/openssl/crypto/ |
H A D | self_test_core.c | 23 const char *phase; member 82 (char *)st->phase, 0); in self_test_setparams() 102 ret->phase = ""; in OSSL_SELF_TEST_new() 119 st->phase = OSSL_SELF_TEST_PHASE_START; in OSSL_SELF_TEST_onbegin() 134 st->phase = in OSSL_SELF_TEST_onend() 139 st->phase = OSSL_SELF_TEST_PHASE_NONE; in OSSL_SELF_TEST_onend() 156 st->phase = OSSL_SELF_TEST_PHASE_CORRUPT; in OSSL_SELF_TEST_oncorrupt_byte()
|
/openssl/test/ |
H A D | provider_status_test.c | 54 const char *phase = NULL, *type = NULL, *desc = NULL; in self_test_events() local 64 phase = (const char *)p->data; in self_test_events() 76 if (strcmp(phase, OSSL_SELF_TEST_PHASE_START) == 0) in self_test_events() 78 else if (strcmp(phase, OSSL_SELF_TEST_PHASE_PASS) == 0 in self_test_events() 79 || strcmp(phase, OSSL_SELF_TEST_PHASE_FAIL) == 0) in self_test_events() 80 BIO_printf(bio_out, "%s\n", phase); in self_test_events() 85 if (corrupt && strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0) in self_test_events()
|
H A D | pairwise_fail_test.c | 52 const char *type = NULL, *phase = NULL; in self_test_on_pairwise_fail() local 57 phase = (const char *)p->data; in self_test_on_pairwise_fail() 58 if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0) { in self_test_on_pairwise_fail()
|
H A D | acvp_test.c | 1535 const char *phase = NULL, *type = NULL, *desc = NULL; in self_test_events() local 1545 phase = (const char *)p->data; in self_test_events() 1557 BIO_printf(bio_out, "%s %s %s\n", phase, desc, type); in self_test_events()
|
/openssl/util/ |
H A D | mkerr.pl | 32 sub phase subroutine 185 &phase("Reading state"); 258 &phase("Scanning source"); 290 &phase("Writing files"); 658 &phase("Ending");
|
/openssl/apps/ |
H A D | fipsinstall.c | 932 const char *phase = NULL, *type = NULL, *desc = NULL; in self_test_events() local 938 phase = (const char *)p->data; in self_test_events() 951 if (strcmp(phase, OSSL_SELF_TEST_PHASE_START) == 0) in self_test_events() 953 else if (strcmp(phase, OSSL_SELF_TEST_PHASE_PASS) == 0 in self_test_events() 954 || strcmp(phase, OSSL_SELF_TEST_PHASE_FAIL) == 0) in self_test_events() 955 BIO_printf(bio_err, "%s\n", phase); in self_test_events() 961 if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0 in self_test_events() 970 BIO_printf(bio_err, "%s ", phase); in self_test_events()
|
/openssl/crypto/sha/asm/ |
H A D | sha512-586.pl | 97 my $phase=shift; 108 &movq ($A,"mm3") if ($phase<2); 148 &movq ("mm7",&QWP(8*(9+16-1),"esp")) if ($phase!=0); # pre-fetch 149 &movq ("mm5",$Fsse2) if ($phase==0); # load f 151 if ($phase>1) { 162 &movq ("mm6",$Gsse2) if ($phase==0); # load g
|
/openssl/doc/man7/ |
H A D | OSSL_PROVIDER-FIPS.pod | 440 const char *phase = NULL, *type = NULL, *desc = NULL; 445 phase = (const char *)p->data; 458 if (strcmp(phase, OSSL_SELF_TEST_PHASE_START) == 0) 460 if (strcmp(phase, OSSL_SELF_TEST_PHASE_PASS) == 0 461 || strcmp(phase, OSSL_SELF_TEST_PHASE_FAIL) == 0) 462 BIO_printf(bio_out, "%s\n", phase); 464 /* Corrupt the SHA1 self test during the 'corrupt' phase by returning 0 */ 465 if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0 467 BIO_printf(bio_out, "%s %s", phase, desc);
|
H A D | ossl-guide-tls-introduction.pod | 246 A TLS connection starts with an initial "set up" phase. The endpoint creates the 258 After set up is complete the TLS "handshake" phase begins. A TLS handshake 269 be in-flight, so the server is still in the handshake phase. It is even possible 276 Once the handshake is complete the application data transfer phase begins. 284 during this phase is application data. Some protocol level messages may still
|
/openssl/test/helpers/ |
H A D | handshake.c | 1117 connect_phase_t phase) in next_phase() argument 1119 switch (phase) { in next_phase() 1144 connect_phase_t phase) in do_connect_step() argument 1146 switch (phase) { in do_connect_step() 1429 connect_phase_t phase = HANDSHAKE; in do_handshake_internal() local 1558 do_connect_step(test_ctx, &client, phase); in do_handshake_internal() 1564 do_connect_step(test_ctx, &server, phase); in do_handshake_internal() 1572 phase = next_phase(test_ctx, phase); in do_handshake_internal() 1573 if (phase == CONNECTION_DONE) { in do_handshake_internal()
|
/openssl/doc/man3/ |
H A D | RC4_set_key.pod | 34 RC4 consists of a key setup phase and the actual encryption or 35 decryption phase.
|
H A D | OSSL_SELF_TEST_new.pod | 44 =item "st-phase" (B<OSSL_PROV_PARAM_SELF_TEST_PHASE>) <UTF8 string> 61 =item "st-phase" (B<OSSL_PROV_PARAM_SELF_TEST_PHASE>) <UTF8 string> 75 =item "st-phase" (B<OSSL_PROV_PARAM_SELF_TEST_PHASE>) <UTF8 string>
|
H A D | BF_encrypt.pod | 50 Blowfish consists of a key setup phase and the actual encryption or decryption 51 phase.
|
H A D | EVP_set_default_properties.pod | 48 phase of a I<libctx>.
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 72 during the connection setup phase. The callback is set using the functions
|
H A D | SSL_CTX_set_psk_client_callback.pod | 106 the pre-shared key to use during the connection setup phase.
|
/openssl/crypto/bn/asm/ |
H A D | bn-c64xplus.asm | 293 ;; because of low-counter effect, when prologue phase finishes
|
/openssl/doc/designs/quic-design/ |
H A D | quic-tls.md | 218 managed buffer. This is inefficient, so it is expected that a later phase of
|
H A D | glossary.md | 76 **Key Phase:** Key phase bit in QUIC packet headers. See RFC 9000.
|
/openssl/ |
H A D | CHANGES.md | 20898 * Now Fortezza is denied in the authentication phase because
|