/openssl-master/test/ |
A D | bftest.c | 269 printf("\ndata[%d] = ", (int)strlen(cbc_data) + 1); in print_test_data() 270 for (j = 0; j < strlen(cbc_data) + 1; j++) in print_test_data() 280 printf("cipher[%d]= ", (int)strlen(cbc_data) + 1); in print_test_data() 281 for (j = 0; j < strlen(cbc_data) + 1; j++) in print_test_data() 286 printf("cipher[%d]= ", (int)strlen(cbc_data) + 1); in print_test_data() 287 for (j = 0; j < strlen(cbc_data) + 1; j++) in print_test_data() 355 len = strlen(cbc_data) + 1; in test_bf_cbc() 381 len = strlen(cbc_data) + 1; in test_bf_cfb64() 413 len = strlen(cbc_data) + 1; in test_bf_ofb64() 461 ebcdic2ascii(cbc_data, cbc_data, strlen(cbc_data)); in setup_tests() [all …]
|
A D | pemtest.c | 50 if (!TEST_int_eq(memcmp(pemtype, name, strlen(pemtype)), 0) in test_b64() 51 || !TEST_int_eq(len, strlen(raw)) in test_b64() 52 || !TEST_int_eq(memcmp(data, raw, strlen(raw)), 0)) in test_b64()
|
A D | sslapitest.c | 6139 if (!TEST_int_eq(SSL_write(clientssl, mess, strlen(mess)), strlen(mess)) in test_key_update() 6144 if (!TEST_int_eq(SSL_write(serverssl, mess, strlen(mess)), strlen(mess)) in test_key_update() 6224 if (!TEST_int_eq(SSL_write(peerwrite, mess, strlen(mess)), strlen(mess)) in test_key_update_peer_in_write() 6229 if (!TEST_int_eq(SSL_write(peerwrite, mess, strlen(mess)), strlen(mess)) in test_key_update_peer_in_write() 6303 if (!TEST_int_eq(SSL_write(peer, mess, strlen(mess)), strlen(mess))) in test_key_update_peer_in_read() 6315 if (!TEST_int_eq(SSL_write(local, mess, strlen(mess)), strlen(mess)) in test_key_update_peer_in_read() 6387 if (!TEST_int_eq(SSL_write(local, mess, strlen(mess)), strlen(mess))) in test_key_update_local_in_write() 6399 if (!TEST_int_eq(SSL_write(local, mess, strlen(mess)), strlen(mess)) in test_key_update_local_in_write() 6404 if (!TEST_int_eq(SSL_write(peer, mess, strlen(mess)), strlen(mess)) in test_key_update_local_in_write() 6484 if (!TEST_int_eq(SSL_write(local, mess, strlen(mess)), strlen(mess)) in test_key_update_local_in_read() [all …]
|
A D | cmp_ctx_test.c | 127 msg_total_size += strlen(msg); in msg_total_size_log_cb() 128 TEST_note("total=%d len=%zu msg='%s'\n", msg_total_size, strlen(msg), msg); in msg_total_size_log_cb() 162 base_err_msg_size = strlen("INVALID_ARGS"); in execute_CTX_print_errors_test() 164 base_err_msg_size += strlen("NULL_ARGUMENT"); in execute_CTX_print_errors_test() 167 expected_size += strlen(":" "data1"); in execute_CTX_print_errors_test() 169 expected_size += strlen(" : " "data2"); in execute_CTX_print_errors_test() 171 expected_size += strlen("\n" "new line"); in execute_CTX_print_errors_test() 177 base_err_msg_size = strlen("INVALID_ARGS") + strlen(":"); in execute_CTX_print_errors_test() 181 expected_size += strlen(STR_SEP) + strlen(max_str_literal); in execute_CTX_print_errors_test() 183 expected_size += base_err_msg_size - 2 * strlen(STR_SEP); in execute_CTX_print_errors_test() [all …]
|
A D | tls13secretstest.c | 327 strlen(client_hts_label), client_hts, in test_handshake_secrets() 342 strlen(server_hts_label), server_hts, in test_handshake_secrets() 376 strlen(client_ats_label), client_ats, in test_handshake_secrets() 391 strlen(server_ats_label), server_ats, in test_handshake_secrets()
