/openssl/crypto/async/ |
H A D | async_wait.c | 33 curr->cleanup(ctx, curr->key, curr->fd, curr->custom_data); in ASYNC_WAIT_CTX_free() 73 curr = curr->next; in ASYNC_WAIT_CTX_get_fd() 81 curr = curr->next; in ASYNC_WAIT_CTX_get_fd() 96 curr = curr->next; in ASYNC_WAIT_CTX_get_all_fds() 104 curr = curr->next; in ASYNC_WAIT_CTX_get_all_fds() 124 if (curr->del && !curr->add && (delfd != NULL)) { in ASYNC_WAIT_CTX_get_changed_fds() 128 if (curr->add && !curr->del && (addfd != NULL)) { in ASYNC_WAIT_CTX_get_changed_fds() 132 curr = curr->next; in ASYNC_WAIT_CTX_get_changed_fds() 148 curr = curr->next; in ASYNC_WAIT_CTX_clear_fd() 178 curr = curr->next; in ASYNC_WAIT_CTX_clear_fd() [all …]
|
/openssl/crypto/x509/ |
H A D | pcy_tree.c | 59 if (!curr) in tree_print() 62 curr++; in tree_print() 410 nodes = curr->nodes; in tree_prune() 424 --curr; in tree_prune() 425 nodes = curr->nodes; in tree_prune() 434 if (curr->anyPolicy && !curr->anyPolicy->nchild) { in tree_prune() 483 X509_POLICY_LEVEL *curr; in tree_calculate_authority_set() local 490 if (curr->anyPolicy) { in tree_calculate_authority_set() 498 curr = tree->levels; in tree_calculate_authority_set() 506 curr++; in tree_calculate_authority_set() [all …]
|
H A D | x509_vfy.c | 3318 X509 *curr, *issuer = NULL; in build_chain() local 3356 curr = sk_X509_value(ctx->chain, i - 1); in build_chain() 3359 ok = num > max_depth ? 0 : get1_trusted_issuer(&issuer, ctx, curr); in build_chain() 3368 int self_signed = X509_self_signed(curr, 0); in build_chain() 3425 if (X509_cmp(curr, issuer) != 0) { in build_chain() 3434 X509_free(curr); in build_chain() 3492 curr = sk_X509_value(ctx->chain, num - 1); in build_chain() 3493 issuer = (X509_self_signed(curr, 0) > 0 || num > max_depth) ? in build_chain() 3494 NULL : get0_best_issuer_sk(ctx, 0, 1, sk_untrusted, curr); in build_chain()
|
/openssl/include/internal/ |
H A D | packet.h | 24 const unsigned char *curr; member 32 pkt->curr += len; in packet_forward() 61 return pkt->curr; in PACKET_data() 77 pkt->curr = buf; in PACKET_buf_init() 85 pkt->curr = NULL; in PACKET_null_init() 295 *data = *pkt->curr; in PACKET_peek_1() 333 *data = *pkt->curr; in PACKET_peek_4() 369 *data = pkt->curr; in PACKET_peek_bytes() 526 subpkt->curr = data; in PACKET_get_length_prefixed_1() 549 subpkt->curr = data; in PACKET_as_length_prefixed_1() [all …]
|
H A D | packet_quic.h | 30 enclen = ossl_quic_vlint_decode_len(*pkt->curr); in PACKET_get_quic_vlint() 35 *data = ossl_quic_vlint_decode_unchecked(pkt->curr); in PACKET_get_quic_vlint() 55 enclen = ossl_quic_vlint_decode_len(*pkt->curr); in PACKET_peek_quic_vlint_ex() 60 *data = ossl_quic_vlint_decode_unchecked(pkt->curr); in PACKET_peek_quic_vlint_ex() 84 enclen = ossl_quic_vlint_decode_len(*pkt->curr); in PACKET_skip_quic_vlint() 114 subpkt->curr = data; in PACKET_get_quic_length_prefixed()
|
/openssl/crypto/ |
H A D | initthread.c | 344 curr = *hands; in init_thread_stop() 345 while (curr != NULL) { in init_thread_stop() 347 prev = curr; in init_thread_stop() 348 curr = curr->next; in init_thread_stop() 351 curr->handfn(curr->arg); in init_thread_stop() 357 tmp = curr; in init_thread_stop() 358 curr = curr->next; in init_thread_stop() 448 curr = *hands; in init_thread_deregister() 456 curr = curr->next; in init_thread_deregister() 460 prev = curr; in init_thread_deregister() [all …]
|
