Home
last modified time | relevance | path

Searched refs:good (Results 1 – 25 of 42) sorted by relevance

12

/openssl/test/recipes/
H A D15-test_genrsa.t45 my $good = 11; # Log2 of number of bits (2 << 11 == 2048)
47 while ($good > $bad + 1) {
48 my $checked = int(($good + $bad + 1) / 2);
56 $good = $checked;
62 $good++ if $good == $bad;
63 $good = 2 ** $good;
64 note "Found lowest allowed amount of bits to be $good";
68 '-pkeyopt', "rsa_keygen_bits:$good",
70 "genpkey $good");
97 "genrsa -3 $good");
[all …]
/openssl/ssl/record/methods/
H A Dtls_pad.c33 size_t good,
62 size_t good; in ssl3_cbc_remove_padding_and_mac() local
74 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac()
75 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac()
78 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac()
107 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local
150 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac()
157 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac()
158 *reclen -= good & (padding_length + 1); in tls1_cbc_remove_padding_and_mac()
189 size_t good, in ssl3_cbc_copy_mac() argument
[all …]
/openssl/test/ssl-tests/
H A D15-certstatus.cnf5 test-0 = 0-certstatus-good
9 [0-certstatus-good]
10 ssl_conf = 0-certstatus-good-ssl
12 [0-certstatus-good-ssl]
13 server = 0-certstatus-good-server
14 client = 0-certstatus-good-client
16 [0-certstatus-good-server]
21 [0-certstatus-good-client]
29 server = 0-certstatus-good-server-extra
31 [0-certstatus-good-server-extra]
H A D16-dtls-certstatus.cnf5 test-0 = 0-certstatus-good
9 [0-certstatus-good]
10 ssl_conf = 0-certstatus-good-ssl
12 [0-certstatus-good-ssl]
13 server = 0-certstatus-good-server
14 client = 0-certstatus-good-client
16 [0-certstatus-good-server]
21 [0-certstatus-good-client]
29 server = 0-certstatus-good-server-extra
31 [0-certstatus-good-server-extra]
H A D16-dtls-certstatus.cnf.in24 name => "certstatus-good",
59 name => "certstatus-good",
H A D15-certstatus.cnf.in20 name => "certstatus-good",
/openssl/test/
H A Dpkey_meth_test.c26 int good = 1; in test_asn1_meths() local
34 good = 0; in test_asn1_meths()
38 if (!good) { in test_asn1_meths()
50 return good; in test_asn1_meths()
59 int good = 1; in test_pkey_meths() local
67 good = 0; in test_pkey_meths()
71 if (!good) { in test_pkey_meths()
79 return good; in test_pkey_meths()
H A Dx509_internal_test.c32 int prev = -1, good = 1; in test_standard_exts() local
38 good = 0; in test_standard_exts()
42 if (!good) { in test_standard_exts()
48 return good; in test_standard_exts()
153 int good = 1; in test_a2i_ipaddress() local
160 good = 0; in test_a2i_ipaddress()
168 good = 0; in test_a2i_ipaddress()
172 return good; in test_a2i_ipaddress()
H A Dcmp_msg_test.c72 int good = fixture->expected != 0 ? \
78 return good; \
H A DREADME-external.md44 krb5's master has to pass this same CI, but a known-good version is
/openssl/crypto/rsa/
H A Drsa_pk1.c210 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2()
211 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2()
240 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2()
272 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2()
411 unsigned int good, found_zero_byte; in ossl_rsa_padding_check_PKCS1_type_2() local
469 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2()
470 good &= constant_time_eq(from[1], 2); in ossl_rsa_padding_check_PKCS1_type_2()
553 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local
577 good &= constant_time_eq(from[1], 2); in ossl_rsa_padding_check_PKCS1_type_2_TLS()
622 good &= version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS()
[all …]
H A Drsa_oaep.c175 unsigned int good = 0, found_one_byte, mask; in RSA_padding_check_PKCS1_OAEP_mgf1() local
253 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_OAEP_mgf1()
271 good &= constant_time_is_zero(CRYPTO_memcmp(db, phash, mdlen)); in RSA_padding_check_PKCS1_OAEP_mgf1()
283 good &= (found_one_byte | equals0); in RSA_padding_check_PKCS1_OAEP_mgf1()
286 good &= found_one_byte; in RSA_padding_check_PKCS1_OAEP_mgf1()
299 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1()
319 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1()
333 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_OAEP_mgf1()
340 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
/openssl/external/perl/Text-Template-1.56/t/
H A Dwarnings.t34 my $result = $template->fill_in(HASH => { good => 'good' });
/openssl/demos/sslecho/
H A DA-SSL-Docs.txt13 Generate self signed cert and key 'pem' files (good for 10 years):
/openssl/doc/designs/quic-design/
H A Dquic-connID-retire.md43 * Retransmits use different route, so they are good.
50 * May respond with a new connection ID frame (it's a good idea)
H A Ddebugging.md26 Both of these approaches have good GUI visualisation tools available for viewing
/openssl/crypto/ocsp/
H A Docsp_local.h129 ASN1_NULL *good; member
H A Docsp_asn.c86 ASN1_IMP(OCSP_CERTSTATUS, value.good, ASN1_NULL, 0),
H A Docsp_srv.c135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
/openssl/doc/man3/
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
H A DOPENSSL_secure_malloc.pod47 It is a good idea to review the code and see if it addresses your
H A DBF_encrypt.pod45 considered good for strong encryption. Blowfish can be used in the same
/openssl/doc/internal/man3/
H A DOPENSSL_SA.pod36 POD is pretty good at recognising function names and making them appropriately
/openssl/doc/designs/ddd/
H A DREADME.md15 As such, it is useful for the OpenSSL project to have a good understanding of
/openssl/exporters/cmake/
H A DOpenSSLConfig.cmake.in66 # All targets are defined, we're good, just undo everything and return

Completed in 28 milliseconds

12