/openssl/test/recipes/ |
H A D | 15-test_genrsa.t | 45 my $good = 11; # Log2 of number of bits (2 << 11 == 2048) 47 while ($good > $bad + 1) { 48 my $checked = int(($good + $bad + 1) / 2); 56 $good = $checked; 62 $good++ if $good == $bad; 63 $good = 2 ** $good; 64 note "Found lowest allowed amount of bits to be $good"; 68 '-pkeyopt', "rsa_keygen_bits:$good", 70 "genpkey $good"); 97 "genrsa -3 $good"); [all …]
|
/openssl/test/ssl-tests/ |
H A D | 31-quic.cnf | 5 test-0 = 0-certstatus-good 8 [0-certstatus-good] 9 ssl_conf = 0-certstatus-good-ssl 11 [0-certstatus-good-ssl] 12 server = 0-certstatus-good-server 13 client = 0-certstatus-good-client 15 [0-certstatus-good-server] 20 [0-certstatus-good-client]
|
H A D | 15-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
H A D | 16-dtls-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
H A D | 16-dtls-certstatus.cnf.in | 24 name => "certstatus-good", 59 name => "certstatus-good",
|
H A D | 31-quic.cnf.in | 20 name => "certstatus-good",
|
H A D | 15-certstatus.cnf.in | 20 name => "certstatus-good",
|
/openssl/ssl/record/ |
H A D | tls_pad.c | 31 size_t good, 77 size_t good; in ssl3_cbc_remove_padding_and_mac() local 89 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 90 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 93 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac() 122 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local 165 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac() 172 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac() 173 *reclen -= good & (padding_length + 1); in tls1_cbc_remove_padding_and_mac() 204 size_t good, in ssl3_cbc_copy_mac() argument [all …]
|
/openssl/test/ |
H A D | pkey_meth_test.c | 26 int good = 1; in test_asn1_meths() local 34 good = 0; in test_asn1_meths() 38 if (!good) { in test_asn1_meths() 50 return good; in test_asn1_meths() 59 int good = 1; in test_pkey_meths() local 67 good = 0; in test_pkey_meths() 71 if (!good) { in test_pkey_meths() 79 return good; in test_pkey_meths()
|
H A D | x509_internal_test.c | 32 int prev = -1, good = 1; in test_standard_exts() local 38 good = 0; in test_standard_exts() 42 if (!good) { in test_standard_exts() 48 return good; in test_standard_exts() 83 int good = 1; in test_a2i_ipaddress() local 90 good = 0; in test_a2i_ipaddress() 98 good = 0; in test_a2i_ipaddress() 102 return good; in test_a2i_ipaddress()
|
H A D | cmp_msg_test.c | 72 int good = fixture->expected != 0 ? \ 78 return good; \
|
H A D | README-external.md | 44 krb5's master has to pass this same CI, but a known-good version is
|
/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 174 unsigned int good, found_zero_byte, mask; in RSA_padding_check_PKCS1_type_2() local 208 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2() 209 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2() 226 good &= constant_time_ge(zero_index, 2 + 8); in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 270 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2() 303 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local 326 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2_TLS() 327 good &= constant_time_eq(from[1], 2); in ossl_rsa_padding_check_PKCS1_type_2_TLS() 372 good &= version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() [all …]
|
H A D | rsa_oaep.c | 165 unsigned int good = 0, found_one_byte, mask; in RSA_padding_check_PKCS1_OAEP_mgf1() local 235 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_OAEP_mgf1() 253 good &= constant_time_is_zero(CRYPTO_memcmp(db, phash, mdlen)); in RSA_padding_check_PKCS1_OAEP_mgf1() 265 good &= (found_one_byte | equals0); in RSA_padding_check_PKCS1_OAEP_mgf1() 268 good &= found_one_byte; in RSA_padding_check_PKCS1_OAEP_mgf1() 281 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 301 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 315 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_OAEP_mgf1() 322 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
/openssl/external/perl/Text-Template-1.56/t/ |
H A D | warnings.t | 34 my $result = $template->fill_in(HASH => { good => 'good' });
|
/openssl/demos/sslecho/ |
H A D | A-SSL-Docs.txt | 13 Generate self signed cert and key 'pem' files (good for 10 years):
|
/openssl/crypto/ocsp/ |
H A D | ocsp_local.h | 129 ASN1_NULL *good; member
|
H A D | ocsp_asn.c | 86 ASN1_IMP(OCSP_CERTSTATUS, value.good, ASN1_NULL, 0),
|
H A D | ocsp_srv.c | 135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
|
/openssl/doc/man3/ |
H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>,
|
H A D | SSL_shutdown.pod | 20 a currently open session is considered closed and good and will be kept in the 95 SSL_SENT_SHUTDOWN flag (so that the session is considered good and will
|
H A D | OPENSSL_secure_malloc.pod | 47 It is a good idea to review the code and see if it addresses your
|
H A D | BF_encrypt.pod | 45 considered good for strong encryption. Blowfish can be used in the same
|
/openssl/doc/internal/man3/ |
H A D | OPENSSL_SA.pod | 36 POD is pretty good at recognising function names and making them appropriately
|
/openssl/doc/designs/ddd/ |
H A D | README.md | 15 As such, it is useful for the OpenSSL project to have a good understanding of
|