Home
last modified time | relevance | path

Searched refs:good (Results 1 – 25 of 42) sorted by relevance

12

/openssl/test/recipes/
H A D15-test_genrsa.t45 my $good = 11; # Log2 of number of bits (2 << 11 == 2048)
47 while ($good > $bad + 1) {
48 my $checked = int(($good + $bad + 1) / 2);
56 $good = $checked;
62 $good++ if $good == $bad;
63 $good = 2 ** $good;
64 note "Found lowest allowed amount of bits to be $good";
68 '-pkeyopt', "rsa_keygen_bits:$good",
70 "genpkey $good");
97 "genrsa -3 $good");
[all …]
/openssl/test/ssl-tests/
H A D31-quic.cnf5 test-0 = 0-certstatus-good
8 [0-certstatus-good]
9 ssl_conf = 0-certstatus-good-ssl
11 [0-certstatus-good-ssl]
12 server = 0-certstatus-good-server
13 client = 0-certstatus-good-client
15 [0-certstatus-good-server]
20 [0-certstatus-good-client]
H A D15-certstatus.cnf5 test-0 = 0-certstatus-good
9 [0-certstatus-good]
10 ssl_conf = 0-certstatus-good-ssl
12 [0-certstatus-good-ssl]
13 server = 0-certstatus-good-server
14 client = 0-certstatus-good-client
16 [0-certstatus-good-server]
21 [0-certstatus-good-client]
29 server = 0-certstatus-good-server-extra
31 [0-certstatus-good-server-extra]
H A D16-dtls-certstatus.cnf5 test-0 = 0-certstatus-good
9 [0-certstatus-good]
10 ssl_conf = 0-certstatus-good-ssl
12 [0-certstatus-good-ssl]
13 server = 0-certstatus-good-server
14 client = 0-certstatus-good-client
16 [0-certstatus-good-server]
21 [0-certstatus-good-client]
29 server = 0-certstatus-good-server-extra
31 [0-certstatus-good-server-extra]
H A D16-dtls-certstatus.cnf.in24 name => "certstatus-good",
59 name => "certstatus-good",
H A D31-quic.cnf.in20 name => "certstatus-good",
H A D15-certstatus.cnf.in20 name => "certstatus-good",
/openssl/ssl/record/
H A Dtls_pad.c31 size_t good,
77 size_t good; in ssl3_cbc_remove_padding_and_mac() local
89 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac()
90 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac()
93 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac()
122 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local
165 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac()
172 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac()
173 *reclen -= good & (padding_length + 1); in tls1_cbc_remove_padding_and_mac()
204 size_t good, in ssl3_cbc_copy_mac() argument
[all …]
/openssl/test/
H A Dpkey_meth_test.c26 int good = 1; in test_asn1_meths() local
34 good = 0; in test_asn1_meths()
38 if (!good) { in test_asn1_meths()
50 return good; in test_asn1_meths()
59 int good = 1; in test_pkey_meths() local
67 good = 0; in test_pkey_meths()
71 if (!good) { in test_pkey_meths()
79 return good; in test_pkey_meths()
H A Dx509_internal_test.c32 int prev = -1, good = 1; in test_standard_exts() local
38 good = 0; in test_standard_exts()
42 if (!good) { in test_standard_exts()
48 return good; in test_standard_exts()
83 int good = 1; in test_a2i_ipaddress() local
90 good = 0; in test_a2i_ipaddress()
98 good = 0; in test_a2i_ipaddress()
102 return good; in test_a2i_ipaddress()
H A Dcmp_msg_test.c72 int good = fixture->expected != 0 ? \
78 return good; \
H A DREADME-external.md44 krb5's master has to pass this same CI, but a known-good version is
/openssl/crypto/rsa/
H A Drsa_pk1.c174 unsigned int good, found_zero_byte, mask; in RSA_padding_check_PKCS1_type_2() local
208 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2()
209 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2()
226 good &= constant_time_ge(zero_index, 2 + 8); in RSA_padding_check_PKCS1_type_2()
238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2()
270 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2()
303 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local
326 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
327 good &= constant_time_eq(from[1], 2); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
372 good &= version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS()
[all …]
H A Drsa_oaep.c165 unsigned int good = 0, found_one_byte, mask; in RSA_padding_check_PKCS1_OAEP_mgf1() local
235 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_OAEP_mgf1()
253 good &= constant_time_is_zero(CRYPTO_memcmp(db, phash, mdlen)); in RSA_padding_check_PKCS1_OAEP_mgf1()
265 good &= (found_one_byte | equals0); in RSA_padding_check_PKCS1_OAEP_mgf1()
268 good &= found_one_byte; in RSA_padding_check_PKCS1_OAEP_mgf1()
281 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1()
301 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1()
315 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_OAEP_mgf1()
322 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
/openssl/external/perl/Text-Template-1.56/t/
H A Dwarnings.t34 my $result = $template->fill_in(HASH => { good => 'good' });
/openssl/demos/sslecho/
H A DA-SSL-Docs.txt13 Generate self signed cert and key 'pem' files (good for 10 years):
/openssl/crypto/ocsp/
H A Docsp_local.h129 ASN1_NULL *good; member
H A Docsp_asn.c86 ASN1_IMP(OCSP_CERTSTATUS, value.good, ASN1_NULL, 0),
H A Docsp_srv.c135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
/openssl/doc/man3/
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
H A DSSL_shutdown.pod20 a currently open session is considered closed and good and will be kept in the
95 SSL_SENT_SHUTDOWN flag (so that the session is considered good and will
H A DOPENSSL_secure_malloc.pod47 It is a good idea to review the code and see if it addresses your
H A DBF_encrypt.pod45 considered good for strong encryption. Blowfish can be used in the same
/openssl/doc/internal/man3/
H A DOPENSSL_SA.pod36 POD is pretty good at recognising function names and making them appropriately
/openssl/doc/designs/ddd/
H A DREADME.md15 As such, it is useful for the OpenSSL project to have a good understanding of

Completed in 58 milliseconds

12