/openssl/test/ |
H A D | quic_srt_gen_test.c | 54 QUIC_STATELESS_RESET_TOKEN token; in test_srt_gen() local 62 memset(&token, 0xff, sizeof(token)); in test_srt_gen() 65 &token))) in test_srt_gen() 68 if (!TEST_mem_eq(token.token, sizeof(token.token), in test_srt_gen()
|
H A D | quic_record_test_util.h | 41 && !TEST_mem_eq(a->token, a->token_len, b->token, b->token_len)) in cmp_pkt_hdr() 44 if ((a->token_len == 0 && !TEST_ptr_null(a->token)) in cmp_pkt_hdr() 45 || (b->token_len == 0 && !TEST_ptr_null(b->token))) in cmp_pkt_hdr()
|
H A D | quic_wire_test.c | 308 const unsigned char *token = NULL; in encode_case_7_dec() local 312 &token, in encode_case_7_dec() 319 if (!TEST_mem_eq(token, token_len, in encode_case_7_dec() 788 if (!TEST_mem_eq(f.stateless_reset.token, in encode_case_16_dec() 789 sizeof(f.stateless_reset.token), in encode_case_16_dec() 790 encode_case_16_f.stateless_reset.token, in encode_case_16_dec() 791 sizeof(encode_case_16_f.stateless_reset.token))) in encode_case_16_dec()
|
H A D | README.md | 80 first token in the list, the current set of tests is first 82 this token equivalent to TESTS="alltests -xxx". 88 If this is the first token in the list, the current set of 90 effectively making this token equivalent to
|
/openssl/ssl/quic/ |
H A D | quic_srt_gen.c | 65 QUIC_STATELESS_RESET_TOKEN *token) in ossl_quic_srt_gen_calculate_token() argument 81 assert(sizeof(mac) >= sizeof(token->token)); in ossl_quic_srt_gen_calculate_token() 82 memcpy(token->token, mac, sizeof(token->token)); in ossl_quic_srt_gen_calculate_token()
|
H A D | quic_srtm.c | 273 (const unsigned char *)token, sizeof(*token))) in srtm_compute_blinded() 276 if (!ossl_assert(outl == sizeof(*token))) in srtm_compute_blinded() 299 item->srt = *token; in ossl_quic_srtm_add() 451 if (!srtm_compute_blinded(srtm, &key, token)) in ossl_quic_srtm_lookup() 473 uint32_t token; member 480 uint32_t token = arg_->token; in check_mark() local 495 item->debug_token = token; in check_mark() 510 uint32_t token = arg_->token; in check_count() local 516 assert(item->debug_token == token); in check_count() 533 args.token = token_next; in ossl_quic_srtm_check() [all …]
|
H A D | quic_trace.c | 68 static void put_token(BIO *bio, const uint8_t *token, size_t token_len) in put_token() argument 73 put_data(bio, token, token_len); in put_token() 169 const uint8_t *token; in frame_new_token() local 172 if (!ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len)) in frame_new_token() 176 put_token(bio, token, token_len); in frame_new_token() 336 put_data(bio, frame_data.stateless_reset.token, in frame_new_conn_id() 337 sizeof(frame_data.stateless_reset.token)); in frame_new_conn_id() 608 put_token(bio, hdr.token, hdr.token_len); in ossl_quic_trace()
|
H A D | qlog_event_helpers.c | 423 f.stateless_reset.token, in log_frame_actual() 424 sizeof(f.stateless_reset.token)); in log_frame_actual() 480 const unsigned char *token; in log_frame_actual() local 483 if (!ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len)) in log_frame_actual() 489 QLOG_BIN("data", token, token_len); in log_frame_actual() 591 QLOG_BIN("data", hdr->token, hdr->token_len); in log_packet()
|
H A D | quic_wire.c | 167 const unsigned char *token, in ossl_quic_wire_encode_frame_new_token() argument 172 || !WPACKET_memcpy(pkt, token, token_len)) in ossl_quic_wire_encode_frame_new_token() 331 || !WPACKET_memcpy(pkt, f->stateless_reset.token, in ossl_quic_wire_encode_frame_new_conn_id() 332 sizeof(f->stateless_reset.token))) in ossl_quic_wire_encode_frame_new_conn_id() 654 const unsigned char **token, in ossl_quic_wire_decode_frame_new_token() argument 666 *token = PACKET_data(pkt); in ossl_quic_wire_decode_frame_new_token() 819 if (!PACKET_copy_bytes(pkt, f->stateless_reset.token, in ossl_quic_wire_decode_frame_new_conn_id() 820 sizeof(f->stateless_reset.token))) in ossl_quic_wire_decode_frame_new_conn_id() 1001 || !PACKET_copy_bytes(&pkt2, p->stateless_reset.token, in ossl_quic_wire_decode_transport_param_preferred_addr() 1002 sizeof(p->stateless_reset.token))) in ossl_quic_wire_decode_transport_param_preferred_addr()
|
H A D | quic_wire_pkt.c | 258 hdr->token = NULL; in ossl_quic_wire_decode_pkt_hdr() 328 hdr->token = NULL; in ossl_quic_wire_decode_pkt_hdr() 372 || !PACKET_get_bytes(pkt, &hdr->token, (size_t)token_len)) in ossl_quic_wire_decode_pkt_hdr() 377 hdr->token = NULL; in ossl_quic_wire_decode_pkt_hdr() 379 hdr->token = NULL; in ossl_quic_wire_decode_pkt_hdr() 567 || !WPACKET_memcpy(pkt, hdr->token, hdr->token_len)) in ossl_quic_wire_encode_pkt_hdr()
