Searched refs:error (Results 151 – 175 of 724) sorted by relevance
12345678910>>...29
/openssl/doc/man3/ |
H A D | BN_BLINDING_new.pod | 92 or NULL in case of an error. 96 success and 0 if an error occurred. 104 succeeded or 0 on error. 110 parameters or NULL on error.
|
H A D | EVP_PKEY_decrypt.pod | 35 written to I<*outlen>, otherwise an error is returned. 65 That means it doesn't return an error when it detects an error in padding, 71 Side-channel free handling of the error stack can be performed using
|
H A D | ASN1_STRING_length.pod | 55 I<out> is returned or a negative error code. The buffer I<*out> 88 error occurred. 93 ASN1_STRING_set() returns 1 on success or 0 on error. 98 negative value if an error occurred.
|
H A D | X509_check_ca.pod | 17 otherwise an error is returned. 28 This function will also return 0 on error.
|
H A D | DSA_dup_DH.pod | 29 DSA_dup_DH() returns the new B<DH> structure, and NULL on error. The 30 error codes can be obtained by L<ERR_get_error(3)>.
|
H A D | DH_generate_key.pod | 56 on error. 58 DH_compute_key_padded() returns B<DH_size(dh)> on success, -1 on error. 60 The error codes can be obtained by L<ERR_get_error(3)>.
|
H A D | SSL_SESSION_free.pod | 63 or NULL on error. 65 SSL_SESSION_dup returns a pointer to the new copy or NULL on error. 67 SSL_SESSION_up_ref returns 1 on success or 0 on error.
|
H A D | i2d_re_X509_tbs.pod | 53 d2i_X509_AUX() returns a valid B<X509> structure or NULL if an error occurred. 55 i2d_X509_AUX() returns the length of encoded data or -1 on error. 58 length of encoded data or <=0 on error.
|
H A D | CMS_verify.pod | 75 If I<store> is not NULL and any chain verify fails an error code is returned. 93 from the content. If the content is not of type C<text/plain> then an error is 135 CMS_verify() returns 1 for a successful verification and 0 if an error occurred. 138 or NULL on error. 140 CMS_get0_signers() returns all signers or NULL if an error occurred. 142 The error can be obtained from L<ERR_get_error(3)>.
|
H A D | SSL_CIPHER_get_name.pod | 102 error occurs or the indicated cipher is not found. 164 secret bits or 0 if an error occurred. 168 B<NID_undef> if an error occurred. 171 if an error occurred. 175 SSL_CIPHER_find() returns a valid B<SSL_CIPHER> structure or NULL if an error 193 The SSL_CIPHER_description() function was changed to return B<NULL> on error,
|
H A D | CMS_sign_receipt.pod | 35 an error occurred. The error can be obtained from ERR_get_error(3).
|
H A D | CMS_verify_receipt.pod | 35 error occurred. 37 The error can be obtained from L<ERR_get_error(3)>
|
H A D | EVP_PKEY_get_field_type.pod | 33 EVP_PKEY_get_field_type() returns the field type NID or 0 on error. 36 (see L<EC_GROUP_copy(3)>) or 0 on error.
|
H A D | X509_check_issued.pod | 24 It does not actually check the certificate signature. An error is returned 30 or some B<X509_V_ERR*> constant to indicate an error.
|
H A D | HMAC.pod | 103 same as the previous digest used by I<ctx> then an error is returned 129 an error occurred. 132 NULL if an error occurred. 135 HMAC_CTX_copy() return 1 for success or 0 if an error occurred. 141 or zero on error.
|
H A D | PKCS12_newpass.pod | 35 with a MAC verification error. In rare cases the PKCS12 structure does not 37 error. 42 retrieve the most recent error from PKCS12_newpass() with ERR_get_error().
|
H A D | SMIME_read_CMS.pod | 25 error occurred. 68 structure or B<NULL> if an error occurred. The error can be obtained from
|
H A D | SMIME_read_ASN1.pod | 37 The parsed ASN1_VALUE structure is returned or NULL if an error occurred. 62 structure or B<NULL> if an error occurred. The error can be obtained from
|
H A D | X509_cmp_time.pod | 56 X509_cmp_current_time() return 0 on error. 62 otherwise. These methods return 0 on error. 73 the updated ASN1_TIME structure, and NULL on error.
|
H A D | ASN1_item_d2i_bio.pod | 80 then the returned return is also set into I<*oct>. If there is an error the optional 93 an B<ASN1_VALUE> or NULL on error. 95 ASN1_item_i2d_mem_bio() returns a pointer to a memory BIO or NULL on error. 97 ASN1_item_pack() returns a pointer to an B<ASN1_STRING> or NULL on error.
|
H A D | BIO_f_base64.pod | 41 complete group of 4 valid base64 characters is decoded, or when an error occurs 44 If decoding stops as a result of an error, the first L<BIO_read(3)> that 117 an error has been detected, more tests are needed to cover all the potential 118 error paths.
|
/openssl/doc/internal/man3/ |
H A D | ossl_namemap_new.pod | 82 B<OSSL_NAMEMAP>, or NULL on error. 85 empty, 0 if it's not empty, or -1 on internal error (such as inability 89 string, or zero on error. 103 names, or zero on error.
|
H A D | ossl_punycode_decode.pod | 32 -1 if an invalid PUNYCODE string is passed or another error occurs. 34 ossl_punycode_decode() returns 1 on success, 0 on error. On success,
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | Changes | 120 - The format of the default error message has changed. It used to look 123 Program fragment at line 30 delivered error ``Illegal division by zero'' 127 Program fragment delivered error ``Illegal division by zero at catalog.tmpl line 37'' 130 program fragment began; it now reports the line number at which the error 134 - The format of the default error message has changed. It used to look like: 136 Program fragment at line 30 delivered error ``Illegal division by zero'' 140 Program fragment delivered error ``Illegal division by zero at catalog.tmpl line 37'' 143 program fragment began; it now reports the line number at which the error 159 line number of the template at which the error occurred: 177 line number of the template at which the error occurred:
|
/openssl/include/openssl/ |
H A D | asn1_mac.h | 10 #error "This file is obsolete; please update your software."
|
Completed in 40 milliseconds
12345678910>>...29