/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_genrsa.t | 45 my $good = 11; # Log2 of number of bits (2 << 11 == 2048) 47 while ($good > $bad + 1) { 48 my $checked = int(($good + $bad + 1) / 2); 56 $good = $checked; 62 $good++ if $good == $bad; 63 $good = 2 ** $good; 64 note "Found lowest allowed amount of bits to be $good"; 68 '-pkeyopt', "rsa_keygen_bits:$good", 70 "genpkey $good"); 96 ok(run(app([ 'openssl', 'genrsa', '-3', '-out', 'genrsatest.pem', $good ])), [all …]
|
/freebsd/contrib/kyua/utils/logging/ |
H A D | operations_test.cpp | 112 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 115 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 118 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 121 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 143 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 163 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 217 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 220 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 223 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 226 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() [all …]
|
H A D | macros_test.cpp | 56 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 72 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 88 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY() 104 ATF_REQUIRE(std::getline(input, line).good()); in ATF_TEST_CASE_BODY()
|
/freebsd/crypto/openssl/ssl/record/ |
H A D | tls_pad.c | 31 size_t good, 77 size_t good; in ssl3_cbc_remove_padding_and_mac() local 87 good = constant_time_ge_s(*reclen, padding_length + overhead); in ssl3_cbc_remove_padding_and_mac() 89 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 90 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 93 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac() 122 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local 144 good = constant_time_ge_s(*reclen, overhead + padding_length); in tls1_cbc_remove_padding_and_mac() 165 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac() 172 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac() [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 15-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
H A D | 16-dtls-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 174 unsigned int good, found_zero_byte, mask; in RSA_padding_check_PKCS1_type_2() local 208 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2() 209 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2() 226 good &= constant_time_ge(zero_index, 2 + 8); in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 258 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 270 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2() 273 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2() 303 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local 326 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2_TLS() [all …]
|
H A D | rsa_oaep.c | 165 unsigned int good = 0, found_one_byte, mask; in RSA_padding_check_PKCS1_OAEP_mgf1() local 235 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_OAEP_mgf1() 253 good &= constant_time_is_zero(CRYPTO_memcmp(db, phash, mdlen)); in RSA_padding_check_PKCS1_OAEP_mgf1() 265 good &= (found_one_byte | equals0); in RSA_padding_check_PKCS1_OAEP_mgf1() 268 good &= found_one_byte; in RSA_padding_check_PKCS1_OAEP_mgf1() 281 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 301 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 315 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_OAEP_mgf1() 322 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
/freebsd/crypto/openssl/test/ |
H A D | x509_internal_test.c | 32 int prev = -1, good = 1; in test_standard_exts() local 38 good = 0; in test_standard_exts() 42 if (!good) { in test_standard_exts() 48 return good; in test_standard_exts() 83 int good = 1; in test_a2i_ipaddress() local 90 good = 0; in test_a2i_ipaddress() 98 good = 0; in test_a2i_ipaddress() 102 return good; in test_a2i_ipaddress()
|
H A D | pkey_meth_test.c | 26 int good = 1; in test_asn1_meths() local 34 good = 0; in test_asn1_meths() 38 if (!good) { in test_asn1_meths() 50 return good; in test_asn1_meths() 59 int good = 1; in test_pkey_meths() local 67 good = 0; in test_pkey_meths() 71 if (!good) { in test_pkey_meths() 79 return good; in test_pkey_meths()
|
/freebsd/tools/regression/nfsmmap/test1/ |
