/openssl/doc/man7/ |
H A D | EVP_KDF-X963.pod | 55 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if 57 Setting this to zero will ignore the error and set the approved 68 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the 71 Setting this to zero will ignore the error and set the approved 113 error("EVP_KDF_derive");
|
H A D | EVP_KDF-X942-ASN1.pod | 94 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the 97 Setting this to zero will ignore the error and set the approved 126 error("RAND_bytes"); 130 error("EVP_KDF_fetch"); 134 error("EVP_KDF_CTX_new"); 143 error("EVP_KDF_derive");
|
/openssl/providers/implementations/rands/seeding/ |
H A D | rand_unix.c | 105 # error "UEFI only supports seeding NONE" 115 # error "Unsupported seeding method configured; must be os" 119 # error "Unsupported HP-PA and IA32 at the same time." 122 # error "Must have one of HP-PA or IA32" 194 # error "Seeding uses EGD but EGD is turned off or no device given" 198 # error "Seeding uses urandom but DEVRANDOM is not configured" 203 # error "OS seeding requires DEVRANDOM to be configured"
|
/openssl/doc/man3/ |
H A D | X509_verify_cert.pod | 56 Applications must interpret any return value <= 0 as an error. 72 X509_build_chain() returns NULL on error, else a stack of certificates. 84 On error or failure additional error information can be obtained by 86 verification indicated success, the stored error code may be different from 87 X509_V_OK, likely because a verification callback function has waived the error.
|
H A D | X509_NAME_ENTRY_get_object.pod | 70 set or NULL if an error occurred. 73 or NULL if an error occurred. 76 or 0 on error. 80 NULL if an error occurred.
|
H A D | BN_add_word.pod | 43 on error. The error codes can be obtained by L<ERR_get_error(3)>. 46 B<(BN_ULONG)-1> if an error occurred.
|
H A D | ASN1_TIME_set.pod | 108 returns an error. The output for generalized time may include a fractional part 190 of an I/O error or invalid time format. 199 a pointer to a time structure or NULL if an error occurred. 205 ASN1_TIME_normalize() returns 1 on success, and 0 on error. 212 0 if an I/O error occurred an error occurred (I/O error or invalid time format). 215 error occurred (invalid time format). 222 on error. 225 or 1 if I<a> is after I<b>. -2 is returned on error. 228 structure on success or NULL if an error occurred. 231 pointer to a time structure or NULL if an error occurred.
|
H A D | ERR_clear_error.pod | 5 ERR_clear_error - clear the error queue 15 ERR_clear_error() empties the current thread's error queue.
|
H A D | SSL_CTX_set_verify.pod | 183 a verification error is found, the error number is stored in B<x509_ctx> 186 in question and perform additional steps (see EXAMPLES). If no error is 198 however retrieve the error code of the last verification error using 200 own error storage managed by B<verify_callback>. 236 succeeded, and 0 if the request failed. The error stack can be examined 290 * have violated the limit and want to log this error condition. 291 * We must do it here, because the CHAIN_TOO_LONG error would not 301 printf("verify error:num=%d:%s:depth=%d:%s\n", err, 308 * At this point, err contains the last verification error. We can use 333 * Let the verify_callback catch the verify_depth error so that we get [all …]
|
H A D | OPENSSL_hexchar2int.pod | 37 An odd number of hex digits is an error. 64 or -1 on error. 67 return a pointer to allocated memory, or NULL on error. 70 success, or 0 on error.
|
H A D | d2i_PrivateKey.pod | 55 B<EVP_PKEY_RSA>. An error occurs if the decoded key does not match I<type>. Some 107 an error occurs. The error code can be obtained by calling L<ERR_get_error(3)>. 110 bytes successfully encoded or a negative value if an error occurs. The error 114 successfully encoded or zero if an error occurs.
|
H A D | RSA_public_encrypt.pod | 82 recovered plaintext. A return value of 0 is not an error and 85 On error, -1 is returned; the error codes can be 98 error when padding checks fail. Instead it generates a random 101 a side-channel secure error handling. 105 Side-channel free handling of the error stack can be performed using
|
H A D | OBJ_nid2obj.pod | 59 or B<NULL> if an error occurred. 63 or NID_undef if an error occurred. 78 required for non-truncated representation, or -1 on error. 151 error occurred. 154 on error. 157 a NID or B<NID_undef> on error. 159 OBJ_add_sigid() returns 1 on success or 0 on error. 161 i2t_ASN1_OBJECT() an OBJ_obj2txt() return -1 on error.
