/openssl-master/crypto/async/ |
A D | async_wait.c | 33 curr->cleanup(ctx, curr->key, curr->fd, curr->custom_data); in ASYNC_WAIT_CTX_free() 75 curr = curr->next; in ASYNC_WAIT_CTX_get_fd() 83 curr = curr->next; in ASYNC_WAIT_CTX_get_fd() 98 curr = curr->next; in ASYNC_WAIT_CTX_get_all_fds() 106 curr = curr->next; in ASYNC_WAIT_CTX_get_all_fds() 126 if (curr->del && !curr->add && (delfd != NULL)) { in ASYNC_WAIT_CTX_get_changed_fds() 130 if (curr->add && !curr->del && (addfd != NULL)) { in ASYNC_WAIT_CTX_get_changed_fds() 134 curr = curr->next; in ASYNC_WAIT_CTX_get_changed_fds() 150 curr = curr->next; in ASYNC_WAIT_CTX_clear_fd() 180 curr = curr->next; in ASYNC_WAIT_CTX_clear_fd() [all …]
|
/openssl-master/crypto/x509/ |
A D | pcy_tree.c | 46 if (!curr) in tree_print() 49 curr++; in tree_print() 393 nodes = curr->nodes; in tree_prune() 407 --curr; in tree_prune() 408 nodes = curr->nodes; in tree_prune() 417 if (curr->anyPolicy && !curr->anyPolicy->nchild) { in tree_prune() 466 X509_POLICY_LEVEL *curr; in tree_calculate_authority_set() local 473 if (curr->anyPolicy) { in tree_calculate_authority_set() 481 curr = tree->levels; in tree_calculate_authority_set() 489 curr++; in tree_calculate_authority_set() [all …]
|
A D | x509_vfy.c | 3061 X509 *curr, *issuer = NULL; in build_chain() local 3099 curr = sk_X509_value(ctx->chain, i - 1); in build_chain() 3102 ok = num > max_depth ? 0 : get1_trusted_issuer(&issuer, ctx, curr); in build_chain() 3111 int self_signed = X509_self_signed(curr, 0); in build_chain() 3170 if (X509_cmp(curr, issuer) != 0) { in build_chain() 3175 X509_free(curr); in build_chain() 3233 curr = sk_X509_value(ctx->chain, num - 1); in build_chain() 3234 issuer = (X509_self_signed(curr, 0) > 0 || num > max_depth) ? in build_chain() 3235 NULL : find_issuer(ctx, sk_untrusted, curr); in build_chain()
|
/openssl-master/crypto/ |
A D | initthread.c | 329 curr = *hands; in init_thread_stop() 330 while (curr != NULL) { in init_thread_stop() 332 prev = curr; in init_thread_stop() 333 curr = curr->next; in init_thread_stop() 336 curr->handfn(curr->arg); in init_thread_stop() 342 tmp = curr; in init_thread_stop() 343 curr = curr->next; in init_thread_stop() 435 curr = *hands; in init_thread_deregister() 443 curr = curr->next; in init_thread_deregister() 447 prev = curr; in init_thread_deregister() [all …]
|
A D | packet.c | 22 pkt->curr += len; in WPACKET_allocate_bytes() 104 pkt->curr = 0; in wpacket_intern_init_len() 250 if ((pkt->curr - sub->lenbytes) == sub->packet_len) { in wpacket_intern_close() 252 pkt->curr -= sub->lenbytes; in wpacket_intern_close() 493 return buf + pkt->maxsize - pkt->curr; in WPACKET_get_curr() 495 return buf + pkt->curr; in WPACKET_get_curr()
|
A D | provider_core.c | 1275 int ret = 0, curr, max, ref = 0; in ossl_provider_doall_activated() local 1309 for (curr = max - 1; curr >= 0; curr--) { in ossl_provider_doall_activated() 1310 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated() 1338 sk_OSSL_PROVIDER_delete(provs, curr); in ossl_provider_doall_activated() 1348 for (curr = 0; curr < max; curr++) { in ossl_provider_doall_activated() 1349 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated() 1354 curr = -1; in ossl_provider_doall_activated() 1367 for (curr++; curr < max; curr++) { in ossl_provider_doall_activated() 1368 OSSL_PROVIDER *prov = sk_OSSL_PROVIDER_value(provs, curr); in ossl_provider_doall_activated()
