/openssl-master/test/ssl-tests/ |
A D | 12-ct.cnf | 5 test-0 = 0-ct-permissive-without-scts 6 test-1 = 1-ct-permissive-with-scts 7 test-2 = 2-ct-strict-without-scts 8 test-3 = 3-ct-strict-with-scts 10 test-5 = 5-ct-strict-resumption 13 [0-ct-permissive-without-scts] 40 [1-ct-permissive-with-scts] 67 [2-ct-strict-without-scts] 95 [3-ct-strict-with-scts] 98 [3-ct-strict-with-scts-ssl] [all …]
|
A D | 12-ct.cnf.in | 20 name => "ct-permissive-without-scts", 35 name => "ct-permissive-with-scts", 53 name => "ct-strict-without-scts", 69 name => "ct-strict-with-scts", 87 name => "ct-permissive-resumption", 107 name => "ct-strict-resumption",
|
/openssl-master/crypto/aes/ |
A D | aes_local.h | 21 # define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); } argument 24 # define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((… argument
|
/openssl-master/test/ |
A D | aesgcmtest.c | 38 static int do_encrypt(unsigned char *iv_gen, unsigned char *ct, int *ct_len, in do_encrypt() argument 54 && TEST_true(EVP_EncryptUpdate(ctx, ct, ct_len, gcm_pt, in do_encrypt() 66 static int do_decrypt(const unsigned char *iv, const unsigned char *ct, in do_decrypt() argument 82 && TEST_true(EVP_DecryptUpdate(ctx, pt, &ptlen, ct, in do_decrypt() 96 unsigned char ct[32]; in kat_test() local 99 return do_encrypt(NULL, ct, &ctlen, tag, &taglen) in kat_test() 100 && TEST_mem_eq(gcm_ct, sizeof(gcm_ct), ct, ctlen) in kat_test() 102 && do_decrypt(gcm_iv, ct, ctlen, tag, taglen); in kat_test() 124 unsigned char ct[32]; in ivgen_test() local 127 return do_encrypt(iv_gen, ct, &ctlen, tag, &taglen) in ivgen_test() [all …]
|
A D | evp_libctx_test.c | 530 unsigned char ct[256] = { 0, }; in kem_rsa_gen_recover() local 544 && TEST_int_eq(EVP_PKEY_encapsulate(dctx, ct, &ctlen, secret, in kem_rsa_gen_recover() 550 ct, ctlen), 1) in kem_rsa_gen_recover() 552 ct, ctlen), 1) in kem_rsa_gen_recover() 596 unsigned char ct[256] = { 0, }; in kem_rsa_params() local 615 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params() 616 sizeof(ct)), 0) in kem_rsa_params() 639 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, NULL, NULL), 0) in kem_rsa_params() 645 && TEST_int_eq(EVP_PKEY_decapsulate(privctx, secret, NULL, ct, sizeof(ct)), 1) in kem_rsa_params() 646 && TEST_int_eq(EVP_PKEY_decapsulate(privctx, NULL, &secretlen, ct, sizeof(ct)), 1) in kem_rsa_params() [all …]
|
A D | evp_fetch_prov_test.c | 247 unsigned char ct[64], pt[64]; in encrypt_decrypt() local 252 || !TEST_true(EVP_CipherUpdate(ctx, ct, &ctlen, msg, len)) in encrypt_decrypt() 253 || !TEST_true(EVP_CipherFinal_ex(ctx, ct, &ctlen)) in encrypt_decrypt() 255 || !TEST_true(EVP_CipherUpdate(ctx, pt, &ptlen, ct, ctlen)) in encrypt_decrypt()
|
A D | acvp_test.c | 675 const unsigned char *ct, size_t ct_len, in cipher_enc() argument 692 if (!TEST_mem_eq(out, out_len, ct, ct_len)) in cipher_enc() 709 tst->ct, tst->ct_len, enc)) in cipher_enc_dec_test() 758 || !TEST_mem_eq(out, out_len, ct, ct_len) in aes_ccm_enc_dec() 762 if (!TEST_mem_eq(out, out_len + len, ct, ct_len)) in aes_ccm_enc_dec() 780 const unsigned char *tag = tst->ct + ct_len; in aes_ccm_enc_dec_test() 791 && aes_ccm_enc_dec(tst->alg, tst->ct, ct_len, in aes_ccm_enc_dec_test() 796 && aes_ccm_enc_dec(tst->alg, tst->ct, ct_len, in aes_ccm_enc_dec_test() 852 if (!TEST_mem_eq(out, out_len, ct, ct_len) in aes_gcm_enc_dec() 858 if (!TEST_mem_eq(out, out_len, ct, ct_len)) in aes_gcm_enc_dec() [all …]
|
A D | tls-provider.c | 329 unsigned char *ct, size_t *ctlen, in xor_encapsulate() argument 345 if (ct == NULL || ss == NULL) { in xor_encapsulate() 366 memcpy(ct, ourkey->pubkey, XOR_KEY_SIZE); in xor_encapsulate() 388 const unsigned char *ct, size_t ctlen) in xor_decapsulate() argument 414 memcpy(peerkey->pubkey, ct, XOR_KEY_SIZE); in xor_decapsulate()
|
/openssl-master/fuzz/ |
A D | build.info | 22 IF[{- !$disabled{"ct"} -}] 23 PROGRAMS{noinst}=ct 62 SOURCE[ct]=ct.c driver.c 63 INCLUDE[ct]=../include {- $ex_inc -} 64 DEPEND[ct]=../libcrypto {- $ex_lib -} 86 IF[{- !$disabled{"ct"} -}] 87 PROGRAMS{noinst}=ct-test 127 SOURCE[ct-test]=ct.c test-corpus.c 128 INCLUDE[ct-test]=../include 129 DEPEND[ct-test]=../libcrypto
|
/openssl-master/util/ |
A D | cavs-to-evptest.pl | 20 my $ct = ""; 72 $ct = substr($2, 0, length($2) - ($taglen * 2)); 106 print "\nCiphertext = $ct\n";
|
/openssl-master/doc/man7/ |
A D | ct.pod | 5 ct - Certificate Transparency 9 #include <openssl/ct.h> 42 The ct library was added in OpenSSL 1.1.0.
