/openssl/crypto/async/ |
H A D | async_wait.c | 33 curr->cleanup(ctx, curr->key, curr->fd, curr->custom_data); in ASYNC_WAIT_CTX_free() 75 curr = curr->next; in ASYNC_WAIT_CTX_get_fd() 83 curr = curr->next; in ASYNC_WAIT_CTX_get_fd() 98 curr = curr->next; in ASYNC_WAIT_CTX_get_all_fds() 106 curr = curr->next; in ASYNC_WAIT_CTX_get_all_fds() 126 if (curr->del && !curr->add && (delfd != NULL)) { in ASYNC_WAIT_CTX_get_changed_fds() 130 if (curr->add && !curr->del && (addfd != NULL)) { in ASYNC_WAIT_CTX_get_changed_fds() 134 curr = curr->next; in ASYNC_WAIT_CTX_get_changed_fds() 150 curr = curr->next; in ASYNC_WAIT_CTX_clear_fd() 180 curr = curr->next; in ASYNC_WAIT_CTX_clear_fd() [all …]
|
/openssl/crypto/x509/ |
H A D | pcy_tree.c | 46 if (!curr) in tree_print() 49 curr++; in tree_print() 393 nodes = curr->nodes; in tree_prune() 407 --curr; in tree_prune() 408 nodes = curr->nodes; in tree_prune() 417 if (curr->anyPolicy && !curr->anyPolicy->nchild) { in tree_prune() 466 X509_POLICY_LEVEL *curr; in tree_calculate_authority_set() local 473 if (curr->anyPolicy) { in tree_calculate_authority_set() 481 curr = tree->levels; in tree_calculate_authority_set() 489 curr++; in tree_calculate_authority_set() [all …]
|
H A D | x509_vfy.c | 3077 X509 *curr, *issuer = NULL; in build_chain() local 3115 curr = sk_X509_value(ctx->chain, i - 1); in build_chain() 3118 ok = num > max_depth ? 0 : get1_trusted_issuer(&issuer, ctx, curr); in build_chain() 3127 int self_signed = X509_self_signed(curr, 0); in build_chain() 3183 if (X509_cmp(curr, issuer) != 0) { in build_chain() 3192 X509_free(curr); in build_chain() 3250 curr = sk_X509_value(ctx->chain, num - 1); in build_chain() 3251 issuer = (X509_self_signed(curr, 0) > 0 || num > max_depth) ? in build_chain() 3252 NULL : find_issuer(ctx, sk_untrusted, curr); in build_chain()
|
/openssl/include/internal/ |
H A D | packet.h | 25 const unsigned char *curr; member 33 pkt->curr += len; in packet_forward() 62 return pkt->curr; in PACKET_data() 78 pkt->curr = buf; in PACKET_buf_init() 86 pkt->curr = NULL; in PACKET_null_init() 359 *data = *pkt->curr; in PACKET_peek_1() 397 *data = *pkt->curr; in PACKET_peek_4() 433 *data = pkt->curr; in PACKET_peek_bytes() 590 subpkt->curr = data; in PACKET_get_length_prefixed_1() 613 subpkt->curr = data; in PACKET_as_length_prefixed_1() [all …]
|
/openssl/crypto/ |
H A D | initthread.c | 323 curr = *hands; in init_thread_stop() 324 while (curr != NULL) { in init_thread_stop() 326 prev = curr; in init_thread_stop() 327 curr = curr->next; in init_thread_stop() 330 curr->handfn(curr->arg); in init_thread_stop() 336 tmp = curr; in init_thread_stop() 337 curr = curr->next; in init_thread_stop() 428 curr = *hands; in init_thread_deregister() 436 curr = curr->next; in init_thread_deregister() 440 prev = curr; in init_thread_deregister() [all …]
|
H A D | packet.c | 22 pkt->curr += len; in WPACKET_allocate_bytes() 104 pkt->curr = 0; in wpacket_intern_init_len() 262 if ((pkt->curr - sub->lenbytes) == sub->packet_len) { in wpacket_intern_close() 264 pkt->curr -= sub->lenbytes; in wpacket_intern_close() 510 return buf + pkt->maxsize - pkt->curr; in WPACKET_get_curr() 512 return buf + pkt->curr; in WPACKET_get_curr()
|