|
H A D | BN_CTX_start.pod | 38 BN_CTX_get() returns a pointer to the B<BIGNUM>, or B<NULL> on error. 41 BN_CTX_get() call. In case of an error, an error code is set, which
|
H A D | DSA_do_sign.pod | 40 DSA_do_sign() returns the signature, NULL on error. DSA_do_verify() 42 on error. The error codes can be obtained by
|
H A D | OPENSSL_init_crypto.pod | 60 Suppress automatic loading of the libcrypto error strings. This option is 67 Automatic loading of the libcrypto error strings. With this option the 68 library will automatically load the libcrypto error strings. 199 on auto-deinitialisation. This is to avoid error conditions where both an 204 Attempts to call OPENSSL_init_crypto() will fail and an ERR_R_INIT_FAIL error 205 will be added to the error stack. Note that because initialisation has failed 206 OpenSSL error strings will not be available, only an error code. This code can 208 readable error (see L<openssl-errstr(1)>). 249 the configuration file will cause an error return from B<OPENSSL_init_crypto> 279 OPENSSL_INIT_set_config_appname() return 1 on success or 0 on error.
|
H A D | UI_create_method.pod | 95 All of these functions are expected to return 0 on error, 1 on 124 If an error occurs, jump to 5. 130 If an error occurs, jump to 5. 135 If an error occurs, jump to 5. 141 If an error occurs, jump to 5. 181 error. 189 UI_method_set_ex_data() returns 1 on success and 0 on error (because
|
H A D | OSSL_STORE_open.pod | 103 Any other value is an error. 115 OSSL_STORE_error() takes a B<OSSL_STORE_CTX> and checks if an error occurred in 132 URI, or if it's a different error (such as memory allocation 134 top error will have the reason C<OSSL_STORE_R_UNREGISTERED_SCHEME>. 150 on error or when end of data is reached. 155 or an error occurred, 0 otherwise. 157 OSSL_STORE_error() returns 1 if an error occurred in an OSSL_STORE_load() call,
|
H A D | BN_bn2bin.pod | 51 BN_num_bytes(B<a>) an error is returned. 58 C<<BN_num_bytes(B<a>) + 1>>), an error is returned. 111 BN_bin2bn() returns the B<BIGNUM>, NULL on error. 118 on error. BN_hex2bn() and BN_dec2bn() return the number of characters 119 used in parsing, or 0 on error, in which 125 returns the B<BIGNUM>, and NULL on error. 127 The error codes can be obtained by L<ERR_get_error(3)>.
|
H A D | BN_rand.pod | 46 parameters, an error is returned. 78 Always check the error return value of these functions and do not take 79 randomness for granted: an error occurs if the CSPRNG has not been 84 The functions return 1 on success, 0 on error. 85 The error codes can be obtained by L<ERR_get_error(3)>.
|
H A D | EVP_PKEY_get_attr.pod | 58 An error occurs if either I<attr> is NULL, or the attribute already exists. 64 list then an error occurs. 86 error. 89 there is a error. 97 listed will return an error unless EVP_PKEY_add1_attr() is called.
|
H A D | SSL_CTX_set_session_id_context.pod | 51 will not be reused but a fatal error will be flagged and the handshake 55 when reusing a session, an error will be flagged and the handshake will 70 the maximum allowed length of B<SSL_MAX_SID_CTX_LENGTH>. The error 71 is logged to the error stack.
|
H A D | CMS_add0_cert.pod | 49 data or authenticated enveloped data or an error will be returned. 61 which is empty if there are none. They return NULL on error. 62 Besides out-of-memory, the only error which will occur 74 not to throw an error if a certificate to be added is already present.
|
/openssl/engines/ |
H A D | e_loader_attic.txt | 11 ATTIC_R_ERROR_VERIFYING_PKCS12_MAC:102:error verifying pkcs12 mac 13 ATTIC_R_PASSPHRASE_CALLBACK_ERROR:104:passphrase callback error
|
/openssl/doc/man1/ |
H A D | openssl-verify.pod.in | 110 general form of the error message is: 113 error 24 at 1 depth lookup:invalid CA certificate 116 the subject name of the certificate. The second line contains the error number 120 Finally a textual version of the error number is presented. 122 A list of the error codes and messages can be found in
|