|
/openssl-master/apps/ |
A D | tsget.in | 109 my $ct = $curl->getinfo(CURLINFO_CONTENT_TYPE); 110 if (lc($ct) ne "application/timestamp-reply" 111 && lc($ct) ne "application/timestamp-response") { 112 $error_string = "unexpected content type returned: $ct";
|
/openssl-master/crypto/objects/ |
A D | objects.txt | 266 id-smime-ct 1 : id-smime-ct-receipt 267 id-smime-ct 2 : id-smime-ct-authData 268 id-smime-ct 3 : id-smime-ct-publishCert 269 id-smime-ct 4 : id-smime-ct-TSTInfo 270 id-smime-ct 5 : id-smime-ct-TDTInfo 271 id-smime-ct 6 : id-smime-ct-contentInfo 277 id-smime-ct 24 : id-ct-routeOriginAuthz 278 id-smime-ct 26 : id-ct-rpkiManifest 280 id-smime-ct 28 : id-ct-xml 284 id-smime-ct 48 : id-ct-signedChecklist [all …]
|
/openssl-master/doc/man3/ |
A D | CTLOG_STORE_get0_log_by_id.pod | 10 #include <openssl/ct.h> 33 L<ct(7)>,
|
A D | o2i_SCT_LIST.pod | 10 #include <openssl/ct.h> 32 L<ct(7)>,
|
A D | SCT_print.pod | 10 #include <openssl/ct.h> 39 L<ct(7)>,
|
A D | CTLOG_STORE_new.pod | 12 #include <openssl/ct.h> 70 L<ct(7)>,
|
A D | SCT_validate.pod | 10 #include <openssl/ct.h> 89 L<ct(7)>
|
A D | CTLOG_new.pod | 12 #include <openssl/ct.h> 74 L<ct(7)>
|
A D | CT_POLICY_EVAL_CTX_new.pod | 15 #include <openssl/ct.h> 124 L<ct(7)>
|
A D | SCT_new.pod | 18 #include <openssl/ct.h> 203 L<ct(7)>,
|
/openssl-master/ |
A D | build.info | 28 include/openssl/ct.h \ 55 GENERATE[include/openssl/ct.h]=include/openssl/ct.h.in
|
/openssl-master/ssl/statem/ |
A D | extensions_srvr.c | 464 unsigned int ct, mki_len, id; in tls_parse_ctos_use_srtp() local 473 if (!PACKET_get_net_2(pkt, &ct) || (ct & 1) != 0 in tls_parse_ctos_use_srtp() 474 || !PACKET_get_sub_packet(pkt, &subpkt, ct)) { in tls_parse_ctos_use_srtp() 1666 unsigned char *ct = NULL; in tls_construct_stoc_key_share() local 1675 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) { in tls_construct_stoc_key_share() 1682 OPENSSL_free(ct); in tls_construct_stoc_key_share() 1686 if (!WPACKET_sub_memcpy_u16(pkt, ct, ctlen) in tls_construct_stoc_key_share() 1689 OPENSSL_free(ct); in tls_construct_stoc_key_share() 1692 OPENSSL_free(ct); in tls_construct_stoc_key_share()
|
/openssl-master/include/crypto/ |
A D | sm2.h | 70 int ossl_sm2_plaintext_size(const unsigned char *ct, size_t ct_size,
|
/openssl-master/crypto/sm2/ |
A D | sm2_crypt.c | 70 int ossl_sm2_plaintext_size(const unsigned char *ct, size_t ct_size, in ossl_sm2_plaintext_size() argument 75 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ct, ct_size); in ossl_sm2_plaintext_size()
|