/openssl/crypto/x509/ |
H A D | v3_pmaps.c | 82 if (!val->value || !val->name) { in v2i_POLICY_MAPPINGS() 88 obj2 = OBJ_txt2obj(val->value, 0); in v2i_POLICY_MAPPINGS()
|
H A D | v3_tlsf.c | 105 if (val->value) in v2i_TLS_FEATURE() 106 extval = val->value; in v2i_TLS_FEATURE()
|
/openssl/doc/man3/ |
H A D | SSL_connect.pod | 28 to continue the handshake, indicating the problem by the return value -1. 30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or 63 return value B<ret> to find out the reason. 75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 35 In server mode, a return value of 0 leads to handshake failure. 39 Otherwise, when the return value is less than or equal to 0, the handshake will 53 In any case a viable verification result value must be reflected 71 SSL_CTX_set_cert_verify_callback() does not return a value.
|
H A D | X509v3_get_ext_by_NID.pod | 64 can take any value from 0 to X509_get_ext_count(I<x>) - 1. The returned 74 looks for an extension of criticality I<crit>. A zero value for I<crit> 75 looks for a non-critical extension. A nonzero value looks for a critical 80 If I<loc> is an invalid index value, NULL is returned. 111 X509v3_get_ext_by_critical() and its variants, a zero index return value
|
H A D | SSL_read_early_data.pod | 105 the server, but the total number of bytes written must not exceed the value 145 same way as a 0 return value from L<SSL_read_ex(3)>. 212 this then the connection will abort. This value can be set by calling 214 value for this setting can be obtained by calling 216 value for this setting is 16,384 bytes. 223 The configured value for max_early_data on a server may change over time as 225 max_early_data value. The recv_max_early_data should always be equal to or 226 higher than any recently configured max_early_data value in order to avoid 228 the current configured max_early_data value. 274 changed to accept a lower max early data value such as by calling [all …]
|
H A D | OSSL_HTTP_REQ_CTX.pod | 34 const char *name, const char *value); 66 A value <= 0 indicates that 82 OSSL_HTTP_REQ_CTX_add1_header() adds header I<name> with value I<value> to the 115 I<timeout> < 0 takes over any value set via the I<overall_timeout> argument of 119 If the value is 1 or 2 then a persistent connection is requested. 120 If the value is 2 then a persistent connection is required, 134 the HTTP header C<Content-Type> is also added with the given string value. 174 If the C<Content-Length> header is present and exceeds this value or 175 the content is an ASN.1 encoded structure with a length exceeding this value
|
H A D | SSL_SESSION_set1_id.pod | 20 SSL_SESSION_get_id() returns a pointer to the internal session id value for the 29 SSL_SESSION_get_id() returns a pointer to the session id value.
|
H A D | X509_NAME_ENTRY_get_object.pod | 36 X509_NAME_ENTRY_get_data() retrieves the field value of B<ne> in 41 X509_NAME_ENTRY_set_data() sets the field value of B<ne> to string type 42 B<type> and value determined by B<bytes> and B<len>.
|
H A D | SSL_do_handshake.pod | 31 return value of SSL_do_handshake() will yield B<SSL_ERROR_WANT_READ> or 49 return value B<ret> to find out the reason. 61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
|
H A D | PKCS12_add_cert.pod | 22 int nid_type, const unsigned char *value, int len); 36 I<iter> is zero then a default value for iteration count of 2048 is used. 43 the supplied I<nid_type> containing the supplied value as an ASN1 octet string.
|
H A D | PKCS12_add_safe.pod | 26 depends on the value of B<safe_nid>: 34 as the iteration count. If I<iter> is zero then a default value for iteration 62 PKCS12_add_safe() returns a value of 1 indicating success or 0 for failure.
|
H A D | EVP_EncryptInit.pod | 489 structure. The actual NID value is an internal value which may not have a 522 length to any value other than the fixed value is an error. 638 value returned by EVP_CIPHER_CTX_get_key_length(). 665 Use EVP_CIPHER_get_mode() to retrieve the cached value. 691 cached value. 699 cached value. 708 cached value. 716 cached value. 736 Padding is enabled if the value is 1, and disabled if the value is 0. 1035 with a value of (15 - L) [all …]
|
H A D | OSSL_CMP_exec_certreq.pod | 78 more flexible regarding what to do after receiving a checkAfter value. 89 and returns -1 after assigning the received checkAfter value 91 The checkAfter value indicates the number of seconds the caller should let pass 98 a negative value as the I<req_type> argument then OSSL_CMP_try_certreq() 135 in case a 'waiting' status has been received and checkAfter value is available. 138 assign the received value unless I<checkAfter> is NULL.