H A D | provider_core.c | 1335 int ret = 0, curr, max, ref = 0; in ossl_provider_doall_activated() local 1369 for (curr = max - 1; curr >= 0; curr--) { in ossl_provider_doall_activated() 1370 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated() 1398 sk_OSSL_PROVIDER_delete(provs, curr); in ossl_provider_doall_activated() 1408 for (curr = 0; curr < max; curr++) { in ossl_provider_doall_activated() 1409 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated() 1412 curr = -1; in ossl_provider_doall_activated() 1416 curr = -1; in ossl_provider_doall_activated() 1429 for (curr++; curr < max; curr++) { in ossl_provider_doall_activated() 1430 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated()
|
/openssl/crypto/err/ |
H A D | err_prn.c | 76 const char *curr = txt, *next = txt; in ERR_add_error_txt() local 101 curr = NULL; /* no need to split */ in ERR_add_error_txt() 104 curr = next; /* will split at this point */ in ERR_add_error_txt() 108 curr = next; in ERR_add_error_txt() 109 next = strstr(curr, separator); in ERR_add_error_txt() 114 next = curr + strlen(curr); in ERR_add_error_txt() 118 curr = NULL; /* the above loop implies *next == '\0' */ in ERR_add_error_txt() 120 if (curr != NULL) { in ERR_add_error_txt() 122 if (curr != txt) { in ERR_add_error_txt() 123 tmp = OPENSSL_strndup(txt, curr - txt); in ERR_add_error_txt() [all …]
|
/openssl/ssl/ |
H A D | ssl_ciph.c | 650 curr->prev->next = curr->next; in ll_append_tail() 652 curr->next->prev = curr->prev; in ll_append_tail() 667 curr->next->prev = curr->prev; in ll_append_head() 669 curr->prev->next = curr->next; in ll_append_head() 851 next = reverse ? curr->prev : curr->next; in ssl_cipher_apply_rule() 927 curr->prev->next = curr->next; in ssl_cipher_apply_rule() 932 curr->next->prev = curr->prev; in ssl_cipher_apply_rule() 934 curr->prev->next = curr->next; in ssl_cipher_apply_rule() 963 curr = curr->next; in ssl_cipher_strength_sort() 979 curr = curr->next; in ssl_cipher_strength_sort() [all …]
|
H A D | pqueue.c | 55 pitem *curr, *next; in pqueue_insert() local 62 for (curr = NULL, next = pq->items; in pqueue_insert() 63 next != NULL; curr = next, next = next->next) { in pqueue_insert() 71 if (curr == NULL) in pqueue_insert() 74 curr->next = item; in pqueue_insert() 84 curr->next = item; in pqueue_insert()
|
H A D | t1_lib.c | 2641 const SIGALG_LOOKUP *curr; in tls1_set_sigalgs() local 2645 for (j = 0, curr = sigalg_lookup_tbl; j < OSSL_NELEM(sigalg_lookup_tbl); in tls1_set_sigalgs() 2646 j++, curr++) { in tls1_set_sigalgs() 2647 if (curr->hash == md_id && curr->sig == sig_id) { in tls1_set_sigalgs() 2648 *sptr++ = curr->sigalg; in tls1_set_sigalgs()
|
/openssl/test/ |
H A D | params_conversion_test.c | 63 TEST_info("Line %d: multiple type lines", s->curr); in param_conversion_load_stanza() 68 TEST_info("Line %d: unknown type line", s->curr); in param_conversion_load_stanza() 122 s->curr, p, pp->key); in param_conversion_load_stanza() 128 TEST_info("Line %d: type not found", s->curr); in param_conversion_load_stanza() 134 TEST_note("errant int32 on line %d", s->curr); in param_conversion_load_stanza() 143 TEST_note("errant int64 on line %d", s->curr); in param_conversion_load_stanza() 152 TEST_note("errant uint32 on line %d", s->curr); in param_conversion_load_stanza() 161 TEST_note("errant uint64 on line %d", s->curr); in param_conversion_load_stanza() 170 TEST_note("errant double on line %d", s->curr); in param_conversion_load_stanza() 178 TEST_error("type unknown at line %d", s->curr); in param_conversion_load_stanza() [all …]
