Home
last modified time | relevance | path

Searched refs:value (Results 201 – 225 of 730) sorted by relevance

12345678910>>...30

/openssl/crypto/x509/
H A Dv3_pmaps.c82 if (!val->value || !val->name) { in v2i_POLICY_MAPPINGS()
88 obj2 = OBJ_txt2obj(val->value, 0); in v2i_POLICY_MAPPINGS()
H A Dv3_tlsf.c105 if (val->value) in v2i_TLS_FEATURE()
106 extval = val->value; in v2i_TLS_FEATURE()
/openssl/doc/man3/
H A DSSL_connect.pod28 to continue the handshake, indicating the problem by the return value -1.
30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or
63 return value B<ret> to find out the reason.
75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
H A DSSL_CTX_set_cert_verify_callback.pod35 In server mode, a return value of 0 leads to handshake failure.
39 Otherwise, when the return value is less than or equal to 0, the handshake will
53 In any case a viable verification result value must be reflected
71 SSL_CTX_set_cert_verify_callback() does not return a value.
H A DX509v3_get_ext_by_NID.pod64 can take any value from 0 to X509_get_ext_count(I<x>) - 1. The returned
74 looks for an extension of criticality I<crit>. A zero value for I<crit>
75 looks for a non-critical extension. A nonzero value looks for a critical
80 If I<loc> is an invalid index value, NULL is returned.
111 X509v3_get_ext_by_critical() and its variants, a zero index return value
H A DSSL_read_early_data.pod105 the server, but the total number of bytes written must not exceed the value
145 same way as a 0 return value from L<SSL_read_ex(3)>.
212 this then the connection will abort. This value can be set by calling
214 value for this setting can be obtained by calling
216 value for this setting is 16,384 bytes.
223 The configured value for max_early_data on a server may change over time as
225 max_early_data value. The recv_max_early_data should always be equal to or
226 higher than any recently configured max_early_data value in order to avoid
228 the current configured max_early_data value.
274 changed to accept a lower max early data value such as by calling
[all …]
H A DOSSL_HTTP_REQ_CTX.pod34 const char *name, const char *value);
66 A value <= 0 indicates that
82 OSSL_HTTP_REQ_CTX_add1_header() adds header I<name> with value I<value> to the
115 I<timeout> < 0 takes over any value set via the I<overall_timeout> argument of
119 If the value is 1 or 2 then a persistent connection is requested.
120 If the value is 2 then a persistent connection is required,
134 the HTTP header C<Content-Type> is also added with the given string value.
174 If the C<Content-Length> header is present and exceeds this value or
175 the content is an ASN.1 encoded structure with a length exceeding this value
H A DSSL_SESSION_set1_id.pod20 SSL_SESSION_get_id() returns a pointer to the internal session id value for the
29 SSL_SESSION_get_id() returns a pointer to the session id value.
H A DX509_NAME_ENTRY_get_object.pod36 X509_NAME_ENTRY_get_data() retrieves the field value of B<ne> in
41 X509_NAME_ENTRY_set_data() sets the field value of B<ne> to string type
42 B<type> and value determined by B<bytes> and B<len>.
H A DSSL_do_handshake.pod31 return value of SSL_do_handshake() will yield B<SSL_ERROR_WANT_READ> or
49 return value B<ret> to find out the reason.
61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
H A DPKCS12_add_cert.pod22 int nid_type, const unsigned char *value, int len);
36 I<iter> is zero then a default value for iteration count of 2048 is used.
43 the supplied I<nid_type> containing the supplied value as an ASN1 octet string.
H A DPKCS12_add_safe.pod26 depends on the value of B<safe_nid>:
34 as the iteration count. If I<iter> is zero then a default value for iteration
62 PKCS12_add_safe() returns a value of 1 indicating success or 0 for failure.
H A DEVP_EncryptInit.pod489 structure. The actual NID value is an internal value which may not have a
522 length to any value other than the fixed value is an error.
638 value returned by EVP_CIPHER_CTX_get_key_length().
665 Use EVP_CIPHER_get_mode() to retrieve the cached value.
691 cached value.
699 cached value.
708 cached value.
716 cached value.