|
H A D | SSL_write.pod | 51 return value of the write function will yield B<SSL_ERROR_WANT_READ> 101 The write operation was successful, the return value is the number of 108 Call SSL_get_error() with the return value B<ret> to find out the reason. 122 The write operation was successful, the return value is the number 124 value can be less than B<size> for a partial write. 130 Call SSL_get_error() with the return value to find out the reason.
|
/openssl/doc/man7/ |
H A D | EVP_MAC-KMAC.pod | 47 Sets the custom value. 48 It is an optional value of at most 256 bytes, and is empty by default. 62 The "xof" parameter value is expected to be 1 or 0. Use 1 to enable XOF mode. 63 The default value is 0.
|
H A D | EVP_KDF-X942-ASN1.pod | 39 This value should not be used in production and should only be used for ACVP 61 information. Setting this value also sets "use-keybits" to 0. 65 The default value of 1 will use the KEK key length (in bits) as the 66 "supp-pubinfo". A value of 0 disables setting the "supp-pubinfo".
|
H A D | EVP_PKEY-HMAC.pod | 30 The MAC key value. 58 a new provider side key object is created with the supplied raw key value. This 65 The MAC key value.
|
/openssl/doc/internal/man3/ |
H A D | OPENSSL_SA.pod | 30 TYPE *value); 55 at zero. If I<idx> refers to a value that has not been set then NULL is 58 B<ossl_sa_I<TYPE>_set>() sets element I<idx> in I<sa> to I<value>, where I<idx> 72 pointer to the associated value is passed as the second argument. 77 a pointer to the associated value is passed as the second argument and
|
H A D | ossl_provider_new.pod | 40 const char *value); 172 The parameters are a combination of I<name> and I<value>, and the 173 provider will use the name to find the value it wants. 230 still returns success. On success the I<actualprov> value is populated with a 321 value is a directory specification and merge it with the module path. 322 Otherwise, merge the value of the OpenSSL built in macro B<MODULESDIR> 330 The command C<openssl version -m> can be used to find out the value 338 ossl_provider_up_ref() returns the value of the reference count after 341 ossl_provider_free() doesn't return any value. 344 activated providers. A return value of 0 means that the callback was not [all …]
|
/openssl/include/openssl/ |
H A D | configuration.h.in | 36 (my $macro, my $value) = $_ =~ /^(.*?)=(.*?)$/; 37 $OUT .= "# define $macro $value\n";
|
/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 31 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { in PKCS12_item_pack_safebag() 39 safebag->value.bag = bag; in PKCS12_item_pack_safebag() 164 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex()
|
/openssl/crypto/asn1/ |
H A D | tasn_utl.c | 48 int ossl_asn1_set_choice_selector(ASN1_VALUE **pval, int value, in ossl_asn1_set_choice_selector() argument 55 *sel = value; in ossl_asn1_set_choice_selector() 271 if (atbl->value == selector) in ossl_asn1_do_adb()
|
/openssl/crypto/cms/ |
H A D | cms_rsa.c | 87 label = plab->parameter->value.octet_string->data; in rsa_cms_decrypt() 89 plab->parameter->value.octet_string->data = NULL; in rsa_cms_decrypt() 90 labellen = plab->parameter->value.octet_string->length; in rsa_cms_decrypt()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 68 ASN1_R_INVALID_VALUE:219:invalid value 76 ASN1_R_MISSING_VALUE:189:missing value 398 CONF_R_NO_VALUE:108:no value 516 DSA_R_BAD_Q_VALUE:102:bad q value 717 EVP_R_INVALID_VALUE:222:invalid value 973 PROP_R_NO_VALUE:107:no value 1099 PROV_R_VALUE_ERROR:138:value error 1151 RSA_R_BAD_E_VALUE:101:bad e value 1262 SSL_R_BAD_DH_VALUE:102:bad dh value 1289 SSL_R_BAD_VALUE:384:bad value [all …]
|