Home
last modified time | relevance | path

Searched refs:value (Results 201 – 225 of 861) sorted by relevance

12345678910>>...35

/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_servername_callback.pod47 handshake will be aborted. The value of the alert to be used should be stored in
49 value is initialised to SSL_AD_UNRECOGNIZED_NAME.
53 If this value is returned then the servername is not accepted by the server.
54 However, the handshake will continue and send a warning alert instead. The value
57 warning alerts, so if TLSv1.3 has been negotiated then this return value is
62 This return value indicates that the servername is not accepted by the server.
130 to contain the value B<name>. The type of server name indication extension is set
H A DRSA_set_method.pod14 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
68 it is, the return value can only be guaranteed to be valid as long as the
149 RSA_set_default_method() returns no value.
152 that was replaced. However, this return value should probably be ignored
167 encryption functions, are controlled by the B<flags> value in the RSA key
168 itself, not by the B<flags> value in the RSA_METHOD attached to the RSA key
171 be reflected in the return value of the RSA_flags() function - in effect
H A DBIO_s_connect.pod82 This return value is an internal pointer which should not be modified.
85 This return value is an internal pointer which should not be modified.
88 This return value is an internal pointer which should not be modified.
104 A zero or negative value is returned if the connection could not be established.
109 BIO_set_sock_type() can be used to set a socket type value as would be passed in
120 BIO_get_sock_type() retrieves the value set using BIO_set_sock_type().
124 If blocking I/O is set then a non positive return value from any
129 override any value set with BIO_set_conn_port(). This may be undesirable
H A DBIO_get_data.pod27 The BIO_set_init() function sets the value of the BIO's "init" flag to indicate
28 whether initialisation has been completed for this BIO or not. A nonzero value
33 function returns the value of the "init" flag.
H A DSSL_CTX_dane_enable.pod81 A return value of 0 indicates that "unusable" TLSA records (with invalid or
83 A negative return value indicates an internal error in processing the record.
85 The caller is expected to check the return value of each SSL_dane_tlsa_add()
96 The return value is negative if DANE verification failed (or was not enabled),
100 The return value is an index into this verified chain, rather than the list of
115 In this case the return value is the depth of the top-most element of the
123 The return value indicates the match depth or failure to match just as with
125 When the return value is nonnegative, the storage pointed to by the B<usage>,
165 SSL_dane_enable() and SSL_dane_tlsa_add() return a positive value on success.
175 negative value when DANE authentication failed or was not enabled, a
[all …]
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod40 made to set the salt length below the minimum value. It is otherwise similar
48 set the digest to anything other than the restricted value. Otherwise these are
85 All these functions return 1 for success and 0 or a negative value for failure.
86 In particular a return value of -2 indicates the operation is not supported by
H A DMD5.pod11 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
24 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
36 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
87 MD2(), MD4(), and MD5() return pointers to the hash value.
H A DCRYPTO_get_ex_new_index.pod88 are called in increasing order of their B<index> value.
98 B<idx> parameter should be an already-created index value.
102 release the data, it must make sure to set a B<NULL> value at the index,
122 The exdata value may be allocated later on with CRYPTO_alloc_ex_data(),
134 The B<idx> is the index and is the value returned when the callbacks were
143 When the dup_func() returns, the value in B<*from_d> is copied to the
158 note that NULL may be a valid value.
H A DDH_get0_pqg.pod16 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
55 value will be returned for that parameter.
64 prime group then the value of I<q> will be set to q = (p - 1) / 2 if I<q> is
75 no value will be returned for that parameter.
103 set to a value greater or equal to 2 * maximum_target_security_strength(BN_num_bits(I<p>))
113 needed, duplicate the received value using BN_dup() and pass the
121 return the respective value, or NULL if it is unset.
H A DRAND_cleanup.pod12 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
26 RAND_cleanup() returns no value.
H A DCMS_get0_type.pod20 CMS_ContentInfo structure based on this value.
42 The B<ASN1_OBJECT> values returned can be converted to an integer B<NID> value
53 The return value of CMS_get0_content() is a pointer to the B<ASN1_OCTET_STRING>
H A DBIO_socket_wait.pod39 If B<nap_milliseconds> is < 0 then a default value of 100 ms is used.
42 A value of 0 enables waiting indefinitely (i.e, no timeout),
43 while a value < 0 means that BIO_do_connect() is tried only once.
H A DOSSL_HTTP_REQ_CTX.pod35 const char *name, const char *value);
70 A value <= 0 indicates that
91 OSSL_HTTP_REQ_CTX_add1_header() adds header I<name> with value I<value> to the