|
/openssl-master/include/internal/ |
A D | packet.h | 24 const unsigned char *curr; member 32 pkt->curr += len; in packet_forward() 61 return pkt->curr; in PACKET_data() 77 pkt->curr = buf; in PACKET_buf_init() 85 pkt->curr = NULL; in PACKET_null_init() 262 *data = *pkt->curr; in PACKET_peek_1() 300 *data = *pkt->curr; in PACKET_peek_4() 336 *data = pkt->curr; in PACKET_peek_bytes() 493 subpkt->curr = data; in PACKET_get_length_prefixed_1() 516 subpkt->curr = data; in PACKET_as_length_prefixed_1() [all …]
|
/openssl-master/ssl/ |
A D | ssl_ciph.c | 646 curr->prev->next = curr->next; in ll_append_tail() 648 curr->next->prev = curr->prev; in ll_append_tail() 663 curr->next->prev = curr->prev; in ll_append_head() 665 curr->prev->next = curr->next; in ll_append_head() 847 next = reverse ? curr->prev : curr->next; in ssl_cipher_apply_rule() 923 curr->prev->next = curr->next; in ssl_cipher_apply_rule() 928 curr->next->prev = curr->prev; in ssl_cipher_apply_rule() 930 curr->prev->next = curr->next; in ssl_cipher_apply_rule() 959 curr = curr->next; in ssl_cipher_strength_sort() 975 curr = curr->next; in ssl_cipher_strength_sort() [all …]
|
A D | pqueue.c | 55 pitem *curr, *next; in pqueue_insert() local 62 for (curr = NULL, next = pq->items; in pqueue_insert() 63 next != NULL; curr = next, next = next->next) { in pqueue_insert() 71 if (curr == NULL) in pqueue_insert() 74 curr->next = item; in pqueue_insert() 84 curr->next = item; in pqueue_insert()
|
A D | t1_lib.c | 2522 const SIGALG_LOOKUP *curr; in tls1_set_sigalgs() local 2526 for (j = 0, curr = sigalg_lookup_tbl; j < OSSL_NELEM(sigalg_lookup_tbl); in tls1_set_sigalgs() 2527 j++, curr++) { in tls1_set_sigalgs() 2528 if (curr->hash == md_id && curr->sig == sig_id) { in tls1_set_sigalgs() 2529 *sptr++ = curr->sigalg; in tls1_set_sigalgs()
|
/openssl-master/crypto/err/ |
A D | err_prn.c | 76 const char *curr = txt, *next = txt; in ERR_add_error_txt() local 101 curr = NULL; /* no need to split */ in ERR_add_error_txt() 104 curr = next; /* will split at this point */ in ERR_add_error_txt() 108 curr = next; in ERR_add_error_txt() 109 next = strstr(curr, separator); in ERR_add_error_txt() 114 next = curr + strlen(curr); in ERR_add_error_txt() 118 curr = NULL; /* the above loop implies *next == '\0' */ in ERR_add_error_txt() 120 if (curr != NULL) { in ERR_add_error_txt() 122 if (curr != txt) { in ERR_add_error_txt() 123 tmp = OPENSSL_strndup(txt, curr - txt); in ERR_add_error_txt() [all …]
|
/openssl-master/test/ |
