/openssl/ssl/ |
H A D | t1_trce.c | 1024 len = (msg[0] << 8) | msg[1]; in ssl_print_client_hello() 1088 cs = (msg[0] << 8) | msg[1]; in ssl_print_server_hello() 1328 clen = (msg[0] << 16) | (msg[1] << 8) | msg[2]; in ssl_print_raw_public_key() 1359 clen = (msg[0] << 16) | (msg[1] << 8) | msg[2]; in ssl_print_certificates() 1405 alg = (msg[0] << 8) | msg[1]; in ssl_print_compressed_certificates() 1406 uclen = (msg[2] << 16) | (msg[3] << 8) | msg[4]; in ssl_print_compressed_certificates() 1407 clen = (msg[5] << 16) | (msg[6] << 8) | msg[7]; in ssl_print_compressed_certificates() 1606 hlen = (msg[1] << 16) | (msg[2] << 8) | msg[3]; in ssl_print_handshake() 1619 (msg[2] << 16) | (msg[3] << 8) | msg[4], in ssl_print_handshake() 1620 (msg[5] << 16) | (msg[6] << 8) | msg[7]); in ssl_print_handshake() [all …]
|
/openssl/crypto/cmp/ |
H A D | cmp_msg.c | 31 msg = NULL; in OSSL_CMP_MSG_new() 33 return msg; in OSSL_CMP_MSG_new() 88 if (!ossl_assert(msg != NULL && msg->body != NULL)) in ossl_cmp_msg_set_bodytype() 97 if (!ossl_assert(msg != NULL && msg->body != NULL)) in OSSL_CMP_MSG_get_bodytype() 435 return msg; in ossl_cmp_certreq_new() 509 return msg; in ossl_cmp_certrep_new() 572 return msg; in ossl_cmp_rr_new() 620 return msg; in ossl_cmp_rp_new() 706 return msg; in gen_new() 1167 if (msg != NULL && *msg != NULL) { in d2i_OSSL_CMP_MSG() [all …]
|
H A D | cmp_vfy.c | 52 prot_part.header = msg->header; in verify_signature() 53 prot_part.body = msg->body; in verify_signature() 56 msg->header->protectionAlg, msg->protection, in verify_signature() 87 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC() 439 msg->extraCerts, NULL, msg, mode_3gpp)) in check_msg_all_certs() 568 if (ctx == NULL || msg == NULL in OSSL_CMP_validate_msg() 569 || msg->header == NULL || msg->body == NULL) { in OSSL_CMP_validate_msg() 575 || msg->protection == NULL || msg->protection->data == NULL) { in OSSL_CMP_validate_msg() 710 if (!ossl_assert(ctx != NULL && msg != NULL && msg->header != NULL)) in ossl_cmp_msg_check_update() 879 if (!ossl_assert(msg != NULL && msg->body != NULL)) in ossl_cmp_verify_popo() [all …]
|
H A D | cmp_protect.c | 46 prot_part.header = msg->header; in ossl_cmp_calc_protection() 47 prot_part.body = msg->body; in ossl_cmp_calc_protection() 49 if (msg->header->protectionAlg == NULL) { in ossl_cmp_calc_protection() 179 sk_X509_free(msg->extraCerts); in ossl_cmp_msg_add_extraCerts() 180 msg->extraCerts = NULL; in ossl_cmp_msg_add_extraCerts() 239 msg->header->protectionAlg = NULL; in ossl_cmp_msg_protect() 240 ASN1_BIT_STRING_free(msg->protection); in ossl_cmp_msg_protect() 241 msg->protection = NULL; in ossl_cmp_msg_protect() 244 if (!set_senderKID(ctx, msg, NULL)) in ossl_cmp_msg_protect() 250 if (!set_senderKID(ctx, msg, NULL)) in ossl_cmp_msg_protect() [all …]
|
