/openssl/test/ |
H A D | sha_test.c | 20 unsigned char buf[EVP_MAX_MD_SIZE], *sbuf; in test_static_sha_common() local 24 sbuf = (*md)(in, in_len, buf); in test_static_sha_common() 25 if (!TEST_ptr(sbuf) in test_static_sha_common() 26 || !TEST_ptr_eq(sbuf, buf) in test_static_sha_common() 27 || !TEST_mem_eq(sbuf, length, out, length)) in test_static_sha_common() 29 sbuf = (*md)(in, in_len, NULL); in test_static_sha_common() 30 if (!TEST_ptr(sbuf) in test_static_sha_common() 31 || !TEST_ptr_ne(sbuf, buf) in test_static_sha_common() 32 || !TEST_mem_eq(sbuf, length, out, length)) in test_static_sha_common()
|
H A D | wpackettest.c | 70 unsigned char sbuf[3]; in test_WPACKET_init() local 118 if (!TEST_true(WPACKET_init_static_len(&pkt, sbuf, sizeof(sbuf), 0)) in test_WPACKET_init() 126 || !TEST_mem_eq(sbuf, written, fixed, sizeof(sbuf)) in test_WPACKET_init() 128 || !TEST_true(WPACKET_init_static_len(&pkt, sbuf, sizeof(sbuf), 1)) in test_WPACKET_init() 135 || !TEST_mem_eq(sbuf, written, alloc, sizeof(alloc))) in test_WPACKET_init() 387 unsigned char sbuf[1024]; in test_WPACKET_init_der() local 396 if (!TEST_true(WPACKET_init_der(&pkt, sbuf, sizeof(sbuf))) in test_WPACKET_init_der() 430 if (!TEST_true(WPACKET_init_der(&pkt, sbuf, sizeof(sbuf)))) in test_WPACKET_init_der()
|
H A D | prov_config_test.c | 76 struct stat sbuf; in test_path_config() local 91 rc = stat(full_path, &sbuf); in test_path_config()
|
H A D | ssl_old_test.c | 2109 char sbuf[1024 * 8]; in doit_localhost() local 2113 memset(sbuf, 0, sizeof(sbuf)); in doit_localhost() 2124 i = sizeof(sbuf); in doit_localhost() 2148 r = BIO_read(s_ssl_bio, sbuf, sizeof(sbuf)); in doit_localhost() 2388 char sbuf[1024 * 8]; in doit_biopair() local 2392 memset(sbuf, 0, sizeof(sbuf)); in doit_biopair() 2403 i = sizeof(sbuf); in doit_biopair() 2427 r = BIO_read(s_ssl_bio, sbuf, sizeof(sbuf)); in doit_biopair() 2611 char *cbuf = NULL, *sbuf = NULL; in doit() local 2822 i = BIO_write(s_bio, sbuf, j); in doit() [all …]
|
H A D | acvp_test.c | 239 unsigned char *rbuf = NULL, *sbuf = NULL; in get_ecdsa_sig_rs_bytes() local 254 sbuf = OPENSSL_zalloc(s1_len); in get_ecdsa_sig_rs_bytes() 255 if (rbuf == NULL || sbuf == NULL) in get_ecdsa_sig_rs_bytes() 259 if (BN_bn2binpad(s1, sbuf, s1_len) <= 0) in get_ecdsa_sig_rs_bytes() 262 *s = sbuf; in get_ecdsa_sig_rs_bytes() 269 OPENSSL_free(sbuf); in get_ecdsa_sig_rs_bytes() 762 sbuf = OPENSSL_zalloc(s1_len); in get_dsa_sig_rs_bytes() 763 if (rbuf == NULL || sbuf == NULL) in get_dsa_sig_rs_bytes() 767 if (BN_bn2binpad(s1, sbuf, s1_len) <= 0) in get_dsa_sig_rs_bytes() 770 *s = sbuf; in get_dsa_sig_rs_bytes() [all …]
