/openssl/doc/man3/ |
H A D | EVP_PKEY_set_type.pod | 27 It is an error if no L<EVP_PKEY_ASN1_METHOD(3)> could be found for 34 It is an error if no L<EVP_PKEY_ASN1_METHOD(3)> could be found for 51 All functions described here return 1 if successful, or 0 on error.
|
H A D | EVP_VerifyInit.pod | 53 signature, 0 for failure and a negative value if some other error occurred. 55 The error codes can be obtained by L<ERR_get_error(3)>. 76 EVP_VerifyUpdate() will result in an error. 83 Since the public key is passed in the call to EVP_SignFinal() any error
|
H A D | CMS_decrypt.pod | 64 to) ultimately return a padding error only. If CMS_decrypt() just returned an 65 error when all recipient encrypted keys failed to decrypt an attacker could 67 then the above behaviour is modified and an error B<is> returned if no 86 from the content. If the content is not of type C<text/plain> then an error is 94 The error can be obtained from ERR_get_error(3).
|
H A D | X509_PUBKEY_new.pod | 135 NULL and set an error code that can be obtained by L<ERR_get_error(3)>. 142 return a pointer to an B<EVP_PKEY> structure or NULL if an error occurs. 145 negative value if an error occurs. 148 encoded or 0 if an error occurs. 153 return 1 for success and 0 if an error occurred. 155 X509_PUBKEY_eq() returns 1 for equal, 0 for different, and < 0 on error.
|
H A D | BN_generate_prime.pod | 67 The returned number is probably prime with a negligible error. 68 The maximum error rate is 2^-128. 196 BN_generate_prime_ex() return 1 on success or 0 on error. 200 1 if it is prime with an error probability of less than 0.25^B<nchecks>, and 201 -1 on error. 211 Callback functions should return 1 on success or 0 on error. 213 The error codes can be obtained by L<ERR_get_error(3)>. 227 /* error */
|
H A D | CMS_compress.pod | 24 an error. 57 CMS_compress() returns either a CMS_ContentInfo structure or NULL if an error 58 occurred. The error can be obtained from ERR_get_error(3).
|
H A D | RAND_load_file.pod | 60 B<num> is too small for the pathname, an error occurs. 64 RAND_load_file() returns the number of bytes read or -1 on error. 70 error.
|
H A D | OPENSSL_init_ssl.pod | 46 Suppress automatic loading of the libssl error strings. This option is 53 Automatic loading of the libssl error strings. This option is a 65 The function OPENSSL_init_ssl() returns 1 on success or 0 on error.
|
H A D | SMIME_read_PKCS7.pod | 25 error occurred. 66 or B<NULL> if an error occurred. The error can be obtained from ERR_get_error(3).
|
H A D | DSA_sign.pod | 54 DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. 56 signature and -1 on error. The error codes can be obtained by
|
H A D | SSL_stream_reset.pod | 27 I<quic_error_code> is an application-specified error code, which must be in the 36 example due to an error condition. 59 subsequent calls succeed but are ignored. The application error code
|
H A D | NCONF_new_ex.pod | 41 I<conf>. If an error occurs I<file> and I<eline> list the file and line that 61 NCONF_load() returns 1 on success or 0 on error. 64 or NULL if an error occurs.
|
H A D | DTLSv1_listen.pod | 103 Both SSL_stateless() and DTLSv1_listen() will clear the error queue when they 106 SSL_stateless() cannot be used with QUIC SSL objects and returns an error if 114 of -1 indicates any other error. User code may retry the SSL_stateless() call. 120 A return value of 0 indicates a non-fatal error. This could (for 122 received from a peer. Errors may be placed on the OpenSSL error queue with 124 call to DTLSv1_listen() in the event of a non-fatal error. 126 A return value of <0 indicates a fatal error. This could (for example) be
|
H A D | PKCS7_verify.pod | 45 embedded and external content. To treat this as an error, use the flag 63 If I<store> is not NULL and any chain verify fails an error code is returned. 82 from the content. If the content is not of type C<text/plain> then an error is 114 PKCS7_verify() returns 1 for a successful verification and 0 if an error occurs. 116 PKCS7_get0_signers() returns all signers or NULL if an error occurred. 118 The error can be obtained from L<ERR_get_error(3)>.