H A D | cmp_util.c | 81 const char *msg = buf; in ossl_cmp_log_parse_metadata() local 103 msg = strchr(p_level, ':'); in ossl_cmp_log_parse_metadata() 104 if (msg != NULL && *++msg == ' ') in ossl_cmp_log_parse_metadata() 105 msg++; in ossl_cmp_log_parse_metadata() 110 return msg; in ossl_cmp_log_parse_metadata() 146 level_string, msg) >= 0; in OSSL_CMP_print_to_bio() 154 char msg[ERR_PRINT_BUF_SIZE]; in OSSL_CMP_print_errors_cb() local 178 BIO_snprintf(msg, sizeof(msg), "%s:%s", rs, data); in OSSL_CMP_print_errors_cb() 180 BIO_snprintf(msg, sizeof(msg), "%s", rs); in OSSL_CMP_print_errors_cb() 188 OSSL_CMP_LOG_ERR, msg); in OSSL_CMP_print_errors_cb() [all …]
|
H A D | cmp_local.h | 733 void OSSL_CMP_MSG_free(OSSL_CMP_MSG *msg); 840 # define ossl_cmp_log(level, ctx, msg) \ argument 842 OPENSSL_LINE, #level, "%s", msg) 857 # define ossl_cmp_alert(ctx, msg) ossl_cmp_log(ALERT, ctx, msg) argument 858 # define ossl_cmp_err(ctx, msg) ossl_cmp_log(ERROR, ctx, msg) argument 859 # define ossl_cmp_warn(ctx, msg) ossl_cmp_log(WARN, ctx, msg) argument 860 # define ossl_cmp_info(ctx, msg) ossl_cmp_log(INFO, ctx, msg) argument 861 # define ossl_cmp_debug(ctx, msg) ossl_cmp_log(DEBUG, ctx, msg) argument 862 # define ossl_cmp_trace(ctx, msg) ossl_cmp_log(TRACE, ctx, msg) argument 949 int ossl_cmp_msg_set_bodytype(OSSL_CMP_MSG *msg, int type); [all …]
|
H A D | cmp_server.c | 178 OSSL_CMP_MSG *msg; in delayed_delivery() local 205 return msg; in delayed_delivery() 296 if (msg == NULL) in process_cert_request() 304 return msg; in process_cert_request() 347 return msg; in process_rr() 358 OSSL_CMP_MSG *msg; in process_genm() local 368 return msg; in process_genm() 375 OSSL_CMP_MSG *msg; in process_error() local 385 return msg; in process_error() 443 return msg; in process_certConf() [all …]
|
/openssl/include/openssl/ |
H A D | macros.h | 185 # define OSSL_DEPRECATEDIN_3_4_FOR(msg) OSSL_DEPRECATED_FOR(3.4, msg) argument 191 # define OSSL_DEPRECATEDIN_3_4_FOR(msg) argument 196 # define OSSL_DEPRECATEDIN_3_1_FOR(msg) OSSL_DEPRECATED_FOR(3.1, msg) argument 202 # define OSSL_DEPRECATEDIN_3_1_FOR(msg) argument 207 # define OSSL_DEPRECATEDIN_3_0_FOR(msg) OSSL_DEPRECATED_FOR(3.0, msg) argument 218 # define OSSL_DEPRECATEDIN_1_1_1_FOR(msg) OSSL_DEPRECATED_FOR(1.1.1, msg) argument 229 # define OSSL_DEPRECATEDIN_1_1_0_FOR(msg) OSSL_DEPRECATED_FOR(1.1.0, msg) argument 240 # define OSSL_DEPRECATEDIN_1_0_2_FOR(msg) OSSL_DEPRECATED_FOR(1.0.2, msg) argument 251 # define OSSL_DEPRECATEDIN_1_0_1_FOR(msg) OSSL_DEPRECATED_FOR(1.0.1, msg) argument 262 # define OSSL_DEPRECATEDIN_1_0_0_FOR(msg) OSSL_DEPRECATED_FOR(1.0.0, msg) argument [all …]
|