|
H A D | sslapitest.c | 1035 unsigned char sbuf[16000]; in ping_pong_query() local 1060 while ((err = SSL_read(serverssl, &sbuf, sizeof(sbuf))) != sizeof(sbuf)) { in ping_pong_query() 1066 if (!TEST_true(SSL_write(serverssl, sbuf, sizeof(sbuf)) == sizeof(sbuf))) in ping_pong_query() 1081 if (!TEST_mem_eq(cbuf, sizeof(cbuf), sbuf, sizeof(sbuf))) in ping_pong_query() 1722 static unsigned char sbuf[16000]; in execute_cleanse_plaintext() local 1767 if (!TEST_int_eq(SSL_peek(serverssl, &sbuf, sizeof(sbuf)), sizeof(sbuf))) in execute_cleanse_plaintext() 1770 if (!TEST_mem_eq(cbuf, sizeof(cbuf), sbuf, sizeof(sbuf))) in execute_cleanse_plaintext() 1793 memset(sbuf, 0, sizeof(sbuf)); in execute_cleanse_plaintext() 1794 if (!TEST_int_eq(SSL_read(serverssl, &sbuf, sizeof(sbuf)), sizeof(sbuf))) in execute_cleanse_plaintext() 1797 if (!TEST_mem_eq(cbuf, sizeof(cbuf), sbuf, sizeof(cbuf))) in execute_cleanse_plaintext()
|
/openssl/providers/implementations/kem/ |
H A D | mlx_kem.c | 115 uint8_t *sbuf; in mlx_kem_encapsulate() local 169 sbuf = shsec + ml_kem_slot * key->xinfo->shsec_bytes; in mlx_kem_encapsulate() 173 || EVP_PKEY_encapsulate(ctx, cbuf, &encap_clen, sbuf, &encap_slen) <= 0) in mlx_kem_encapsulate() 222 sbuf = shsec + (1 - ml_kem_slot) * ML_KEM_SHARED_SECRET_BYTES; in mlx_kem_encapsulate() 227 || EVP_PKEY_derive(ctx, sbuf, &encap_slen) <= 0) in mlx_kem_encapsulate() 250 uint8_t *sbuf; in mlx_kem_decapsulate() local 289 sbuf = shsec + ml_kem_slot * key->xinfo->shsec_bytes; in mlx_kem_decapsulate() 293 || EVP_PKEY_decapsulate(ctx, sbuf, &decap_slen, cbuf, decap_clen) <= 0) in mlx_kem_decapsulate() 307 sbuf = shsec + (1 - ml_kem_slot) * ML_KEM_SHARED_SECRET_BYTES; in mlx_kem_decapsulate() 315 || EVP_PKEY_derive(ctx, sbuf, &decap_slen) <= 0) in mlx_kem_decapsulate()
|
/openssl/apps/ |
H A D | s_client.c | 988 sbuf = app_malloc(BUFSIZZ, "sbuf"); in s_client_main() 2399 BIO_read(sbio, sbuf, BUFSIZZ); in s_client_main() 2442 BIO_read(sbio, sbuf, BUFSIZZ); in s_client_main() 2463 BIO_read(sbio, sbuf, BUFSIZZ); in s_client_main() 2500 sbuf[seen] = '\0'; in s_client_main() 2501 if (!strstr(sbuf, "<proceed")) in s_client_main() 2789 strncpy(sbuf, mbuf, 2); in s_client_main() 2790 make_uppercase(sbuf); in s_client_main() 2791 if (!HAS_PREFIX(sbuf, "OK")) { in s_client_main() 3153 ascii2ebcdic(&(sbuf[sbuf_off]), &(sbuf[sbuf_off]), sbuf_len); in s_client_main() [all …]
|
/openssl/crypto/ml_kem/ |
H A D | ml_kem.c | 110 scalar sbuf[ML_KEM_##bits##_RANK]; \
|