_cmp_error_new() 735 if (!ossl_assert(ctx != NULL && si != NULL)) in ossl_cmp_error_new() 754 if (lib != NULL || reason != NULL || details != NULL) { in ossl_cmp_error_new() 1093 if (ctx == NULL || msg == NULL) { in OSSL_CMP_MSG_update_transactionID() 1105 if (ctx == NULL || msg == NULL || msg->header == NULL) { in OSSL_CMP_MSG_update_recipNonce() 1148 if (file == NULL || msg == NULL) { in OSSL_CMP_MSG_write() 1167 if (msg != NULL && *msg != NULL) { in d2i_OSSL_CMP_MSG() [all …]
|
H A D | cmp_server.c | 176 const char *txt = NULL, *details = NULL; in delayed_delivery() 180 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL in delayed_delivery() 225 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL)) in process_cert_request() 318 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL)) in process_rr() 334 if (issuer != NULL && serial != NULL in process_rr() 360 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL)) in process_genm() 377 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL)) in process_error() 397 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL)) in process_certConf() 452 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL in process_non_polling_request() 512 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL)) in process_pollReq() [all …]
|
H A D | cmp_protect.c | 42 if (!ossl_assert(ctx != NULL && msg != NULL)) in ossl_cmp_calc_protection() 43 return NULL; in ossl_cmp_calc_protection() 51 return NULL; in ossl_cmp_calc_protection() 129 return NULL; in ossl_cmp_calc_protection() 136 if (!ossl_assert(ctx != NULL && msg != NULL)) in ossl_cmp_msg_add_extraCerts() 141 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 198 return NULL; in pbmac_algor() 204 if (pbm == NULL || pbm_str == NULL) in pbmac_algor() 223 if (id == NULL) in set_senderKID() 231 if (!ossl_assert(ctx != NULL && msg != NULL)) in ossl_cmp_msg_protect() [all …]
|
/openssl/crypto/srp/ |
H A D | srp_lib.c | 79 BIGNUM *tmp = NULL, *S = NULL; in SRP_Calc_server_key() 82 if (u == NULL || A == NULL || v == NULL || b == NULL || N == NULL) in SRP_Calc_server_key() 109 BIGNUM *kv = NULL, *gb = NULL; in SRP_Calc_B_ex() 110 BIGNUM *B = NULL, *k = NULL; in SRP_Calc_B_ex() 113 if (b == NULL || N == NULL || g == NULL || v == NULL || in SRP_Calc_B_ex() 153 if ((s == NULL) || (user == NULL) || (pass == NULL)) in SRP_Calc_x_ex() 201 if (a == NULL || N == NULL || g == NULL || (bn_ctx = BN_CTX_new()) == NULL) in SRP_Calc_A() 216 BIGNUM *tmp = NULL, *tmp2 = NULL, *tmp3 = NULL, *k = NULL, *K = NULL; in SRP_Calc_client_key_ex() 220 if (u == NULL || B == NULL || N == NULL || g == NULL || x == NULL in SRP_Calc_client_key_ex() 272 if (B == NULL || N == NULL || (bn_ctx = BN_CTX_new()) == NULL) in SRP_Verify_B_mod_N() [all …]
|
H A D | srp_vfy.c | 236 if (NULL == (vinfo->v = BN_bin2bn(tmp, len, NULL))) in SRP_user_pwd_set_sv() 257 return (vinfo->s != NULL && vinfo->v != NULL); in SRP_user_pwd_set0_sv() 572 (vb->default_g == NULL) || (vb->default_N == NULL)) in SRP_VBASE_get1_by_user() 587 md = EVP_MD_fetch(NULL, SN_sha1, NULL); in SRP_VBASE_get1_by_user() 600 md = NULL; in SRP_VBASE_get1_by_user() 621 char *result = NULL, *vf = NULL; in SRP_create_verifier_ex() 622 const BIGNUM *N_bn = NULL, *g_bn = NULL; in SRP_create_verifier_ex() 623 BIGNUM *N_bn_alloc = NULL, *g_bn_alloc = NULL, *s = NULL, *v = NULL; in SRP_create_verifier_ex() 630 (pass == NULL) || (salt == NULL) || (verifier == NULL)) in SRP_create_verifier_ex() 695 vf = NULL; in SRP_create_verifier_ex() [all …]