H A D | packet.c | 25 pkt->curr += len; in WPACKET_allocate_bytes() 107 pkt->curr = 0; in wpacket_intern_init_len() 265 if ((pkt->curr - sub->lenbytes) == sub->packet_len) { in wpacket_intern_close() 267 pkt->curr -= sub->lenbytes; in wpacket_intern_close() 516 return buf + pkt->maxsize - pkt->curr; in WPACKET_get_curr() 518 return buf + pkt->curr; in WPACKET_get_curr()
|
H A D | provider_core.c | 1418 int ret = 0, curr, max, ref = 0; in ossl_provider_doall_activated() local 1452 for (curr = max - 1; curr >= 0; curr--) { in ossl_provider_doall_activated() 1453 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated() 1480 sk_OSSL_PROVIDER_delete(provs, curr); in ossl_provider_doall_activated() 1490 for (curr = 0; curr < max; curr++) { in ossl_provider_doall_activated() 1491 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated() 1494 curr = -1; in ossl_provider_doall_activated() 1498 curr = -1; in ossl_provider_doall_activated() 1511 for (curr++; curr < max; curr++) { in ossl_provider_doall_activated() 1512 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated()
|
/openssl/ssl/ |
H A D | ssl_ciph.c | 617 curr->prev->next = curr->next; in ll_append_tail() 619 curr->next->prev = curr->prev; in ll_append_tail() 634 curr->next->prev = curr->prev; in ll_append_head() 636 curr->prev->next = curr->next; in ll_append_head() 819 next = reverse ? curr->prev : curr->next; in ssl_cipher_apply_rule() 899 curr->prev->next = curr->next; in ssl_cipher_apply_rule() 904 curr->next->prev = curr->prev; in ssl_cipher_apply_rule() 906 curr->prev->next = curr->next; in ssl_cipher_apply_rule() 935 curr = curr->next; in ssl_cipher_strength_sort() 949 curr = curr->next; in ssl_cipher_strength_sort() [all …]
|
H A D | pqueue.c | 50 pitem *curr, *next; in pqueue_insert() local 57 for (curr = NULL, next = pq->items; in pqueue_insert() 58 next != NULL; curr = next, next = next->next) { in pqueue_insert() 66 if (curr == NULL) in pqueue_insert() 69 curr->next = item; in pqueue_insert() 79 curr->next = item; in pqueue_insert()
|
H A D | t1_lib.c | 3172 const SIGALG_LOOKUP *curr; in tls1_set_sigalgs() local 3176 for (j = 0, curr = sigalg_lookup_tbl; j < OSSL_NELEM(sigalg_lookup_tbl); in tls1_set_sigalgs() 3177 j++, curr++) { in tls1_set_sigalgs() 3178 if (curr->hash == md_id && curr->sig == sig_id) { in tls1_set_sigalgs() 3179 *sptr++ = curr->sigalg; in tls1_set_sigalgs()
|
/openssl/crypto/err/ |
H A D | err_prn.c | 76 const char *curr = txt, *next = txt; in ERR_add_error_txt() local 101 curr = NULL; /* no need to split */ in ERR_add_error_txt() 104 curr = next; /* will split at this point */ in ERR_add_error_txt() 108 curr = next; in ERR_add_error_txt() 109 next = strstr(curr, separator); in ERR_add_error_txt() 114 next = curr + strlen(curr); in ERR_add_error_txt() 118 curr = NULL; /* the above loop implies *next == '\0' */ in ERR_add_error_txt() 120 if (curr != NULL) { in ERR_add_error_txt() 122 if (curr != txt) { in ERR_add_error_txt() 123 tmp = OPENSSL_strndup(txt, curr - txt); in ERR_add_error_txt() [all …]
|
/openssl/test/ |
H A D | params_conversion_test.c | 63 TEST_info("Line %d: multiple type lines", s->curr); in param_conversion_load_stanza() 68 TEST_info("Line %d: unknown type line", s->curr); in param_conversion_load_stanza() 122 s->curr, p, pp->key); in param_conversion_load_stanza() 128 TEST_info("Line %d: type not found", s->curr); in param_conversion_load_stanza() 134 TEST_note("errant int32 on line %d", s->curr); in param_conversion_load_stanza() 143 TEST_note("errant int64 on line %d", s->curr); in param_conversion_load_stanza() 152 TEST_note("errant uint32 on line %d", s->curr); in param_conversion_load_stanza() 161 TEST_note("errant uint64 on line %d", s->curr); in param_conversion_load_stanza() 170 TEST_note("errant double on line %d", s->curr); in param_conversion_load_stanza() 178 TEST_error("type unknown at line %d", s->curr); in param_conversion_load_stanza() [all …]