124 I<timeout> < 0 takes over any value set via the I<overall_timeout> argument of
128 If the value is 1 or 2 then a persistent connection is requested.
129 If the value is 2 then a persistent connection is required,
143 the HTTP header C<Content-Type> is also added with the given string value.
183 If the C<Content-Length> header is present and exceeds this value or
184 the content is an ASN.1 encoded structure with a length exceeding this value
201 value is 256. If the number of HTTP headers in a response exceeds the limit,
H A DOSSL_PARAM.pod15 void *data; /* value being passed in or out */
93 The I<data_type> is a value that describes the type and organization of
168 The parameter data is a floating point value in native form.
254 To return a value, it should change the contents of the memory that
265 B<OSSL_PARAM_UNSIGNED_INTEGER>, is plausible to pass the value as an
274 with I<data> pointing at the place for the value to be put.
290 native endianness, and set I<return_size> to the same value as
348 *(char **)params[i].data = "foo value";
349 params[i].return_size = 9; /* length of "foo value" string */
351 memcpy(params[i].data, "bar value", 10);
[all …]
/openssl/crypto/cmp/
H A Dcmp_server.c246 p10cr = req->body->value.p10cr; in process_cert_request()
248 OSSL_CRMF_MSGS *reqs = req->body->value.ir; /* same for cr and kur */ in process_cert_request()
321 if (sk_OSSL_CMP_REVDETAILS_num(req->body->value.rr) != 1) { in process_rr()
325 details = sk_OSSL_CMP_REVDETAILS_value(req->body->value.rr, 0); in process_rr()
363 if (!srv_ctx->process_genm(srv_ctx, req, req->body->value.genm, &itavs)) in process_genm()
379 errorContent = req->body->value.error; in process_error()
401 ccc = req->body->value.certConf; in process_certConf()
520 prc = req->body->value.pollReq; in process_pollReq()
/openssl/doc/man1/
H A Dopenssl-rand.pod.in23 appended to the num value to indicate the requested value be scaled as a
28 The string 'max' may be substituted for a numerical value in num, to request the
/openssl/doc/designs/quic-design/
H A Dquic-fc.md78 amount of flow control budget which has been spent. It is a monotonic value
121 value is added to the TX-side SWM value. Note that this may be zero, though
126 frame, with the integer value contained in that frame (or when we receive the
132 Update event is passed to the state machine with a value lower than that passed
136 The Get TX Window function returns our credit value (that is, it returns the
137 number of controlled bytes we are allowed to send). This value is reduced by the
139 simply the difference between the last On TX Window Updated value and the sum of
143 value which would be returned by the Get TX Window function changes from
171 bytes we can send is the lesser value of the values returned by the Get TX
202 bumped). `numBytes` is the new CWM value, and is monotonic with regard to all
[all …]
/openssl/doc/internal/man3/
H A Dossl_cmp_mock_srv_new.pod66 ossl_cmp_mock_srv_set1_newWithNew() sets the value (which may be NULL)
69 ossl_cmp_mock_srv_set1_newWithOld() sets the value (which may be NULL)
72 ossl_cmp_mock_srv_set1_oldWithNew() sets the value (which may be NULL)
95 ossl_cmp_mock_srv_free() does not return a value.
H A Dossl_cmp_asn1_octet_string_set1.pod20 ossl_cmp_asn1_octet_string_set1() frees any previous value of the variable
24 ossl_cmp_asn1_octet_string_set1_bytes() frees any previous value of the variable
/openssl/crypto/
H A Darmcap.c228 static unsigned int sysctl_query(const char *name, unsigned int value) in sysctl_query() argument
233 return (sysctlbyname(name, &sys_value, &len, NULL, 0) == 0 && sys_value == 1) ? value : 0; in sysctl_query()
239 static unsigned int arm_probe_for(void (*probe)(void), volatile unsigned int value) in arm_probe_for() argument
243 return value; in arm_probe_for()
/openssl/doc/man7/
H A DEVP_KDF-X963.pod37 This parameter specifies an optional value for shared info.
53 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if
66 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the
92 value "label":
/openssl/include/openssl/
H A Dx509v3.h.in141 ASN1_TYPE *value; member
377 ",name:", (val)->name, ",value:", (val)->value)
573 void GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value);
576 ASN1_OBJECT *oid, ASN1_TYPE *value);
625 const char *value, int is_nc);
638 const char *value);
640 const char *value);
652 const char *value);
654 const char *name, const char *value);
664 int X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool);
[all …]
/openssl/crypto/x509/
H A Dv3_extku.c113 if (val->value) in v2i_EXTENDED_KEY_USAGE()
114 extval = val->value; in v2i_EXTENDED_KEY_USAGE()
/openssl/fuzz/
H A Dhashtable.c34 uint64_t value; member
180 memcpy(&valptr->value, &buf[3], sizeof(uint64_t)); in FuzzerTestOneInput()
313 OPENSSL_assert(v->value == lval); in FuzzerTestOneInput()
/openssl/crypto/err/
H A Dopenssl.txt69 ASN1_R_INVALID_VALUE:219:invalid value
77 ASN1_R_MISSING_VALUE:189:missing value
435 CONF_R_NO_VALUE:108:no value
557 DSA_R_BAD_Q_VALUE:102:bad q value
762 EVP_R_INVALID_VALUE:222:invalid value
1027 PROP_R_NO_VALUE:107:no value
1169 PROV_R_VALUE_ERROR:138:value error
1222 RSA_R_BAD_E_VALUE:101:bad e value
1335 SSL_R_BAD_DH_VALUE:102:bad dh value
1362 SSL_R_BAD_VALUE:384:bad value
[all …]

Completed in 60 milliseconds

12345678910>>...35