H A D | crmf.h.in | 92 const unsigned char *msg, size_t msglen, 97 int OSSL_CRMF_MSG_set1_regCtrl_regToken(OSSL_CRMF_MSG *msg, 100 *OSSL_CRMF_MSG_get0_regCtrl_regToken(const OSSL_CRMF_MSG *msg); 101 int OSSL_CRMF_MSG_set1_regCtrl_authenticator(OSSL_CRMF_MSG *msg, 122 int OSSL_CRMF_MSG_set1_regCtrl_protocolEncrKey(OSSL_CRMF_MSG *msg, 126 int OSSL_CRMF_MSG_set1_regCtrl_oldCertID(OSSL_CRMF_MSG *msg, 129 *OSSL_CRMF_MSG_get0_regCtrl_oldCertID(const OSSL_CRMF_MSG *msg); 133 int OSSL_CRMF_MSG_set1_regInfo_utf8Pairs(OSSL_CRMF_MSG *msg, 136 *OSSL_CRMF_MSG_get0_regInfo_utf8Pairs(const OSSL_CRMF_MSG *msg); 137 int OSSL_CRMF_MSG_set1_regInfo_certReq(OSSL_CRMF_MSG *msg, [all …]
|
/openssl/include/internal/ |
H A D | ktls.h | 105 msg.msg_control = buf; in ktls_send_ctrl_message() 116 msg.msg_iov = &msg_iov; in ktls_send_ctrl_message() 117 msg.msg_iovlen = 1; in ktls_send_ctrl_message() 155 msg.msg_control = buf; in ktls_read_record() 161 msg.msg_iovlen = 1; in ktls_read_record() 331 struct msghdr msg; in ktls_send_ctrl_message() local 340 memset(&msg, 0, sizeof(msg)); in ktls_send_ctrl_message() 353 msg.msg_iovlen = 1; in ktls_send_ctrl_message() 385 struct msghdr msg; in ktls_read_record() local 401 memset(&msg, 0, sizeof(msg)); in ktls_read_record() [all …]
|
/openssl/test/helpers/ |
H A D | noisydgrambio.c | 32 BIO_MSG msg; member 298 msg[flip_offset] ^= flip >> 8; in flip_bits() 343 BIO_dump_fp(stdout, msg[i].data, msg[i].data_len); in noisy_dgram_recvmmsg() 361 for (i = 0, thismsg = msg; in noisy_dgram_recvmmsg() 375 if (!bio_msg_copy(&msg[j], &msg[j - 1])) in noisy_dgram_recvmmsg() 444 if (!bio_msg_copy(&msg[j - 1], &msg[j])) in noisy_dgram_recvmmsg() 455 BIO_dump_fp(stdout, msg[i].data, msg[i].data_len); in noisy_dgram_recvmmsg() 477 OPENSSL_free(data->msg.data); in data_free() 478 BIO_ADDR_free(data->msg.peer); in data_free() 479 BIO_ADDR_free(data->msg.local); in data_free() [all …]
|
H A D | pktsplitbio.c | 33 static int pkt_split_dgram_sendmmsg(BIO *bio, BIO_MSG *msg, size_t stride, in pkt_split_dgram_sendmmsg() argument 46 return BIO_sendmmsg(next, msg, stride, num_msg, flags, msgs_processed); in pkt_split_dgram_sendmmsg() 49 static int pkt_split_dgram_recvmmsg(BIO *bio, BIO_MSG *msg, size_t stride, in pkt_split_dgram_recvmmsg() argument 69 data_len = msg[i].data_len; in pkt_split_dgram_recvmmsg() 70 else if (!TEST_size_t_eq(msg[i].data_len, data_len)) in pkt_split_dgram_recvmmsg() 74 if (!BIO_recvmmsg(next, msg, stride, num_msg, flags, msgs_processed)) in pkt_split_dgram_recvmmsg() 82 for (i = 0, thismsg = msg; i < msg_cnt; i++, thismsg++) { in pkt_split_dgram_recvmmsg() 100 if (!bio_msg_copy(&msg[j], &msg[j - 1])) in pkt_split_dgram_recvmmsg() 104 msg[i + 1].data_len = remain; in pkt_split_dgram_recvmmsg() 105 memmove(msg[i + 1].data, in pkt_split_dgram_recvmmsg() [all …]
|