|
A D | sm2_internal_test.c | 58 fake_rand_size = strlen(hex_bytes) / 2; in start_fake_rand() 140 const size_t msg_len = strlen(message); in test_sm2_crypt() 310 const size_t msg_len = strlen(message); in test_sm2_sign() 338 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 354 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
A D | params_test.c | 148 obj->p4_l = strlen(obj->p4); in raw_set_params() 161 obj->p5_l = strlen(obj->p5); in raw_set_params() 187 params->return_size = strlen(obj->p4); in raw_get_params() 192 params->return_size = strlen(obj->p5); in raw_get_params() 197 params->return_size = strlen(obj->p6); in raw_get_params() 233 obj->p5_l = strlen(obj->p5); in api_set_params() 238 obj->p6_l = strlen(obj->p6); in api_set_params()
|
A D | destest.c | 368 const size_t cbc_data_len = strlen((char *)cbc_data); in test_des_cbc() 392 const size_t n = strlen((char *)cbc_data) + 1; in test_des_ede_cbc() 415 const size_t i = strlen((char *)cbc_data) + 1; in test_ede_cbc() 446 const size_t n = strlen(i + (char *)cbc_data) + 1; in test_input_align() 461 const size_t n = strlen((char *)cbc_data) + 1; in test_output_align() 492 const int n = strlen((char *)cbc_data) + 1; in test_des_pcbc() 675 cs = DES_cbc_cksum(cbc_data, &cret, strlen((char *)cbc_data), &ks, in test_des_cbc_cksum() 687 (long)strlen((char *)cbc_data), 2, in test_des_quad_cksum()
|
/openssl-master/crypto/err/ |
A D | err_prn.c | 38 offset = strlen(buf); in ERR_print_errors_cb() 40 offset += strlen(buf + offset); in ERR_print_errors_cb() 44 if (cb(buf, strlen(buf), u) <= 0) in ERR_print_errors_cb() 86 data_len = strlen(data); in ERR_add_error_txt() 90 || strlen(separator) >= (size_t)(MAX_DATA_LEN - data_len)) in ERR_add_error_txt() 93 available_len = MAX_DATA_LEN - data_len - strlen(separator) - 1; in ERR_add_error_txt() 97 const size_t len_next = strlen(next); in ERR_add_error_txt() 111 next += strlen(separator); in ERR_add_error_txt() 114 next = curr + strlen(curr); in ERR_add_error_txt() 133 tmp = OPENSSL_strndup(txt, next - strlen(separator) - txt); in ERR_add_error_txt()
|
/openssl-master/crypto/ |
A D | info.c | 53 BIO_snprintf(ossl_cpu_info_str + strlen(ossl_cpu_info_str), in DEFINE_RUN_ONCE_STATIC() 54 sizeof(ossl_cpu_info_str) - strlen(ossl_cpu_info_str), in DEFINE_RUN_ONCE_STATIC() 62 BIO_snprintf(ossl_cpu_info_str + strlen(ossl_cpu_info_str), in DEFINE_RUN_ONCE_STATIC() 63 sizeof(ossl_cpu_info_str) - strlen(ossl_cpu_info_str), in DEFINE_RUN_ONCE_STATIC() 98 BIO_snprintf(ossl_cpu_info_str + strlen(ossl_cpu_info_str), in DEFINE_RUN_ONCE_STATIC() 99 sizeof(ossl_cpu_info_str) - strlen(ossl_cpu_info_str), in DEFINE_RUN_ONCE_STATIC() 200 return ossl_cpu_info_str + strlen(CPUINFO_PREFIX); in OPENSSL_info()
|
A D | o_str.c | 24 ret = CRYPTO_malloc(strlen(str) + 1, file, line); in CRYPTO_strdup() 81 return l + strlen(src); in OPENSSL_strlcpy() 190 buf_n = strlen(str); in ossl_hexstr2buf_sep() 218 static int buf2hexstr_sep(char *str, size_t str_n, size_t *strlen, in buf2hexstr_sep() argument 229 if (strlen != NULL) in buf2hexstr_sep() 230 *strlen = len; in buf2hexstr_sep() 256 int OPENSSL_buf2hexstr_ex(char *str, size_t str_n, size_t *strlen, in OPENSSL_buf2hexstr_ex() argument 260 return buf2hexstr_sep(str, str_n, strlen, buf, buflen, sep); in OPENSSL_buf2hexstr_ex()