|
H A D | OSSL_PARAM_allocate_from_text.pod | 70 considers that an error. 75 considers that an error. 89 considers that an error. 150 "MAC parameter error \"%s\"\n", macopt); 190 BIO_printf(bio_err, "MAC parameter error '%s'\n", opt);
|
H A D | BIO_ADDR.pod | 66 B<BIO_ADDR>. The possible non-error results are one of the 116 return B<NULL> on error and leave an error indication on the 117 OpenSSL error stack. 119 BIO_ADDR_copy() returns 1 on success or 0 on error.
|
/openssl/apps/ |
H A D | tsget.in | 180 my ($ts_body, $error) = get_timestamp $curl, \$body; 181 if (defined($error)) { 182 die "$input: fatal error: $error\n";
|
/openssl/crypto/x509/ |
H A D | x509_vfy.c | 168 ctx->error = err; in verify_cb_cert() 185 ctx->error = err; in verify_cb_crl() 310 ctx->error = X509_V_ERR_RPK_UNTRUSTED; in x509_verify_rpk() 349 ctx->error = X509_V_ERR_OUT_OF_MEM; in x509_verify_x509() 1773 ctx->error = X509_V_ERR_OUT_OF_MEM; in check_policy() 2236 return ctx->error; in X509_STORE_CTX_get_error() 2241 ctx->error = err; in X509_STORE_CTX_set_error() 2448 ctx->error = X509_V_OK; in X509_STORE_CTX_init() 3116 ctx->error = X509_V_OK; in dane_verify_rpk() 3514 switch (ctx->error) { in build_chain() [all …]
|
H A D | x_pubkey.c | 335 goto error; in X509_PUBKEY_set() 340 goto error; in X509_PUBKEY_set() 344 goto error; in X509_PUBKEY_set() 366 goto error; in X509_PUBKEY_set() 372 goto error; in X509_PUBKEY_set() 392 error: in X509_PUBKEY_set() 431 goto error; in x509_pubkey_decode() 441 goto error; in x509_pubkey_decode() 444 goto error; in x509_pubkey_decode() 450 error: in x509_pubkey_decode()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppbe_scrypt.txt | 41 # scrypt memory limit and return an error. To run this test without error
|
/openssl/crypto/bio/ |
H A D | bio_local.h | 31 # error internal/cryptlib.h included before bio_local.h 34 # error openssl/bio.h included before bio_local.h
|
/openssl/doc/man5/ |
H A D | fips_config.pod | 44 The FIPS module normally enters an internal error mode if any self test fails. 45 Once this error mode is active, no services or cryptographic algorithms are 49 Setting this value to C<0> allows the error mode to not be triggered if any 50 continuous test fails. The default value of C<1> will trigger the error mode. 52 continuous test will return an error code if its continuous test fails. The 53 operation may then be retried if the error mode has not been triggered.
|
/openssl/include/openssl/ |
H A D | err.h.in | 175 * The error code packs differently depending on if it records a system 176 * error or an OpenSSL error. 178 * A system error packs like this (we follow POSIX and only allow positive 182 * |1| system error number | 185 * An OpenSSL error packs like this: 275 * ERR_PACK is a helper macro to properly pack OpenSSL error codes and may 351 /* Other common error codes, range 256..2^ERR_RFLAGS_OFFSET-1 */ 372 unsigned long error; member 389 /* Main error raising functions */
|
/openssl/crypto/pem/ |
H A D | pvkfmt.c | 1042 goto error; in i2b_PVK() 1058 goto error; in i2b_PVK() 1075 goto error; in i2b_PVK() 1079 goto error; in i2b_PVK() 1081 goto error; in i2b_PVK() 1086 goto error; in i2b_PVK() 1089 goto error; in i2b_PVK() 1091 goto error; in i2b_PVK() 1094 goto error; in i2b_PVK() 1101 error: in i2b_PVK()
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-client-block.pod | 168 integrate into the OpenSSL error system to log error data, e.g. 316 * If the failure is due to a verification error we can get more 320 printf("Verify error: %s\n", 337 a human readable error message. 420 * Some error occurred other than a graceful close down by the 428 server has finished sending its data. Otherwise an error has occurred. 463 just treat it as an error in this example. 468 If we are exiting due to an error we might also want to display further 469 information about that error if it is available to the user: 515 an error which would look something like this: [all …]
|