H A D | cmp_testlib.c | 17 OSSL_CMP_MSG *msg; in load_pkimsg() local 19 (void)TEST_ptr((msg = OSSL_CMP_MSG_read(file, libctx, NULL))); in load_pkimsg() 20 return msg; in load_pkimsg() 26 int valid_asn1_encoding(const OSSL_CMP_MSG *msg) in valid_asn1_encoding() argument 28 return msg != NULL ? i2d_OSSL_CMP_MSG(msg, NULL) > 0 : 0; in valid_asn1_encoding() 78 OSSL_CMP_severity level, const char *msg) in print_to_bio_out() argument 80 return OSSL_CMP_print_to_bio(bio_out, func, file, line, level, msg); in print_to_bio_out()
|
/openssl/crypto/bio/ |
H A D | bss_dgram.c | 1046 mh->name = msg->peer != NULL ? &msg->peer->sa : NULL; in translate_msg_win() 1084 mh->msg_name = msg->peer != NULL ? &msg->peer->sa : NULL; in translate_msg() 1739 msg[0].peer != NULL ? &msg[0].peer->sa : NULL, in dgram_recvmmsg() 1956 struct msghdr msg; in dgram_sctp_read() local 2187 struct msghdr msg; in dgram_sctp_write() local 2229 msg.msg_iov = iov; in dgram_sctp_write() 2230 msg.msg_iovlen = 1; in dgram_sctp_write() 2233 msg.msg_flags = 0; in dgram_sctp_write() 2566 struct msghdr msg; in dgram_sctp_wait_for_dry() local 2610 msg.msg_flags = 0; in dgram_sctp_wait_for_dry() [all …]
|
/openssl/fuzz/ |
H A D | cmp.c | 40 OSSL_CMP_severity level, const char *msg) in print_noop() argument 68 (void)OSSL_CMP_CTX_set_transfer_cb_arg(ctx, msg); in cmp_client_process_response() 71 switch (msg->body != NULL ? msg->body->type : -1) { in cmp_client_process_response() 94 (void)ossl_cmp_msg_check_update(ctx, msg, allow_unprotected, 0); in cmp_client_process_response() 172 OSSL_CMP_MSG *msg; in FuzzerTestOneInput() local 180 msg = d2i_OSSL_CMP_MSG_bio(in, NULL); in FuzzerTestOneInput() 181 if (msg != NULL) { in FuzzerTestOneInput() 186 i2d_OSSL_CMP_MSG_bio(out, msg); in FuzzerTestOneInput() 187 ASN1_item_print(out, (ASN1_VALUE *)msg, 4, in FuzzerTestOneInput() 192 cmp_client_process_response(client_ctx, msg); in FuzzerTestOneInput() [all …]
|
/openssl/doc/man3/ |
H A D | OSSL_CRMF_MSG_set1_regCtrl_regToken.pod | 26 *OSSL_CRMF_MSG_get0_regCtrl_regToken(const OSSL_CRMF_MSG *msg); 27 int OSSL_CRMF_MSG_set1_regCtrl_regToken(OSSL_CRMF_MSG *msg, 30 *OSSL_CRMF_MSG_get0_regCtrl_authenticator(const OSSL_CRMF_MSG *msg); 31 int OSSL_CRMF_MSG_set1_regCtrl_authenticator(OSSL_CRMF_MSG *msg, 42 int OSSL_CRMF_MSG_set1_regCtrl_pkiPublicationInfo(OSSL_CRMF_MSG *msg, 45 *OSSL_CRMF_MSG_get0_regCtrl_protocolEncrKey(const OSSL_CRMF_MSG *msg); 46 int OSSL_CRMF_MSG_set1_regCtrl_protocolEncrKey(OSSL_CRMF_MSG *msg, 49 *OSSL_CRMF_MSG_get0_regCtrl_oldCertID(const OSSL_CRMF_MSG *msg); 50 int OSSL_CRMF_MSG_set1_regCtrl_oldCertID(OSSL_CRMF_MSG *msg, 58 returns the respective control X in the given I<msg>, if present. [all …]
|