|
H A D | quic_record_rx.c | 923 const unsigned char *token = rxe->hdr.token; in qrx_process_pkt() local 930 if (!qrx_relocate_buffer(qrx, &rxe, &i, &token, rxe->hdr.token_len)) in qrx_process_pkt() 933 rxe->hdr.token = token; in qrx_process_pkt()
|
/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 102 if (!token) { in TS_RESP_verify_signature() 106 if (!PKCS7_type_is_signed(token)) { in TS_RESP_verify_signature() 110 sinfos = PKCS7_get_signer_info(token); in TS_RESP_verify_signature() 116 if (PKCS7_get_detached(token)) { in TS_RESP_verify_signature() 125 signers = PKCS7_get0_signers(token, certs, 0); in TS_RESP_verify_signature() 140 p7bio = PKCS7_dataInit(token, NULL); in TS_RESP_verify_signature() 146 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature() 251 PKCS7 *token = response->token; in TS_RESP_verify_response() local 257 if (!int_ts_RESP_verify_token(ctx, token, tst_info)) in TS_RESP_verify_response() 269 int TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token) in TS_RESP_verify_token() argument [all …]
|
H A D | ts_asn1.c | 139 if (a->token) { 145 a->tst_info = PKCS7_to_TS_TST_INFO(a->token); 175 ASN1_OPT(TS_RESP, token, PKCS7), 204 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token) in PKCS7_to_TS_TST_INFO() argument 212 if (!PKCS7_type_is_signed(token)) { in PKCS7_to_TS_TST_INFO() 216 if (PKCS7_get_detached(token)) { in PKCS7_to_TS_TST_INFO() 220 pkcs7_signed = token->d.sign; in PKCS7_to_TS_TST_INFO()
|
H A D | ts_rsp_utils.c | 42 PKCS7_free(a->token); in TS_RESP_set_tst_info() 43 a->token = p7; in TS_RESP_set_tst_info() 50 return a->token; in TS_RESP_get_token()
|
H A D | ts_local.h | 27 PKCS7 *token; member
|
/openssl/fuzz/ |
H A D | quic-srtm.c | 76 || !PACKET_copy_bytes(&pkt, arg_token.token, in FuzzerTestOneInput() 77 sizeof(arg_token.token))) in FuzzerTestOneInput() 104 if (!PACKET_copy_bytes(&pkt, arg_token.token, in FuzzerTestOneInput() 105 sizeof(arg_token.token)) in FuzzerTestOneInput()
|
/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 78 signs them and sends the timestamp token back to the client. By 84 The TSA client receives the timestamp token and verifies the 199 and the timestamp token itself (ContentInfo), if the token generation was 201 response or timestamp token based on a request and printing the 204 otherwise it is a timestamp token (ContentInfo). 270 token or you want to extract the timestamp token from a response. If 272 'granted' status info is added to the token. (Optional) 557 To create a timestamp token instead of timestamp response: 565 To extract the timestamp token from a response: 586 To verify a timestamp token against the original data file: [all …]
|
/openssl/include/internal/ |
H A D | quic_srtm.h | 70 const QUIC_STATELESS_RESET_TOKEN *token); 100 const QUIC_STATELESS_RESET_TOKEN *token,
|
H A D | quic_srt_gen.h | 54 QUIC_STATELESS_RESET_TOKEN *token);
|
H A D | quic_types.h | 112 unsigned char token[QUIC_STATELESS_RESET_TOKEN_LEN]; member
|
H A D | quic_wire.h | 309 const unsigned char *token, 578 const unsigned char **token,
|
/openssl/apps/ |
H A D | ts.c | 639 PKCS7 *token = TS_RESP_get_token(response); in reply_command() local 640 if (!i2d_PKCS7_bio(out_bio, token)) in reply_command() 665 PKCS7 *token = NULL; in read_PKCS7() local 670 if ((token = d2i_PKCS7_bio(in_bio, NULL)) == NULL) in read_PKCS7() 672 if ((tst_info = PKCS7_to_TS_TST_INFO(token)) == NULL) in read_PKCS7() 682 TS_RESP_set_tst_info(resp, token, tst_info); in read_PKCS7() 683 token = NULL; /* Ownership is lost. */ in read_PKCS7() 688 PKCS7_free(token); in read_PKCS7() 859 PKCS7 *token = NULL; in verify_command() local 880 ? TS_RESP_verify_token(verify_ctx, token) in verify_command() [all …]
|
/openssl/crypto/perlasm/ |
H A D | x86_64-xlate.pl | 725 foreach my $token (split(/,\s*/,$line)) { 726 if ($token =~ /^%r/) { 727 push @ret,reg($token); 728 } elsif ($token =~ /((?:0x)?[0-9a-f]+)\((%r\w+)\)/) { 730 } elsif ($token =~ /(\w+):(\-?(?:0x)?[0-9a-f]+)(U?)/i) { 733 } elsif (my $i = 1*eval($token) or $token eq "0") { 734 if ($token =~ /^\+/) { 740 push @ret,$DW_OP_simple{$token};
|
/openssl/.github/workflows/ |
H A D | static-analysis.yml | 27 --post-data "token=${{ secrets.COVERITY_TOKEN }}&project=openssl%2Fopenssl" \ 41 curl --form token="${{ secrets.COVERITY_TOKEN }}" \
|
H A D | fips-label.yml | 53 github-token: ${{secrets.GITHUB_TOKEN}} 113 github-token: ${{secrets.GITHUB_TOKEN}}
|