|
H A D | bio_prefix_text.c | 108 BIO *curr = BIO_new(BIO_f_prefix()); in setup_bio_chain() local 110 if (curr == NULL) in setup_bio_chain() 112 chain[i] = BIO_push(curr, next); in setup_bio_chain()
|
H A D | tls13encryptiontest.c | 206 size_t outer, inner, curr = 0; in multihexstr2buf() local 233 outbuf[curr++] = (hi << 4) | lo; in multihexstr2buf()
|
H A D | evp_pkey_provided_test.c | 41 char *curr, *writ; in stripcr() local 43 for (i = *len, curr = buf, writ = buf; i > 0; i--, curr++) { in stripcr() 44 if (*curr == '\r') { in stripcr() 48 if (curr != writ) in stripcr() 49 *writ = *curr; in stripcr()
|
H A D | packettest.c | 557 if (!TEST_ptr_eq(pkt.curr, cases[i].buf)) in test_PACKET_get_quic_length_prefixed() 562 if (!TEST_ptr_eq(subpkt.curr, cases[i].buf + cases[i].enclen)) in test_PACKET_get_quic_length_prefixed()
|
H A D | evp_test.c | 429 printf("test %s (%d %d)\n", t->name, t->s.start, t->s.curr); in digest_test_run() 3845 TEST_info("Line %d: missing blank line\n", t->s.curr); in parse() 3875 t->s.curr); in parse() 3879 TEST_info("Line %d: multiple result lines", t->s.curr); in parse() 3887 TEST_info("Line %d: multiple reason lines", t->s.curr); in parse() 3896 TEST_info("Line %d: unknown keyword %s", t->s.curr, pp->key); in parse() 3901 t->s.curr, pp->key, pp->value); in parse()
|
H A D | sslapitest.c | 2984 const sigalgs_list *curr; in test_set_sigalgs() local 2992 curr = testctx ? &testsigalgs[idx] in test_set_sigalgs() 3005 if (curr->list != NULL) in test_set_sigalgs() 3006 ret = SSL_CTX_set1_sigalgs(cctx, curr->list, curr->listlen); in test_set_sigalgs() 3011 if (curr->valid) in test_set_sigalgs() 3017 if (!curr->valid) { in test_set_sigalgs() 3030 if (curr->list != NULL) in test_set_sigalgs() 3031 ret = SSL_set1_sigalgs(clientssl, curr->list, curr->listlen); in test_set_sigalgs() 3035 if (curr->valid) in test_set_sigalgs() 3041 if (!curr->valid) in test_set_sigalgs() [all …]
|
H A D | testutil.h | 541 int curr; /* Current line in file */ member
|
/openssl/test/testutil/ |
H A D | stanza.c | 54 s->curr++; in read_key() 93 s->curr++; in test_readstanza() 95 TEST_info("Line %d too long", s->curr); in test_readstanza() 110 TEST_info("Missing = at line %d\n", s->curr); in test_readstanza() 115 TEST_info("Empty field at line %d\n", s->curr); in test_readstanza() 122 TEST_info("Starting \"%s\" tests at line %d", value, s->curr); in test_readstanza() 127 s->start = s->curr; in test_readstanza()
|
/openssl/util/ |
H A D | check-format-test-negatives.c | 389 const char *curr = txt, *next = txt; in fun() local
|
H A D | check-format.pl | 369 my $curr = substr($str, $i); 370 if ($curr =~ m/^(.*?)([{}()?:;\[\]])(.*)$/) { # match from position $i the first {}()?:;[]
|
/openssl/ssl/quic/ |
H A D | quic_wire.c | 816 sub.curr = ossl_quic_wire_decode_transport_param_bytes(pkt, in ossl_quic_wire_decode_transport_param_int() 818 if (sub.curr == NULL) in ossl_quic_wire_decode_transport_param_int()
|
/openssl/apps/lib/ |
H A D | s_cb.c | 994 SSL_EXCERT *curr; in ssl_excert_free() local 1002 curr = exc; in ssl_excert_free() 1004 OPENSSL_free(curr); in ssl_excert_free()
|