H A D | OSSL_CRMF_MSG_set1_regInfo_certReq.pod | 16 *OSSL_CRMF_MSG_get0_regInfo_utf8Pairs(const OSSL_CRMF_MSG *msg); 17 int OSSL_CRMF_MSG_set1_regInfo_utf8Pairs(OSSL_CRMF_MSG *msg, 20 *OSSL_CRMF_MSG_get0_regInfo_certReq(const OSSL_CRMF_MSG *msg); 21 int OSSL_CRMF_MSG_set1_regInfo_certReq(OSSL_CRMF_MSG *msg, 27 in the given I<msg>, if present. 30 value as utf8Pairs regInfo to the given I<msg>. See RFC 4211 section 7.1. 33 in the given I<msg>, if present. 36 as certReq regInfo to the given I<msg>. See RFC 4211 section 7.2. 48 control to the regInfo structure of the given I<msg>. While RFC 4211 expects
|
/openssl/test/ |
H A D | cmp_protect_test.c | 23 OSSL_CMP_MSG *msg; member 43 OSSL_CMP_MSG_free(fixture->msg); in tear_down() 83 ossl_cmp_calc_protection(fixture->cmp_ctx, fixture->msg); in execute_calc_protection_fails_test() 93 ossl_cmp_calc_protection(fixture->cmp_ctx, fixture->msg); in execute_calc_protection_pbmac_test() 106 static int verify_signature(OSSL_CMP_MSG *msg, in verify_signature() argument 112 prot_part.header = OSSL_CMP_MSG_get0_header(msg); in verify_signature() 113 prot_part.body = msg->body; in verify_signature() 124 ossl_cmp_calc_protection(fixture->cmp_ctx, fixture->msg); in execute_calc_protection_signature_test() 138 || !TEST_ptr(fixture->msg->header->protectionAlg = in test_cmp_calc_protection_no_key_no_secret() 242 if (!TEST_ptr(fixture->msg = in test_MSG_protect_with_certificate_and_key() [all …]
|
H A D | quic_newcid_test.c | 55 char *msg = "Hello World!"; in test_ncid_frame() local 56 size_t msglen = strlen(msg); in test_ncid_frame() 77 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) in test_ncid_frame() 90 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_ncid_frame() 104 (unsigned char *)msg, msglen, in test_ncid_frame() 121 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_ncid_frame() 124 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) in test_ncid_frame() 136 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_ncid_frame()
|
H A D | dsatest.c | 334 const unsigned char msg[] = { 0x00 }; in test_dsa_sig_infinite_loop() local 379 if (!TEST_true(DSA_sign(0, msg, sizeof(msg), NULL, &signature_len0, dsa)) in test_dsa_sig_infinite_loop() 383 if (!TEST_true(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa)) in test_dsa_sig_infinite_loop() 392 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_infinite_loop() 402 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_infinite_loop() 424 const unsigned char msg[] = { 0x00 }; in test_dsa_sig_neg_param() local 460 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param() 465 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param() 470 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param() 476 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param()
|