A D | params_conversion_test.c | 67 TEST_info("Line %d: multiple type lines", s->curr); in param_conversion_load_stanza() 72 TEST_info("Line %d: unknown type line", s->curr); in param_conversion_load_stanza() 126 s->curr, p, pp->key); in param_conversion_load_stanza() 132 TEST_info("Line %d: type not found", s->curr); in param_conversion_load_stanza() 138 TEST_note("errant int32 on line %d", s->curr); in param_conversion_load_stanza() 147 TEST_note("errant int64 on line %d", s->curr); in param_conversion_load_stanza() 156 TEST_note("errant uint32 on line %d", s->curr); in param_conversion_load_stanza() 165 TEST_note("errant uint64 on line %d", s->curr); in param_conversion_load_stanza() 174 TEST_note("errant double on line %d", s->curr); in param_conversion_load_stanza() 182 TEST_error("type unknown at line %d", s->curr); in param_conversion_load_stanza() [all …]
|
A D | bio_prefix_text.c | 108 BIO *curr = BIO_new(BIO_f_prefix()); in setup_bio_chain() local 110 if (curr == NULL) in setup_bio_chain() 112 chain[i] = BIO_push(curr, next); in setup_bio_chain()
|
A D | tls13encryptiontest.c | 204 size_t outer, inner, curr = 0; in multihexstr2buf() local 231 outbuf[curr++] = (hi << 4) | lo; in multihexstr2buf()
|
A D | evp_pkey_provided_test.c | 41 char *curr, *writ; in stripcr() local 43 for (i = *len, curr = buf, writ = buf; i > 0; i--, curr++) { in stripcr() 44 if (*curr == '\r') { in stripcr() 48 if (curr != writ) in stripcr() 49 *writ = *curr; in stripcr()
|
A D | sslapitest.c | 2931 const sigalgs_list *curr; in test_set_sigalgs() local 2939 curr = testctx ? &testsigalgs[idx] in test_set_sigalgs() 2952 if (curr->list != NULL) in test_set_sigalgs() 2953 ret = SSL_CTX_set1_sigalgs(cctx, curr->list, curr->listlen); in test_set_sigalgs() 2958 if (curr->valid) in test_set_sigalgs() 2964 if (!curr->valid) { in test_set_sigalgs() 2977 if (curr->list != NULL) in test_set_sigalgs() 2978 ret = SSL_set1_sigalgs(clientssl, curr->list, curr->listlen); in test_set_sigalgs() 2982 if (curr->valid) in test_set_sigalgs() 2988 if (!curr->valid) in test_set_sigalgs() [all …]
|
A D | evp_test.c | 3676 TEST_info("Line %d: missing blank line\n", t->s.curr); in parse() 3706 t->s.curr); in parse() 3710 TEST_info("Line %d: multiple result lines", t->s.curr); in parse() 3718 TEST_info("Line %d: multiple reason lines", t->s.curr); in parse() 3727 TEST_info("Line %d: unknown keyword %s", t->s.curr, pp->key); in parse() 3732 t->s.curr, pp->key, pp->value); in parse()
|
A D | testutil.h | 531 int curr; /* Current line in file */ member
|
/openssl-master/test/testutil/ |
A D | stanza.c | 54 s->curr++; in read_key() 93 s->curr++; in test_readstanza() 95 TEST_info("Line %d too long", s->curr); in test_readstanza() 110 TEST_info("Missing = at line %d\n", s->curr); in test_readstanza() 115 TEST_info("Empty field at line %d\n", s->curr); in test_readstanza() 122 TEST_info("Starting \"%s\" tests at line %d", value, s->curr); in test_readstanza() 127 s->start = s->curr; in test_readstanza()
|
/openssl-master/util/ |
A D | check-format-test-negatives.c | 295 const char *curr = txt, *next = txt; in fun() local
|
A D | check-format.pl | 365 my $curr = substr($str, $i); 366 if ($curr =~ m/^(.*?)([{}()?:;\[\]])(.*)$/) { # match from position $i the first {}()?:;[]
|
/openssl-master/apps/lib/ |
A D | s_cb.c | 982 SSL_EXCERT *curr; in ssl_excert_free() local 990 curr = exc; in ssl_excert_free() 992 OPENSSL_free(curr); in ssl_excert_free()
|