H A D | Makefile | 4 CLEANFILES= test1.zeros test1.good test1.data test1.scratch 6 all: test1 test1.zeros test1.good 12 @if cmp -s ${.OBJDIR}/test1.data ${.OBJDIR}/test1.good && \ 13 cmp -s ${.OBJDIR}/test1.scratch ${.OBJDIR}/test1.good ; then \ 22 test1.good: test1.good.uu
|
/freebsd/tools/regression/nfsmmap/test2/ |
H A D | Makefile | 4 CLEANFILES= test2.zeros test2.good test2.data test2.scratch 6 all: test2 test2.zeros test2.good 12 @if cmp -s ${.OBJDIR}/test2.data ${.OBJDIR}/test2.good && \ 13 cmp -s ${.OBJDIR}/test2.scratch ${.OBJDIR}/test2.good ; then \ 22 test2.good: test2.good.uu
|
/freebsd/tests/sys/acl/ |
H A D | run | 120 my @good = (); 132 push @good, ($use_re ? '!~' : '!='); 135 push @good, ($use_re ? '=~' : '=='); 138 my $good = !(grep /!/, @good); 140 $failed++ unless $good; 141 print $good ? $OK : $FAILED, "\n"; 142 if (!$good || $opt_v) { 149 $r, $good[$n], $l);
|
/freebsd/contrib/netbsd-tests/usr.bin/gzip/ |
H A D | t_gzip.sh | 86 atf_test_case good 93 cat >good.gz.uue <<EOF 94 begin-base64 644 good.gz 98 uudecode -m good.gz.uue 100 atf_check gzip -d good.gz 109 atf_add_test_case good
|
/freebsd/tools/test/stress2/misc/ |
H A D | dumpfs.sh | 35 good=/tmp/dumpfs.sh.good 66 [ -f $good ] && diff $good $dump 68 [ ! -f $good ] && mv $dump $good # save good dump
|
/freebsd/contrib/llvm-project/lld/docs/ |
H A D | windows_support.rst | 6 .good { background-color: #CCFF99 } 11 .. role:: good 30 :good:`Mostly done`. Some exotic command line options that are not usually 34 :good:`Done`. LLD can read import libraries needed to link against DLL. Both 38 :good:`Done`. The format of static library (.lib) on Windows is actually the 42 :good:`Done`. LLD creates a DLL if ``/DLL`` option is given. Exported 48 :good:`Done`. If an ``.res`` file is given, LLD converts the file to a COFF 52 :good:`Done` for both x86 and x64. 59 :good:`Done`. LLD can emit PDBs that are at parity with those generated by
|
/freebsd/lib/libc/net/ |
H A D | eui64.c | 152 goto good; in eui64_aton() 157 goto good; in eui64_aton() 162 goto good; in eui64_aton() 169 goto good; in eui64_aton() 177 goto good; in eui64_aton() 182 good: in eui64_aton()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/hkdf/ |
H A D | hkdf_test.c | 185 uint8_t good[SHA512_DIGEST_LENGTH]; in run_test() local 190 tv->salt_len, (uint8_t *)tv->info, tv->info_len, good, tv->okm_len); in run_test() 196 if (memcmp(good, tv->okm, tv->okm_len) != 0) { in run_test() 199 hexdump("Actual: ", good, tv->okm_len); in run_test()
|
/freebsd/contrib/bc/scripts/ |
H A D | sqrt_int_guess.bc | 86 good = (t1 < t2 && t2 < t3) 88 print t1, " < ", t2, " < ", t3, ": ", good, "\n" 91 if (!good) sqrt(-1)
|
H A D | sqrt_random.sh | 61 good=$(printf '%s\n' "$tst" | "$gnu" -l) 66 gdh_good=$(printf '%s == %s\n' "$good" "$gdh_out" | "$gnu") 67 new_good=$(printf '%s == %s\n' "$good" "$new_out" | "$gnu")
|
H A D | sqrt_frac_guess.bc | 120 good = (t1 < t2 && t2 < t3) 122 print t1, " < ", t2, " < ", t3, ": ", good, "\n\n" 123 if (!good) sqrt(-1)
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_rec_cbc.c | 108 uint32_t good, pad_len, rot_count, len_withmac, len_nomac; in cbc_decrypt() local 142 good = LE(pad_len, (uint32_t)(max_len - min_len)); in cbc_decrypt() 143 len = MUX(good, (uint32_t)(max_len - pad_len), min_len); in cbc_decrypt() 150 good &= LT(u, len) | EQ(buf[u], pad_len); in cbc_decrypt() 212 good &= EQ0(tmp1[u] ^ tmp2[u]); in cbc_decrypt() 223 good &= LE(len_nomac, 16384); in cbc_decrypt() 225 if (!good) { in cbc_decrypt()
|
/freebsd/contrib/kyua/engine/ |
H A D | atf_list.cpp | 82 while (std::getline(input, line).good() && !line.empty()) { in parse_properties() 175 || !input.good()) in parse_atf_list() 181 if (!line.empty() || !input.good()) in parse_atf_list() 186 while (std::getline(input, line).good()) { in parse_atf_list()
|
/freebsd/contrib/bc/src/ |
H A D | lex.c | 349 bool good; in bc_lex_readLine() local 360 good = bc_vm_readBuf(false); in bc_lex_readLine() 366 good = false; in bc_lex_readLine() 374 good = bc_vm_readLine(false); in bc_lex_readLine() 395 return good; in bc_lex_readLine()
|
/freebsd/sys/netgraph/bluetooth/l2cap/ |
H A D | TODO | 20 Resource manager is not good because it uses MTX_DEF mutexes, 33 L2CAP can support about 65000 channels. Need define some good way 36 to pass 65Mbytes of data from kernel to user space. Not good.
|