/openssl/test/ |
H A D | pkcs12_format_test.c | 339 start_pkcs12(pb); in test_single_cert_no_attrs() 347 end_pkcs12(pb); in test_single_cert_no_attrs() 374 start_pkcs12(pb); in test_single_key() 382 end_pkcs12(pb); in test_single_key() 439 start_pkcs12(pb); in test_single_key_with_attrs() 447 end_pkcs12(pb); in test_single_key_with_attrs() 474 start_pkcs12(pb); in test_single_cert_mac() 536 start_pkcs12(pb); in test_cert_key_with_attrs_and_mac() 567 start_pkcs12(pb); in test_cert_key_encrypted_content() 599 start_pkcs12(pb); in test_single_secret_encrypted_content() [all …]
|
H A D | bio_dgram_test.c | 25 void *pa, *pb; in compare_addr() local 33 pb = &xb; in compare_addr() 39 pb = &xb6; in compare_addr() 52 if (!TEST_int_eq(BIO_ADDR_rawaddress(b, pb, &tmplen), 1)) in compare_addr() 55 if (!TEST_mem_eq(pa, slen, pb, slen)) in compare_addr()
|
H A D | smcont.bin | 10 ��ֻ۟Q!���,� 52�3e�$-�oW i���aQ���S.����2b�O��#�{=cɥ�2��7N_�FT�;+JV�'�R�oz�̐8��N�>w֬�1q�?�ɲ3pb…
|
/openssl/test/helpers/ |
H A D | pkcs12.c | 110 pb->success = 1; in new_pkcs12_builder() 111 return pb; in new_pkcs12_builder() 118 OPENSSL_free(pb); in end_pkcs12_builder() 125 pb->safes = NULL; in start_pkcs12() 281 if (pb->success && pb->bags != NULL) { in end_contentinfo() 292 if (pb->success && pb->bags != NULL) { in end_contentinfo_encrypted() 559 bag = sk_PKCS12_SAFEBAG_value(pb->bags, pb->bag_idx++); in check_certbag() 595 bag = sk_PKCS12_SAFEBAG_value(pb->bags, pb->bag_idx++); in check_keybag() 653 bag = sk_PKCS12_SAFEBAG_value(pb->bags, pb->bag_idx++); in check_secretbag() 762 pb->bags = decode_contentinfo(pb->safes, pb->safe_idx++, NULL); in start_check_contentinfo() [all …]
|
H A D | pkcs12.h | 68 int end_pkcs12_builder(PKCS12_BUILDER *pb); 71 void start_pkcs12(PKCS12_BUILDER *pb); 72 void end_pkcs12(PKCS12_BUILDER *pb); 75 void start_contentinfo(PKCS12_BUILDER *pb); 76 void end_contentinfo(PKCS12_BUILDER *pb); 85 void add_extra_attr(PKCS12_BUILDER *pb); 88 void start_check_pkcs12(PKCS12_BUILDER *pb); 90 void start_check_pkcs12_file(PKCS12_BUILDER *pb); 92 void end_check_pkcs12(PKCS12_BUILDER *pb); 94 void start_check_contentinfo(PKCS12_BUILDER *pb); [all …]
|
/openssl/crypto/asn1/ |
H A D | a_int.c | 102 unsigned char *p, pb = 0; in i2c_ibuf() local 109 pb = 0; in i2c_ibuf() 111 pb = 0xFF; in i2c_ibuf() 121 pb = pad != 0 ? 0xffU : 0; in i2c_ibuf() 122 pad = pb & 1; in i2c_ibuf() 139 *p = pb; in i2c_ibuf() 142 twos_complement(p, b, blen, pb); in i2c_ibuf()
|
H A D | a_d2i_fp.c | 109 int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb) in asn1_d2i_read_bio() argument 250 *pb = b; in asn1_d2i_read_bio()
|
/openssl/providers/implementations/keymgmt/ |
H A D | rsa_kmgmt.c | 151 const BIGNUM *pb = RSA_get0_n(rsa2); in rsa_match() local 153 if (pa != NULL && pb != NULL) { in rsa_match() 154 ok = ok && BN_cmp(pa, pb) == 0; in rsa_match() 161 const BIGNUM *pb = RSA_get0_d(rsa2); in rsa_match() local 163 if (pa != NULL && pb != NULL) { in rsa_match() 164 ok = ok && BN_cmp(pa, pb) == 0; in rsa_match()
|
H A D | dsa_kmgmt.c | 166 const BIGNUM *pb = DSA_get0_pub_key(dsa2); in dsa_match() local 168 if (pa != NULL && pb != NULL) { in dsa_match() 169 ok = ok && BN_cmp(pa, pb) == 0; in dsa_match() 176 const BIGNUM *pb = DSA_get0_priv_key(dsa2); in dsa_match() local 178 if (pa != NULL && pb != NULL) { in dsa_match() 179 ok = ok && BN_cmp(pa, pb) == 0; in dsa_match()
|
H A D | dh_kmgmt.c | 163 const BIGNUM *pb = DH_get0_pub_key(dh2); in dh_match() local 165 if (pa != NULL && pb != NULL) { in dh_match() 166 ok = ok && BN_cmp(pa, pb) == 0; in dh_match() 173 const BIGNUM *pb = DH_get0_priv_key(dh2); in dh_match() local 175 if (pa != NULL && pb != NULL) { in dh_match() 176 ok = ok && BN_cmp(pa, pb) == 0; in dh_match()
|
H A D | ecx_kmgmt.c | 164 const unsigned char *pb = key2->haspubkey ? key2->pubkey : NULL; in ecx_match() local 168 if (pa != NULL && pb != NULL) { in ecx_match() 172 && CRYPTO_memcmp(pa, pb, pal) == 0; in ecx_match() 179 const unsigned char *pb = key2->privkey; in ecx_match() local 183 if (pa != NULL && pb != NULL) { in ecx_match() 187 && CRYPTO_memcmp(pa, pb, pal) == 0; in ecx_match()
|
H A D | ec_kmgmt.c | 355 const EC_POINT *pb = EC_KEY_get0_public_key(ec2); in ec_match() local 357 if (pa != NULL && pb != NULL) { in ec_match() 358 ok = ok && EC_POINT_cmp(group_b, pa, pb, ctx) == 0; in ec_match() 365 const BIGNUM *pb = EC_KEY_get0_private_key(ec2); in ec_match() local 367 if (pa != NULL && pb != NULL) { in ec_match() 368 ok = ok && BN_cmp(pa, pb) == 0; in ec_match()
|
/openssl/include/internal/ |
H A D | asn1.h | 16 int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb);
|
/openssl/crypto/ec/ |
H A D | ec_ameth.c | 136 *pb = EC_KEY_get0_public_key(b->pkey.ec); in eckey_pub_cmp() local 138 if (group == NULL || pa == NULL || pb == NULL) in eckey_pub_cmp() 140 r = EC_POINT_cmp(group, pa, pb, NULL); in eckey_pub_cmp()
|
H A D | ec_lib.c | 1547 const OSSL_PARAM *pa, *pb; in EC_GROUP_new_from_params() local 1623 pb = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_EC_B); in EC_GROUP_new_from_params() 1624 if (!OSSL_PARAM_get_BN(pb, &b)) { in EC_GROUP_new_from_params()
|