|
A D | o_fopen.c | 42 int sz, len_0 = (int)strlen(filename) + 1; in openssl_fopen() 68 MultiByteToWideChar(CP_UTF8, 0, mode, strlen(mode) + 1, in openssl_fopen() 90 if ((newname = OPENSSL_malloc(strlen(filename) + 1)) == NULL) { in openssl_fopen()
|
/openssl-master/crypto/dso/ |
A D | dso_dlfcn.c | 113 if (filename[strlen(filename) - 1] == ')') in dlfcn_load() 234 spec2len = strlen(filespec2); in dlfcn_merger() 235 len = spec2len + strlen(filespec1); in dlfcn_merger() 258 len = strlen(filename); in dlfcn_name_converter() 263 rsize += strlen(DSO_EXTENSION); /* The length of ".so" */ in dlfcn_name_converter() 375 buffer_sz = strlen(this_ldi->ldinfo_filename) + 1; in dladdr() 377 if ((member_len = strlen(member)) > 0) in dladdr() 423 len = (int)strlen(dli.dli_fname); in dlfcn_pathbyaddr()
|
A D | dso_vms.c | 167 sp2 = sp1 + strlen(sp1); in vms_load() 171 || (sp1 - filename) + strlen(sp2) > FILENAME_MAX) { in vms_load() 194 p->filename_dsc.dsc$w_length = strlen(p->filename); in vms_load() 198 p->imagename_dsc.dsc$w_length = strlen(p->imagename); in vms_load() 299 symname_dsc.dsc$w_length = strlen(SYMNAME); in vms_bind_sym() 391 filespec1len = strlen(filespec1); in vms_merger() 392 filespec2len = strlen(filespec2); in vms_merger() 460 len = strlen(filename); in vms_name_converter()
|
A D | dso_dl.c | 193 spec2len = (filespec2 ? strlen(filespec2) : 0); in dl_merger() 194 len = spec2len + (filespec1 ? strlen(filespec1) : 0); in dl_merger() 224 len = strlen(filename); in dl_name_converter() 229 rsize += strlen(DSO_EXTENSION); /* The length of ".s?" */ in dl_name_converter() 266 len = (int)strlen(inf.filename); in dl_pathbyaddr()
|
/openssl-master/apps/ |
A D | passwd.c | 328 passwd_len = strlen(passwd); in md5crypt() 331 magic_len = strlen(magic); in md5crypt() 340 salt_len = strlen(ascii_salt); in md5crypt() 460 assert(output == out_buf + strlen(out_buf)); in md5crypt() 476 assert(strlen(out_buf) < sizeof(out_buf)); in md5crypt() 527 passwd_len = strlen(passwd); in shacrypt() 528 magic_len = strlen(magic); in shacrypt() 573 salt_len = strlen(ascii_salt); in shacrypt() 706 cp = out_buf + strlen(out_buf); in shacrypt() 816 if ((strlen(passwd) > pw_maxlen)) { in do_passwd() [all …]
|
/openssl-master/crypto/x509/ |
A D | v3_ist.c | 58 ASN1_STRING_set(ist->signTool, cnf->value, strlen(cnf->value)); 66 ASN1_STRING_set(ist->cATool, cnf->value, strlen(cnf->value)); 74 ASN1_STRING_set(ist->signToolCert, cnf->value, strlen(cnf->value)); 82 ASN1_STRING_set(ist->cAToolCert, cnf->value, strlen(cnf->value));
|
/openssl-master/doc/man7/ |
A D | EVP_KDF-KB.pod | 105 "secret", strlen("secret")); 107 "label", strlen("label")); 109 "context", strlen("context")); 133 "secret", strlen("secret")); 135 "label", strlen("label")); 137 "context", strlen("context")); 139 iv, strlen(iv));
|