|
/openssl/apps/lib/ |
H A D | cmp_mock_srv.c | 208 if (ctx == NULL || req == NULL) { in delayed_delivery() 279 if (ctx == NULL || cert_req == NULL in process_cert_request() 280 || certOut == NULL || chainOut == NULL || caPubs == NULL) { in process_cert_request() 389 if (ctx == NULL || rr == NULL) { in process_rr() 470 rsp = OSSL_CMP_ITAV_new_rootCaKeyUpdate(NULL, NULL, NULL); in process_genm_itav() 547 if (ctx == NULL || genm == NULL || in == NULL || out == NULL) { in process_genm() 585 if (ctx == NULL || error == NULL) { in process_error() 629 if (ctx == NULL || certConf == NULL || certHash == NULL) { in process_certConf() 640 if ((digest = X509_digest_sig(ctx->certOut, NULL, NULL)) == NULL) in process_certConf() 661 if (ctx == NULL || pollReq == NULL in process_pollReq() [all …]
|
/openssl/crypto/x509/ |
H A D | x_pubkey.c | 253 NULL, 254 NULL, 257 NULL, 327 if (x == NULL || pkey == NULL) { in X509_PUBKEY_set() 495 X509_PUBKEY *xpk, *xpk2 = NULL, **pxpk = NULL; in d2i_PUBKEY_int() 506 if (libctx != NULL || propq != NULL || force_legacy) { in d2i_PUBKEY_int() 548 return d2i_PUBKEY_ex(a, pp, length, NULL, NULL); in d2i_PUBKEY() 764 if (p == NULL || q == NULL || g == NULL) { in ossl_d2i_DSA_PUBKEY() 1058 if (a == NULL || b == NULL) in X509_PUBKEY_eq() 1060 if (!X509_PUBKEY_get0_param(NULL, NULL, NULL, &algA, a) || algA == NULL in X509_PUBKEY_eq() [all …]
|
/openssl/apps/ |
H A D | cmp.c | 973 n = a2i_GENERAL_NAME(NULL, NULL, NULL, GEN_IPADD, names, 0); in set_gennames() 975 n = a2i_GENERAL_NAME(NULL, NULL, NULL, in set_gennames() 1506 if (opt_ref == NULL && opt_cert == NULL && opt_subject == NULL) { in setup_protection_ctx() 1511 if (opt_secret == NULL && ((opt_cert == NULL) != (opt_key == NULL))) { in setup_protection_ctx() 1546 if (opt_secret == NULL && opt_srvcert == NULL && opt_trusted == NULL) in setup_protection_ctx() 1668 && opt_csr == NULL && opt_oldcert == NULL && opt_cert == NULL in setup_request_ctx() 1676 && opt_key == NULL && opt_csr == NULL && opt_oldcert == NULL) { in setup_request_ctx() 1794 if (opt_recipient == NULL && opt_srvcert == NULL && opt_issuer == NULL in setup_request_ctx() 1868 X509V3_set_ctx(&ext_ctx, NULL, NULL, csr, NULL, X509V3_CTX_REPLACE); in setup_request_ctx() 1966 if (ctx == NULL || name == NULL) in add_certProfile() [all …]
|
H A D | ocsp.c | 212 BIO *acbio = NULL, *cbio = NULL, *derbio = NULL, *out = NULL; in ocsp_main() 226 X509 *issuer = NULL, *cert = NULL; in ocsp_main() 232 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() 234 char *host = NULL, *port = NULL, *path = "/", *outfile = NULL; in ocsp_main() 239 char *rca_filename = NULL, *reqin = NULL, *respin = NULL; in ocsp_main() 240 char *reqout = NULL, *respout = NULL, *ridx_filename = NULL; in ocsp_main() 245 char *thost = NULL, *tport = NULL, *tpath = NULL; in ocsp_main() 552 if (req == NULL && reqin == NULL in ocsp_main() 608 && (rkey == NULL || rsigner == NULL || rca_certs == NULL)) { in ocsp_main() 1070 OCSP_id_get0_info(NULL, &cert_id_md_oid, NULL, NULL, cid); in make_ocsp_response() [all …]
|
