Home
last modified time | relevance | path

Searched refs:check (Results 1 – 25 of 240) sorted by relevance

12345678910

/openssl/doc/designs/quic-design/
H A Dtx-packetiser.md263 | 0x00 | padding | ✓ | ✓ | ✓ | ✓ | ✓ | | &check
264 | 0x01 | ping | ✓ | ✓ | ✓ | ✓ | | | …
265 | 0x02 | ack 0x02 | ✓ | ✓ | | ✓ | ✓ | ✓ | …
266 | 0x03 | ack 0x03 | ✓ | ✓ | | ✓ | ✓ | ✓ | …
269 | 0x06 | crypto | ✓ | ✓ | | ✓ | | | …
271 …8 | stream 0x08 | | | ✓ | ✓ | | | | …
272 …9 | stream 0x09 | | | ✓ | ✓ | | | | …
273 …A | stream 0x0A | | | ✓ | ✓ | | | | …
274 …B | stream 0x0B | | | ✓ | ✓ | | | | …
275 …C | stream 0x0C | | | ✓ | ✓ | | | | …
[all …]
/openssl/doc/man5/
H A Dfips_config.pod97 =item B<tls1-prf-ems-check>
113 =item B<hkdf-digest-check>
129 =item B<sskdf-digest-check>
157 =item B<hkdf-key-check>
161 =item B<kbkdf-key-check>
169 =item B<tls1-prf-key-check>
173 =item B<sshkdf-key-check>
177 =item B<sskdf-key-check>
181 =item B<x963kdf-key-check>
193 =item B<hmac-key-check>
[all …]
/openssl/test/
H A Drdcpu_sanitytest.c41 unsigned char prior[31] = {0}, buf[31] = {0}, check[7]; in sanity_check_bytes() local
74 unsigned char *tail = &buf[sizeof(buf) - sizeof(check)]; in sanity_check_bytes()
75 memset(check, tail[0], 7); in sanity_check_bytes()
76 if (!TEST_false(!memcmp(check, tail, sizeof(check)))) in sanity_check_bytes()
H A Dquic_cfq_test.c66 static int check(QUIC_CFQ *cfq) in check() function
135 if (!check(cfq)) in test_cfq()
155 if (!check(cfq)) in test_cfq()
/openssl/util/
H A Dcheck-format-commit.sh113 mkdir -p $TEMPDIR/check-format/$FDIR
114 git show $COMMIT_LAST:$j > $TEMPDIR/check-format/$j
141 cd $TEMPDIR/check-format
146 $TOPDIR/util/check-format.pl $j > $TEMPDIR/format-results.txt
/openssl/.github/workflows/
H A Dstyle-checks.yml20 check-style:
27 - name: check style for each commit
38 ./util/check-format-commit.sh $REFSTART..$REFEND
50 echo "PR $PR_NUMBER is marked with style: waived, waiving style check errors"
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_dsa.txt378 CtrlInit = sign-check:0
379 CtrlInit = key-check:0
390 CtrlInit = sign-check:0
401 CtrlInit = sign-check:0
402 CtrlInit = key-check:0
413 CtrlInit = sign-check:0
414 CtrlInit = key-check:0
425 CtrlInit = sign-check:0
426 CtrlInit = digest-check:0
436 CtrlInit = sign-check:0
[all …]
H A Devppkey_dsa_sigalg.txt371 CtrlInit = sign-check:0
372 CtrlInit = key-check:0
376 # Test sign with a 1024 bit key is unapproved and fails the key check in
377 # fips mode if the sign check is ignored
383 CtrlInit = sign-check:0
394 CtrlInit = sign-check:0
395 CtrlInit = key-check:0
406 CtrlInit = sign-check:0
407 CtrlInit = key-check:0
411 # Test sign with SHA1 is unapproved in fips mode if DSA sign check is ignored
[all …]
H A Devppkey_kdf_tls1_prf.txt102 Ctrl.digest-check = digest-check:0
128 Ctrl.key-check = key-check:0
H A Devpkdf_tls12_prf.txt106 Ctrl.digest-check = digest-check:0
133 Ctrl.key-check = key-check:0
H A Devpkdf_x963.txt160 Ctrl.digest-check = digest-check:0
182 Ctrl.key-check = key-check:0
/openssl/doc/man1/
H A Dopenssl-fipsinstall.pod.in110 Filename of the FIPS module to perform an integrity check on.
204 turn off the check at compile time.
208 Configure the module to enable a run-time Extended Master Secret (EMS) check
209 when using the TLS1_PRF KDF algorithm. This check is disabled by default.
239 Configure the module to enable a run-time digest check when deriving a key by
245 Configure the module to enable a run-time digest check when deriving a key by
251 Configure the module to enable a run-time digest check when deriving a key by
257 Configure the module to enable a run-time digest check when deriving a key by
263 Configure the module to enable a run-time digest check when deriving a key by
345 Configure the module to not perform run-time lower bound check for PBKDF2.
[all …]
/openssl/
H A DNOTES-VALGRIND.md5 which is commonly used to check for memory leaks, etc. The default tool
35 "$(/bin/pwd)/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q"
40 The `--leak-check=full` option specifies extensive memory checking.