|
H A D | bio_prefix_text.c | 108 BIO *curr = BIO_new(BIO_f_prefix()); in setup_bio_chain() local 110 if (curr == NULL) in setup_bio_chain() 112 chain[i] = BIO_push(curr, next); in setup_bio_chain()
|
H A D | tls13encryptiontest.c | 206 size_t outer, inner, curr = 0; in multihexstr2buf() local 233 outbuf[curr++] = (hi << 4) | lo; in multihexstr2buf()
|
H A D | evp_pkey_provided_test.c | 41 char *curr, *writ; in stripcr() local 43 for (i = *len, curr = buf, writ = buf; i > 0; i--, curr++) { in stripcr() 44 if (*curr == '\r') { in stripcr() 48 if (curr != writ) in stripcr() 49 *writ = *curr; in stripcr()
|
H A D | packettest.c | 559 if (!TEST_ptr_eq(pkt.curr, cases[i].buf)) in test_PACKET_get_quic_length_prefixed() 564 if (!TEST_ptr_eq(subpkt.curr, cases[i].buf + cases[i].enclen)) in test_PACKET_get_quic_length_prefixed()
|
H A D | sslapitest.c | 3175 const sigalgs_list *curr; in test_set_sigalgs() local 3183 curr = testctx ? &testsigalgs[idx] in test_set_sigalgs() 3196 if (curr->list != NULL) in test_set_sigalgs() 3197 ret = SSL_CTX_set1_sigalgs(cctx, curr->list, curr->listlen); in test_set_sigalgs() 3202 if (curr->valid) in test_set_sigalgs() 3208 if (!curr->valid) { in test_set_sigalgs() 3221 if (curr->list != NULL) in test_set_sigalgs() 3222 ret = SSL_set1_sigalgs(clientssl, curr->list, curr->listlen); in test_set_sigalgs() 3226 if (curr->valid) in test_set_sigalgs() 3232 if (!curr->valid) in test_set_sigalgs() [all …]
|
H A D | evp_test.c | 4932 TEST_info("Line %d: error matching FIPS versions\n", t->s.curr); in parse() 4961 TEST_info("Line %d: missing blank line\n", t->s.curr); in parse() 4991 t->s.curr); in parse() 4995 TEST_info("Line %d: multiple result lines", t->s.curr); in parse() 5003 TEST_info("Line %d: multiple reason lines", t->s.curr); in parse() 5020 TEST_info("Line %d: unknown keyword %s", t->s.curr, pp->key); in parse() 5025 t->s.curr, pp->key, pp->value); in parse()
|
H A D | testutil.h | 586 int curr; /* Current line in file */ member
|
/openssl/test/testutil/ |
H A D | stanza.c | 54 s->curr++; in read_key() 93 s->curr++; in test_readstanza() 95 TEST_info("Line %d too long", s->curr); in test_readstanza() 110 TEST_info("Missing = at line %d\n", s->curr); in test_readstanza() 115 TEST_info("Empty field at line %d\n", s->curr); in test_readstanza() 122 TEST_info("Starting \"%s\" tests at line %d", value, s->curr); in test_readstanza() 127 s->start = s->curr; in test_readstanza()
|
/openssl/util/ |
H A D | check-format-test-negatives.c | 451 const char *curr = txt, *next = txt; in fun() local
|
H A D | check-format.pl | 447 my $curr = substr($str, $i); 448 if ($curr =~ m/^(.*?)([{}()?:;\[\]])(.*)$/) { # match from position $i the first {}()?:;[]
|
/openssl/apps/lib/ |
H A D | s_cb.c | 1075 SSL_EXCERT *curr; in ssl_excert_free() local 1083 curr = exc; in ssl_excert_free() 1085 OPENSSL_free(curr); in ssl_excert_free()
|
/openssl/ssl/quic/ |
H A D | quic_wire.c | 945 sub.curr = ossl_quic_wire_decode_transport_param_bytes(pkt, in ossl_quic_wire_decode_transport_param_int() 947 if (sub.curr == NULL) in ossl_quic_wire_decode_transport_param_int()
|