H A D | ts.c | 128 {NULL} 155 NULL, 164 const char *section = NULL, *digestname = NULL; in ts_main() 167 char *data = NULL, *digest = NULL, *policy = NULL; in ts_main() 168 char *in = NULL, *out = NULL, *queryfile = NULL, *passin = NULL; in ts_main() 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() 307 !app_passwd(passin, NULL, &password, NULL)) { in ts_main() 321 if ((data != NULL) && (digest != NULL)) in ts_main() 328 if ((in != NULL) && (queryfile != NULL)) in ts_main() 670 if ((token = d2i_PKCS7_bio(in_bio, NULL)) == NULL) in read_PKCS7() [all …]
|
H A D | cms.c | 283 BIO *in = NULL, *out = NULL, *indata = NULL, *rctin = NULL; in cms_main() 293 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() 296 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() 297 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() 298 char *certsoutfile = NULL, *digestname = NULL, *wrapname = NULL; in cms_main() 303 char *infile = NULL, *outfile = NULL, *rctfile = NULL; in cms_main() 304 char *passinarg = NULL, *passin = NULL, *signerfile = NULL; in cms_main() 305 char *originatorfile = NULL, *recipfile = NULL, *ciphername = NULL; in cms_main() 306 char *to = NULL, *from = NULL, *subject = NULL, *prog; in cms_main() 1024 NULL, NULL, NULL)) in cms_main() [all …]
|
/openssl/engines/ |
H A D | e_loader_attic.c | 205 if (new_pem_name != NULL && data->pem_name == NULL) { in new_EMBEDDED() 314 if ((p12 = d2i_PKCS12(NULL, &blob, len)) != NULL) { in try_decode_PKCS12() 350 && (pkey = NULL) == NULL in try_decode_PKCS12() 359 && (cert = NULL) == NULL in try_decode_PKCS12() 455 if ((p8 = d2i_X509_SIG(NULL, &blob, len)) == NULL) in try_decode_PKCS8Encrypted() 480 p8 = NULL; in try_decode_PKCS8Encrypted() 535 && EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, in try_decode_PrivateKey() 654 if ((pkey = d2i_PUBKEY(NULL, &blob, len)) != NULL) { in try_decode_PUBKEY() 690 && EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, in try_decode_params() 1149 NULL, NULL, NULL); in file_find() [all …]
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 94 if (crm == NULL || crm->certReq == NULL || ctrl == NULL) { in OSSL_CRMF_MSG_push0_regCtrl() 145 if (pi == NULL || spi == NULL) { in OSSL_CRMF_MSG_PKIPublicationInfo_push0_SinglePubInfo() 182 if (issuer == NULL || serial == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC() 220 if (crm == NULL || ri == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC() 249 if (crm == NULL || crm->certReq == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC() 277 if (crm == NULL || crm->certReq == NULL || crm->certReq->certReqId == NULL) { in OSSL_CRMF_MSG_set_certReqId() 370 if (ps == NULL || cr == NULL || pkey == NULL) { in create_popo_signature() 560 return tmpl != NULL ? tmpl->subject : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_subject() 566 return tmpl != NULL ? tmpl->issuer : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_issuer() 640 if (ecert == NULL || ecert->symmAlg == NULL || ecert->encSymmKey == NULL in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() [all …]
|
/openssl/crypto/ |
H A D | context.c | 77 if (ctx == NULL) in ossl_lib_ctx_is_child() 363 if (ctx == NULL) in context_deinit() 415 return NULL; in get_thread_default_context() 444 ctx = NULL; in OSSL_LIB_CTX_new() 455 if (ctx == NULL) in OSSL_LIB_CTX_new_from_dispatch() 456 return NULL; in OSSL_LIB_CTX_new_from_dispatch() 460 return NULL; in OSSL_LIB_CTX_new_from_dispatch() 471 if (ctx == NULL) in OSSL_LIB_CTX_new_child() 472 return NULL; in OSSL_LIB_CTX_new_child() 476 return NULL; in OSSL_LIB_CTX_new_child() [all …]
|
/openssl/crypto/rand/ |