66 --leak-check=full -q" OPENSSL_ia32cap=":0"
72 valgrind --error-exitcode=1 --leak-check=full -q" OPENSSL_ia32cap=":0"
/openssl/apps/
H A Dpkeyparam.c52 int text = 0, noout = 0, ret = EXIT_FAILURE, check = 0, r; in pkeyparam_main() local
84 check = 1; in pkeyparam_main()
111 if (check) { in pkeyparam_main()
H A Dpkey.c80 int private = 0, traditional = 0, check = 0, pub_check = 0; in pkey_main() local
141 check = 1; in pkey_main()
242 if (check || pub_check) { in pkey_main()
251 if (check && !pubin) in pkey_main()
H A Drsa.c132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() local
205 check = 1; in rsa_main()
232 if (check && pubin) { in rsa_main()
288 if (check) { in rsa_main()
H A Dverify.c22 static int check(X509_STORE *ctx, const char *file,
224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main()
229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main()
245 static int check(X509_STORE *ctx, const char *file, in check() function
H A Dec.c78 int check = 0; in ec_main() local
151 check = 1; in ec_main()
225 if (check) { in ec_main()
/openssl/doc/man7/
H A DEVP_KDF-X963.pod48 This may be used after calling EVP_KDF_derive. It returns 0 if any "***-check"
49 related parameter is set to 0 and the check fails.
51 =item "digest-check" (B<OSSL_KDF_PARAM_FIPS_DIGEST_CHECK>) <int>
64 =item "key-check" (B<OSSL_KDF_PARAM_FIPS_KEY_CHECK>) <integer>
H A Dprovider-keymgmt.pod319 OSSL_FUNC_keymgmt_validate() should check if the I<keydata> contains valid
324 for short) is expected to check that the pairwise consistency of
326 performed on the subset of data. Two types of check are defined:
328 The interpretation of how much checking is performed in a full check versus a
329 quick check is key type specific. Some providers may have no distinction
330 between a full check and a quick check. For algorithms where some selection is
335 OSSL_FUNC_keymgmt_match() should check if the data subset indicated by
449 return 0 if either the "key-check", or "sign-check" are set to 0.
451 =item "key-check" (B<OSSL_PKEY_PARAM_FIPS_KEY_CHECK>) <integer>
461 =item "sign-check" (B<OSSL_PKEY_PARAM_FIPS_SIGN_CHECK>) <integer>
[all …]
H A DEVP_KDF-TLS1_PRF.pod56 This may be used after calling EVP_KDF_derive. It returns 0 if any "***-check"
57 related parameter is set to 0 and the check fails.
67 =item "digest-check" (B<OSSL_KDF_PARAM_FIPS_DIGEST_CHECK>) <integer>
79 =item "key-check" (B<OSSL_KDF_PARAM_FIPS_KEY_CHECK>) <integer>
/openssl/test/ssl-tests/
H A D03-custom_verify.cnf.in16 # Sanity-check that verification indeed succeeds without the
68 # Sanity-check that verification indeed succeeds if peer verification
114 # Sanity-check that verification indeed fails without the
/openssl/doc/man3/
H A DDH_generate_parameters.pod8 - generate and check Diffie-Hellman
65 This is a lightweight check, if a more thorough check is needed, use
143 if the check could be performed, 0 otherwise.
149 check is successful, 0 for failed.
/openssl/doc/designs/
H A Dfips_indicator.md72 Returning 0 allows the algorithm to fail, in the same way that a strict check
75 - To control an algorithm context's checks via code requires a setter for each individual check e.g…
85 If the setter is needed it must be set BEFORE the FIPS related check is done.
87 If the FIPS related approved mode check fails and either the ctx setter is zero
139 - Existing security check changes
180 Delaying the check to after the init would be possible, but it would be a change
277 …If we chose not to remove them , then we need to check that OSSL_PKEY_PARAM_USE_COFACTOR_ECDH is s…
313 Do we need to check which algorithms allow SHA1 also?
323 We should only allow AES. We currently just check the mode.
327 - PBKDF2 'lower_bound_checks' needs to be part of the indicator check
[all …]
/openssl/dev/release-aux/
H A Dopenssl-announce-pre-release.tmpl39 Please download and check this $label release as soon as possible.
44 Please check the release notes and mailing lists to avoid duplicate

Completed in 38 milliseconds

12345678910