736 Padding is enabled if the value is 1, and disabled if the value is 0.
1035 with a value of (15 - L)
[all …]
H A DOSSL_CMP_exec_certreq.pod78 more flexible regarding what to do after receiving a checkAfter value.
89 and returns -1 after assigning the received checkAfter value
91 The checkAfter value indicates the number of seconds the caller should let pass
98 a negative value as the I<req_type> argument then OSSL_CMP_try_certreq()
135 in case a 'waiting' status has been received and checkAfter value is available.
138 assign the received value unless I<checkAfter> is NULL.
H A DSSL_write.pod51 return value of the write function will yield B<SSL_ERROR_WANT_READ>
101 The write operation was successful, the return value is the number of
108 Call SSL_get_error() with the return value B<ret> to find out the reason.
122 The write operation was successful, the return value is the number
124 value can be less than B<size> for a partial write.
130 Call SSL_get_error() with the return value to find out the reason.
/openssl/doc/man7/
H A DEVP_MAC-KMAC.pod47 Sets the custom value.
48 It is an optional value of at most 256 bytes, and is empty by default.
62 The "xof" parameter value is expected to be 1 or 0. Use 1 to enable XOF mode.
63 The default value is 0.
H A DEVP_KDF-X942-ASN1.pod39 This value should not be used in production and should only be used for ACVP
61 information. Setting this value also sets "use-keybits" to 0.
65 The default value of 1 will use the KEK key length (in bits) as the
66 "supp-pubinfo". A value of 0 disables setting the "supp-pubinfo".
H A DEVP_PKEY-HMAC.pod30 The MAC key value.
58 a new provider side key object is created with the supplied raw key value. This
65 The MAC key value.
/openssl/doc/internal/man3/
H A DOPENSSL_SA.pod30 TYPE *value);
55 at zero. If I<idx> refers to a value that has not been set then NULL is
58 B<ossl_sa_I<TYPE>_set>() sets element I<idx> in I<sa> to I<value>, where I<idx>
72 pointer to the associated value is passed as the second argument.
77 a pointer to the associated value is passed as the second argument and
H A Dossl_provider_new.pod40 const char *value);
172 The parameters are a combination of I<name> and I<value>, and the
173 provider will use the name to find the value it wants.
230 still returns success. On success the I<actualprov> value is populated with a
321 value is a directory specification and merge it with the module path.
322 Otherwise, merge the value of the OpenSSL built in macro B<MODULESDIR>
330 The command C<openssl version -m> can be used to find out the value
338 ossl_provider_up_ref() returns the value of the reference count after
341 ossl_provider_free() doesn't return any value.
344 activated providers. A return value of 0 means that the callback was not
[all …]
/openssl/include/openssl/
H A Dconfiguration.h.in36 (my $macro, my $value) = $_ =~ /^(.*?)=(.*?)$/;
37 $OUT .= "# define $macro $value\n";
/openssl/crypto/pkcs12/
H A Dp12_add.c31 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { in PKCS12_item_pack_safebag()
39 safebag->value.bag = bag; in PKCS12_item_pack_safebag()
164 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex()
/openssl/crypto/asn1/
H A Dtasn_utl.c48 int ossl_asn1_set_choice_selector(ASN1_VALUE **pval, int value, in ossl_asn1_set_choice_selector() argument
55 *sel = value; in ossl_asn1_set_choice_selector()
271 if (atbl->value == selector) in ossl_asn1_do_adb()
/openssl/crypto/cms/
H A Dcms_rsa.c87 label = plab->parameter->value.octet_string->data; in rsa_cms_decrypt()
89 plab->parameter->value.octet_string->data = NULL; in rsa_cms_decrypt()
90 labellen = plab->parameter->value.octet_string->length; in rsa_cms_decrypt()
/openssl/crypto/err/
H A Dopenssl.txt68 ASN1_R_INVALID_VALUE:219:invalid value
76 ASN1_R_MISSING_VALUE:189:missing value
398 CONF_R_NO_VALUE:108:no value
516 DSA_R_BAD_Q_VALUE:102:bad q value
717 EVP_R_INVALID_VALUE:222:invalid value
973 PROP_R_NO_VALUE:107:no value
1099 PROV_R_VALUE_ERROR:138:value error
1151 RSA_R_BAD_E_VALUE:101:bad e value
1262 SSL_R_BAD_DH_VALUE:102:bad dh value
1289 SSL_R_BAD_VALUE:384:bad value
[all …]

Completed in 45 milliseconds

12345678910>>...30