/openssl-master/test/ |
A D | dtls_mtu_test.c | 49 static int mtu_test(SSL_CTX *ctx, const char *cs, int no_etm) in mtu_test() argument 68 if (!TEST_true(SSL_set_cipher_list(srvr_ssl, cs)) in mtu_test() 69 || !TEST_true(SSL_set_cipher_list(clnt_ssl, cs)) in mtu_test() 85 cs, no_etm ? "-noEtM" : "", in mtu_test() 88 TEST_info("Cipher %s MTU %d", cs, 500 + i); in mtu_test() 118 cs, (unsigned long)s, (unsigned long)mtus[i], in mtu_test() 129 cs, (unsigned long)s, (unsigned long)mtus[i], in mtu_test()
|
A D | destest.c | 670 DES_LONG cs; in test_des_cbc_cksum() local 675 cs = DES_cbc_cksum(cbc_data, &cret, strlen((char *)cbc_data), &ks, in test_des_cbc_cksum() 677 if (!TEST_cs_eq(cs, cbc_cksum_ret)) in test_des_cbc_cksum() 684 DES_LONG cs, lqret[4]; in test_des_quad_cksum() local 686 cs = DES_quad_cksum(cbc_data, (DES_cblock *)lqret, in test_des_quad_cksum() 689 if (!TEST_cs_eq(cs, 0x70d7a63aL)) in test_des_quad_cksum()
|
A D | test_test.c | 415 const char cs[] = "-" /* 64 characters plus sign */ in test_long_bignum() local 426 && TEST_true(BN_hex2bn(&c, cs)) in test_long_bignum()
|
/openssl-master/crypto/ec/curve448/arch_32/ |
A D | f_impl32.c | 24 void gf_mul(gf_s * RESTRICT cs, const gf as, const gf bs) 27 uint32_t *c = cs->limb; 73 void gf_mulw_unsigned(gf_s * RESTRICT cs, const gf as, uint32_t b) 76 uint32_t *c = cs->limb; 101 void gf_sqr(gf_s * RESTRICT cs, const gf as) 103 gf_mul(cs, as, as); /* Performs better with a dedicated square */
|
/openssl-master/crypto/ec/curve448/arch_64/ |
A D | f_impl64.c | 24 void gf_mul(gf_s * RESTRICT cs, const gf as, const gf bs) 27 uint64_t *c = cs->limb; 76 void gf_mulw_unsigned(gf_s * RESTRICT cs, const gf as, uint32_t b) 79 uint64_t *c = cs->limb; 102 void gf_sqr(gf_s * RESTRICT cs, const gf as) 105 uint64_t *c = cs->limb;
|
/openssl-master/crypto/ocsp/ |
A D | ocsp_srv.c | 93 OCSP_CERTSTATUS *cs; in OCSP_basic_add1_status() local 115 cs = single->certStatus; in OCSP_basic_add1_status() 116 switch (cs->type = status) { in OCSP_basic_add1_status() 122 if ((cs->value.revoked = ri = OCSP_REVOKEDINFO_new()) == NULL) in OCSP_basic_add1_status() 135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status() 140 if ((cs->value.unknown = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
|
/openssl-master/crypto/srp/ |
A D | srp_lib.c | 149 unsigned char *cs = NULL; in SRP_Calc_x_ex() local 159 if ((cs = OPENSSL_malloc(BN_num_bytes(s))) == NULL) in SRP_Calc_x_ex() 173 if (BN_bn2bin(s, cs) < 0) in SRP_Calc_x_ex() 175 if (!EVP_DigestUpdate(ctxt, cs, BN_num_bytes(s))) in SRP_Calc_x_ex() 186 OPENSSL_free(cs); in SRP_Calc_x_ex()
|
/openssl-master/ssl/ |
A D | t1_trce.c | 952 unsigned int cs; in ssl_print_client_hello() local 974 cs = (msg[0] << 8) | msg[1]; in ssl_print_client_hello() 977 msg[0], msg[1], ssl_trace_str(cs, ssl_ciphers_tbl)); in ssl_print_client_hello() 1018 unsigned int cs; in ssl_print_server_hello() local 1030 cs = (msg[0] << 8) | msg[1]; in ssl_print_server_hello() 1033 msg[0], msg[1], ssl_trace_str(cs, ssl_ciphers_tbl)); in ssl_print_server_hello()
|
/openssl-master/util/perl/OpenSSL/ |
A D | Test.pm | 733 my @cs = (); 742 push @cs, $c; 747 join(" | ", @cs),
|
/openssl-master/include/openssl/ |
A D | ocsp.h.in | 167 # define OCSP_CERTSTATUS_dup(cs)\ argument 169 (d2i_of_void *)d2i_OCSP_CERTSTATUS,(char *)(cs))
|
/openssl-master/apps/lib/ |
A D | s_cb.c | 1533 const char *cs = SSL_is_server(s) ? "server" : "client"; in print_ca_names() local 1539 BIO_printf(bio, "---\nNo %s certificate CA names sent\n", cs); in print_ca_names() 1543 BIO_printf(bio, "---\nAcceptable %s certificate CA names\n", cs); in print_ca_names()
|
/openssl-master/ |
A D | CHANGES.md | 1439 <http://web.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf> 7490 <peter.sylvester@edelweb.fr>, Tom Wu <tjw@cs.stanford.edu>, and 10227 *Nagendra Modadugu <nagendra@cs.stanford.edu> and Ben Laurie* 15676 *Steve Henson, pointed out by Brian Korver <briank@cs.stanford.edu>*
|