/openssl-master/crypto/ |
A D | self_test_core.c | 24 const char *phase; member 90 (char *)st->phase, 0); in self_test_setparams() 110 ret->phase = ""; in OSSL_SELF_TEST_new() 127 st->phase = OSSL_SELF_TEST_PHASE_START; in OSSL_SELF_TEST_onbegin() 142 st->phase = in OSSL_SELF_TEST_onend() 147 st->phase = OSSL_SELF_TEST_PHASE_NONE; in OSSL_SELF_TEST_onend() 164 st->phase = OSSL_SELF_TEST_PHASE_CORRUPT; in OSSL_SELF_TEST_oncorrupt_byte()
|
/openssl-master/test/ |
A D | provider_status_test.c | 53 const char *phase = NULL, *type = NULL, *desc = NULL; in self_test_events() local 63 phase = (const char *)p->data; in self_test_events() 75 if (strcmp(phase, OSSL_SELF_TEST_PHASE_START) == 0) in self_test_events() 77 else if (strcmp(phase, OSSL_SELF_TEST_PHASE_PASS) == 0 in self_test_events() 78 || strcmp(phase, OSSL_SELF_TEST_PHASE_FAIL) == 0) in self_test_events() 79 BIO_printf(bio_out, "%s\n", phase); in self_test_events() 84 if (corrupt && strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0) in self_test_events()
|
A D | acvp_test.c | 1282 const char *phase = NULL, *type = NULL, *desc = NULL; in self_test_events() local 1292 phase = (const char *)p->data; in self_test_events() 1304 BIO_printf(bio_out, "%s %s %s\n", phase, desc, type); in self_test_events()
|
/openssl-master/apps/ |
A D | fipsinstall.c | 545 const char *phase = NULL, *type = NULL, *desc = NULL; in self_test_events() local 551 phase = (const char *)p->data; in self_test_events() 564 if (strcmp(phase, OSSL_SELF_TEST_PHASE_START) == 0) in self_test_events() 566 else if (strcmp(phase, OSSL_SELF_TEST_PHASE_PASS) == 0 in self_test_events() 567 || strcmp(phase, OSSL_SELF_TEST_PHASE_FAIL) == 0) in self_test_events() 568 BIO_printf(bio_err, "%s\n", phase); in self_test_events() 574 if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0 in self_test_events() 583 BIO_printf(bio_err, "%s ", phase); in self_test_events()
|
/openssl-master/util/ |
A D | mkerr.pl | 32 sub phase subroutine 184 &phase("Reading state"); 257 &phase("Scanning source"); 289 &phase("Writing files"); 650 &phase("Ending");
|
/openssl-master/doc/man7/ |
A D | OSSL_PROVIDER-FIPS.pod | 354 const char *phase = NULL, *type = NULL, *desc = NULL; 359 phase = (const char *)p->data; 372 if (strcmp(phase, OSSL_SELF_TEST_PHASE_START) == 0) 374 if (strcmp(phase, OSSL_SELF_TEST_PHASE_PASS) == 0 375 || strcmp(phase, OSSL_SELF_TEST_PHASE_FAIL) == 0) 376 BIO_printf(bio_out, "%s\n", phase); 378 /* Corrupt the SHA1 self test during the 'corrupt' phase by returning 0 */ 379 if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0 381 BIO_printf(bio_out, "%s %s", phase, desc);
|
/openssl-master/crypto/sha/asm/ |
A D | sha512-586.pl | 97 my $phase=shift; 108 &movq ($A,"mm3") if ($phase<2); 148 &movq ("mm7",&QWP(8*(9+16-1),"esp")) if ($phase!=0); # pre-fetch 149 &movq ("mm5",$Fsse2) if ($phase==0); # load f 151 if ($phase>1) { 162 &movq ("mm6",$Gsse2) if ($phase==0); # load g
|
/openssl-master/test/helpers/ |
A D | handshake.c | 1085 connect_phase_t phase) in next_phase() argument 1087 switch (phase) { in next_phase() 1112 connect_phase_t phase) in do_connect_step() argument 1114 switch (phase) { in do_connect_step() 1397 connect_phase_t phase = HANDSHAKE; in do_handshake_internal() local 1525 do_connect_step(test_ctx, &client, phase); in do_handshake_internal() 1531 do_connect_step(test_ctx, &server, phase); in do_handshake_internal() 1539 phase = next_phase(test_ctx, phase); in do_handshake_internal() 1540 if (phase == CONNECTION_DONE) { in do_handshake_internal()
|
/openssl-master/doc/man3/ |
A D | RC4_set_key.pod | 34 RC4 consists of a key setup phase and the actual encryption or 35 decryption phase.
|
A D | OSSL_SELF_TEST_new.pod | 43 =item "st-phase" (B<OSSL_PROV_PARAM_SELF_TEST_PHASE>) <UTF8 string> 60 =item "st-phase" (B<OSSL_PROV_PARAM_SELF_TEST_PHASE>) <UTF8 string> 74 =item "st-phase" (B<OSSL_PROV_PARAM_SELF_TEST_PHASE>) <UTF8 string>
|
A D | BF_encrypt.pod | 50 Blowfish consists of a key setup phase and the actual encryption or decryption 51 phase.
|
A D | SSL_CTX_use_psk_identity_hint.pod | 72 during the connection setup phase. The callback is set using the functions
|
A D | SSL_CTX_set_psk_client_callback.pod | 106 the pre-shared key to use during the connection setup phase.
|
/openssl-master/crypto/bn/asm/ |
A D | bn-c64xplus.asm | 293 ;; because of low-counter effect, when prologue phase finishes
|
/openssl-master/ |
A D | CHANGES.md | 18959 * Now Fortezza is denied in the authentication phase because
|