/openssl/test/recipes/ |
H A D | 15-test_genrsa.t | 45 my $good = 11; # Log2 of number of bits (2 << 11 == 2048) 47 while ($good > $bad + 1) { 48 my $checked = int(($good + $bad + 1) / 2); 56 $good = $checked; 62 $good++ if $good == $bad; 63 $good = 2 ** $good; 64 note "Found lowest allowed amount of bits to be $good"; 68 '-pkeyopt', "rsa_keygen_bits:$good", 70 "genpkey $good"); 97 "genrsa -3 $good"); [all …]
|
/openssl/ssl/record/methods/ |
H A D | tls_pad.c | 33 size_t good, 62 size_t good; in ssl3_cbc_remove_padding_and_mac() local 74 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 75 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 78 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac() 107 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local 150 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac() 157 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac() 158 *reclen -= good & (padding_length + 1); in tls1_cbc_remove_padding_and_mac() 189 size_t good, in ssl3_cbc_copy_mac() argument [all …]
|
/openssl/test/ssl-tests/ |
H A D | 15-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
H A D | 16-dtls-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
H A D | 16-dtls-certstatus.cnf.in | 24 name => "certstatus-good", 59 name => "certstatus-good",
|
H A D | 15-certstatus.cnf.in | 20 name => "certstatus-good",
|
/openssl/test/ |
H A D | pkey_meth_test.c | 26 int good = 1; in test_asn1_meths() local 34 good = 0; in test_asn1_meths() 38 if (!good) { in test_asn1_meths() 50 return good; in test_asn1_meths() 59 int good = 1; in test_pkey_meths() local 67 good = 0; in test_pkey_meths() 71 if (!good) { in test_pkey_meths() 79 return good; in test_pkey_meths()
|
H A D | x509_internal_test.c | 32 int prev = -1, good = 1; in test_standard_exts() local 38 good = 0; in test_standard_exts() 42 if (!good) { in test_standard_exts() 48 return good; in test_standard_exts() 153 int good = 1; in test_a2i_ipaddress() local 160 good = 0; in test_a2i_ipaddress() 168 good = 0; in test_a2i_ipaddress() 172 return good; in test_a2i_ipaddress()
|
H A D | cmp_msg_test.c | 72 int good = fixture->expected != 0 ? \ 78 return good; \
|
H A D | README-external.md | 44 krb5's master has to pass this same CI, but a known-good version is
|
/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 210 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2() 211 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2() 240 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 272 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2() 411 unsigned int good, found_zero_byte; in ossl_rsa_padding_check_PKCS1_type_2() local 469 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2() 470 good &= constant_time_eq(from[1], 2); in ossl_rsa_padding_check_PKCS1_type_2() 553 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local 577 good &= constant_time_eq(from[1], 2); in ossl_rsa_padding_check_PKCS1_type_2_TLS() 622 good &= version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() [all …]
|
H A D | rsa_oaep.c | 175 unsigned int good = 0, found_one_byte, mask; in RSA_padding_check_PKCS1_OAEP_mgf1() local 253 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_OAEP_mgf1() 271 good &= constant_time_is_zero(CRYPTO_memcmp(db, phash, mdlen)); in RSA_padding_check_PKCS1_OAEP_mgf1() 283 good &= (found_one_byte | equals0); in RSA_padding_check_PKCS1_OAEP_mgf1() 286 good &= found_one_byte; in RSA_padding_check_PKCS1_OAEP_mgf1() 299 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 319 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 333 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_OAEP_mgf1() 340 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
/openssl/external/perl/Text-Template-1.56/t/ |
H A D | warnings.t | 34 my $result = $template->fill_in(HASH => { good => 'good' });
|
/openssl/demos/sslecho/ |
H A D | A-SSL-Docs.txt | 13 Generate self signed cert and key 'pem' files (good for 10 years):
|
/openssl/doc/designs/quic-design/ |
H A D | quic-connID-retire.md | 43 * Retransmits use different route, so they are good. 50 * May respond with a new connection ID frame (it's a good idea)
|
H A D | debugging.md | 26 Both of these approaches have good GUI visualisation tools available for viewing
|
/openssl/crypto/ocsp/ |
H A D | ocsp_local.h | 129 ASN1_NULL *good; member
|
H A D | ocsp_asn.c | 86 ASN1_IMP(OCSP_CERTSTATUS, value.good, ASN1_NULL, 0),
|
H A D | ocsp_srv.c | 135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
|
/openssl/doc/man3/ |
H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>,
|
H A D | OPENSSL_secure_malloc.pod | 47 It is a good idea to review the code and see if it addresses your
|
H A D | BF_encrypt.pod | 45 considered good for strong encryption. Blowfish can be used in the same
|
/openssl/doc/internal/man3/ |
H A D | OPENSSL_SA.pod | 36 POD is pretty good at recognising function names and making them appropriately
|
/openssl/doc/designs/ddd/ |
H A D | README.md | 15 As such, it is useful for the OpenSSL project to have a good understanding of
|
/openssl/exporters/cmake/ |
H A D | OpenSSLConfig.cmake.in | 66 # All targets are defined, we're good, just undo everything and return
|