H A D | rand_lib.c | 92 if (meth != NULL && meth->cleanup != NULL) in ossl_rand_cleanup_int() 195 return NULL; in RAND_get_rand_method() 264 if (meth != NULL && meth->seed != NULL) { in RAND_seed() 281 if (meth != NULL && meth->add != NULL) { in RAND_add() 302 if (meth != NULL && meth->pseudorand != NULL) in RAND_pseudo_bytes() 319 if ((rand = RAND_get0_primary(NULL)) == NULL) in RAND_status() 328 return NULL; in RAND_get_rand_method() 489 return NULL; in ossl_rand_ctx_new() 620 if (!EVP_RAND_instantiate(ctx, 0, 0, NULL, 0, NULL)) { in rand_new_seed() 634 return NULL; in rand_new_seed() [all …]
|
/openssl/crypto/evp/ |
H A D | p_lib.c | 246 void *keydata1 = NULL, *keydata2 = NULL, *tmp_keydata = NULL; in evp_pkey_cmp_any() 285 if (tmp_keydata == NULL && keymgmt1 != NULL && keymgmt1->match != NULL) { in evp_pkey_cmp_any() 347 if (a == NULL || b == NULL) in EVP_PKEY_eq() 414 if (e == NULL && ameth == NULL) { in new_raw_key_int() 510 return new_raw_key_int(NULL, NULL, NULL, type, e, priv, len, 1); in EVP_PKEY_new_raw_private_key() 525 return new_raw_key_int(NULL, NULL, NULL, type, e, pub, len, 0); in EVP_PKEY_new_raw_public_key() 684 return new_cmac_key_int(priv, len, NULL, cipher, NULL, NULL, e); in EVP_PKEY_new_CMAC_key() 689 return pkey_set_type(pkey, NULL, type, NULL, -1, NULL); in EVP_PKEY_set_type() 1505 ENGINE **eptr = (e == NULL) ? &e : NULL; in pkey_set_type() 1551 if (pkey == NULL && eptr != NULL) in pkey_set_type() [all …]
|
/openssl/providers/implementations/keymgmt/ |
H A D | ec_kmgmt.c | 89 return NULL; in ec_query_operation_name() 101 return NULL; in sm2_query_operation_name() 118 BIGNUM *x = NULL, *y = NULL; in key_to_params() 134 OSSL_PARAM *p = NULL, *px = NULL, *py = NULL; in key_to_params() 151 if (p != NULL || tmpl != NULL) { in key_to_params() 163 if (px != NULL || py != NULL) { in key_to_params() 348 ok = ok && group_a != NULL && group_b != NULL in ec_match() 357 if (pa != NULL && pb != NULL) { in ec_match() 367 if (pa != NULL && pb != NULL) { in ec_match() 458 unsigned char *pub_key = NULL, *genbuf = NULL; in ec_export() [all …]
|
/openssl/test/testutil/ |
H A D | tests.c | 34 if (left != NULL && right != NULL) in test_fail_message_prefix() 104 test_fail_message_va("INFO", NULL, -1, NULL, NULL, NULL, NULL, desc, ap); in test_info_c90() 113 test_fail_message_va("INFO", file, line, NULL, NULL, NULL, NULL, desc, ap); in test_info() 122 test_fail_message_va(NULL, NULL, -1, NULL, NULL, NULL, NULL, desc, ap); in test_error_c90() 132 test_fail_message_va(NULL, file, line, NULL, NULL, NULL, NULL, desc, ap); in test_error() 165 test_fail_message_va("SKIP", file, line, NULL, NULL, NULL, NULL, desc, ap); in test_skip() 175 test_fail_message_va("SKIP", NULL, -1, NULL, NULL, NULL, NULL, desc, ap); in test_skip_c90() 280 if (s1 == NULL && s2 == NULL) in test_str_eq() 294 if ((s1 == NULL) ^ (s2 == NULL)) in test_str_ne() 308 if (s1 == NULL && s2 == NULL) in test_strn_eq() [all …]
|
/openssl/crypto/dso/ |
H A D | dso_lib.c | 18 if (ret == NULL) in DSO_new_method() 19 return NULL; in DSO_new_method() 25 return NULL; in DSO_new_method() 31 return NULL; in DSO_new_method() 36 ret = NULL; in DSO_new_method() 155 return NULL; in DSO_load() 162 if ((dso == NULL) || (symname == NULL)) { in DSO_bind_func() 209 if ((dso->meth == NULL) || (dso->meth->dso_ctrl == NULL)) { in DSO_ctrl() 229 if ((dso == NULL) || (filename == NULL)) { in DSO_set_filename() 250 if (dso == NULL || filespec1 == NULL) { in DSO_merge() [all …]
|