H A D | cmp_vfy_test.c | 34 OSSL_CMP_MSG *msg; member 45 OSSL_CMP_MSG_free(fixture->msg); in tear_down() 102 if ((fixture->msg = load_pkimsg(ir_protected_f, libctx)) == NULL) in execute_verify_popo_test() 105 const OSSL_CRMF_MSGS *reqs = fixture->msg->body->value.ir; in execute_verify_popo_test() 264 if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx)) in test_validate_msg_signature_srvcert() 269 || (bad_sig && !flip_bit(fixture->msg->protection))) { in test_validate_msg_signature_srvcert() 351 if (!TEST_ptr(fixture->msg = in test_validate_msg_signature_sender_cert_absent() 366 if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx)) in test_validate_with_sender() 449 fixture->msg, in execute_msg_check_test() 482 (*fixture)->msg = OSSL_CMP_MSG_dup(ir_rmprotection); in setup_check_update() [all …]
|
H A D | quicfaultstest.c | 29 char *msg = "Hello World!"; in test_basic() local 30 size_t msglen = strlen(msg); in test_basic() 44 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) in test_basic() 56 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_basic() 97 char *msg = "Hello World!"; in test_unknown_frame() local 98 size_t msglen = strlen(msg); in test_unknown_frame() 267 char *msg = "Hello World!"; in test_corrupted_data() local 268 size_t msglen = strlen(msg); in test_corrupted_data() 308 if (!TEST_true(ossl_quic_tserver_write(qtserv, sid, (unsigned char *)msg, 5, in test_corrupted_data() 324 if (!TEST_true(ossl_quic_tserver_write(qtserv, sid, (unsigned char *)msg + 5, in test_corrupted_data() [all …]
|
H A D | evp_xof_test.c | 419 unsigned char msg[16]; in shake_squeeze_large_test() local 422 if (!TEST_int_gt(RAND_bytes(msg, sizeof(msg)), 0) in shake_squeeze_large_test() 424 || !TEST_true(EVP_DigestUpdate(ctx, msg, sizeof(msg))) in shake_squeeze_large_test() 428 ret = do_shake_squeeze_test(tst, msg, sizeof(msg), out, sizeof(out)); in shake_squeeze_large_test() 486 unsigned char msg[16]; in shake_squeeze_dup_test() local 490 if (!TEST_int_gt(RAND_bytes(msg, sizeof(msg)), 0) in shake_squeeze_dup_test() 492 || !TEST_true(EVP_DigestUpdate(ctx, msg, sizeof(msg))) in shake_squeeze_dup_test() 496 ret = do_shake_squeeze_dup_test(tst, alg, msg, sizeof(msg), in shake_squeeze_dup_test()
|
H A D | bio_core_test.c | 73 const char *msg = "Hello world"; in test_bio_core() local 87 if (!TEST_int_gt(BIO_puts(corebio.bio, msg), 0) in test_bio_core() 92 || !TEST_str_eq(buf, msg)) in test_bio_core() 96 if (!TEST_int_gt(BIO_write(cbio, msg, strlen(msg) + 1), 0) in test_bio_core() 98 || !TEST_str_eq(buf, msg)) in test_bio_core()
|
/openssl/ms/ |
H A D | uplink.c | 26 static TCHAR msg[128]; variable 30 OPENSSL_showfatal(sizeof(TCHAR) == sizeof(char) ? "%s\n" : "%S\n", msg); in unimplemented() 58 len = _sntprintf(msg, sizeof(msg) / sizeof(TCHAR), in OPENSSL_Uplink() 60 _tcscpy(msg + len, _T("unimplemented function")); in OPENSSL_Uplink() 65 _tcscpy(msg + len, _T("no host application")); in OPENSSL_Uplink() 79 _tcscpy(msg + len, _T("no OPENSSL_Applink")); in OPENSSL_Uplink() 85 _tcscpy(msg + len, _T("no ApplinkTable")); in OPENSSL_Uplink()
|