A D | EVP_KDF-SS.pod | 89 SN_sha256, strlen(SN_sha256)); 114 SN_hmac, strlen(SN_hmac)); 116 SN_sha256, strlen(SN_sha256)); 143 SN_kmac128, strlen(SN_kmac128)); 145 SN_sha256, strlen(SN_sha256));
|
/openssl-master/demos/signature/ |
A D | EVP_Signature_demo.c | 108 if (!EVP_DigestSignUpdate(sign_context, hamlet_1, strlen(hamlet_1))) { in demo_sign() 112 if (!EVP_DigestSignUpdate(sign_context, hamlet_2, strlen(hamlet_2))) { in demo_sign() 183 if (!EVP_DigestVerifyUpdate(verify_context, hamlet_1, strlen(hamlet_1))) { in demo_verify() 187 if (!EVP_DigestVerifyUpdate(verify_context, hamlet_2, strlen(hamlet_2))) { in demo_verify()
|
/openssl-master/test/testutil/ |
A D | driver.c | 419 len += strlen(list[i]); in glue_strings() 428 p += strlen(strcpy(p, list[i])); in glue_strings() 442 size_t dirlen = dir != NULL ? strlen(dir) : 0; in test_mk_file_path() 443 size_t len = dirlen + strlen(sep) + strlen(file) + 1; in test_mk_file_path() 456 dir_end = &full_file[strlen(full_file) - 1]; in test_mk_file_path()
|
/openssl-master/crypto/engine/ |
A D | eng_ctrl.c | 111 return strlen(cdp->cmd_name); in int_ctrl_helper() 113 return strlen(strcpy(s, cdp->cmd_name)); in int_ctrl_helper() 115 return strlen(cdp->cmd_desc == NULL ? int_no_description in int_ctrl_helper() 118 return strlen(strcpy(s, cdp->cmd_desc == NULL ? int_no_description in int_ctrl_helper()
|
/openssl-master/apps/lib/ |
A D | opt.c | 58 for (p = filename + strlen(filename); --p > filename; ) in opt_path_end() 75 n = strlen(p); in opt_progname() 96 for (p = filename + strlen(filename); --p > filename;) in opt_path_end() 126 for (p = filename + strlen(filename); --p > filename;) in opt_path_end() 148 size_t len = strlen(prog); in opt_appname() 531 if (strncmp(v, b[i].prefix, strlen(b[i].prefix)) == 0) { in opt_number_error() 1095 p += strlen(strcpy(p, o->name)); in opt_print() 1100 p += strlen(strcpy(p, valtype2param(o))); in opt_print() 1126 i = 2 + (int)strlen(o->name); in opt_help() 1128 i += 1 + strlen(valtype2param(o)); in opt_help() [all …]
|
/openssl-master/test/helpers/ |
A D | pkcs12.c | 175 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass), in generate_p12() 265 && TEST_true(PKCS12_verify_mac(p12, mac->pass, strlen(mac->pass))); in check_p12_mac() 322 bags = PKCS12_unpack_p7encdata(p7, enc->pass, strlen(enc->pass)); in STACK_OF() 359 strlen(p_attr->value)))) in add_attributes() 365 strlen(p_attr->value)))) in add_attributes() 451 bag = PKCS12_add_secret(&pb->bags, secret_nid, (const unsigned char *)secret, strlen(secret)); in add_secretbag() 482 if (!TEST_mem_eq(txt, strlen(txt), (char *)av->value.utf8string->data, in check_asn1_string() 488 if (!TEST_mem_eq(txt, strlen(txt), in check_asn1_string() 610 p8 = PKCS12_decrypt_skey(bag, enc->pass, strlen(enc->pass)); in check_keybag() 612 p8 = PKCS12_decrypt_skey_ex(bag, enc->pass, strlen(enc->pass), test_ctx, test_propq); in check_keybag()
|
/openssl-master/crypto/http/ |
A D | http_lib.c | 75 p += strlen("://"); in OSSL_parse_url() 103 host_end = host + strlen(host); in OSSL_parse_url() 128 path_end = query = query_end = frag = frag_end = path + strlen(path); in OSSL_parse_url() 249 sl = strlen(server); in use_proxy()
|