/openssl/doc/man3/ |
H A D | SSL_CTX_set_tlsext_servername_callback.pod | 47 handshake will be aborted. The value of the alert to be used should be stored in 49 value is initialised to SSL_AD_UNRECOGNIZED_NAME. 53 If this value is returned then the servername is not accepted by the server. 54 However, the handshake will continue and send a warning alert instead. The value 57 warning alerts, so if TLSv1.3 has been negotiated then this return value is 62 This return value indicates that the servername is not accepted by the server. 130 to contain the value B<name>. The type of server name indication extension is set
|
H A D | RSA_set_method.pod | 14 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 68 it is, the return value can only be guaranteed to be valid as long as the 149 RSA_set_default_method() returns no value. 152 that was replaced. However, this return value should probably be ignored 167 encryption functions, are controlled by the B<flags> value in the RSA key 168 itself, not by the B<flags> value in the RSA_METHOD attached to the RSA key 171 be reflected in the return value of the RSA_flags() function - in effect
|
H A D | BIO_s_connect.pod | 82 This return value is an internal pointer which should not be modified. 85 This return value is an internal pointer which should not be modified. 88 This return value is an internal pointer which should not be modified. 104 A zero or negative value is returned if the connection could not be established. 109 BIO_set_sock_type() can be used to set a socket type value as would be passed in 120 BIO_get_sock_type() retrieves the value set using BIO_set_sock_type(). 124 If blocking I/O is set then a non positive return value from any 129 override any value set with BIO_set_conn_port(). This may be undesirable
|
H A D | BIO_get_data.pod | 27 The BIO_set_init() function sets the value of the BIO's "init" flag to indicate 28 whether initialisation has been completed for this BIO or not. A nonzero value 33 function returns the value of the "init" flag.
|
H A D | SSL_CTX_dane_enable.pod | 81 A return value of 0 indicates that "unusable" TLSA records (with invalid or 83 A negative return value indicates an internal error in processing the record. 85 The caller is expected to check the return value of each SSL_dane_tlsa_add() 96 The return value is negative if DANE verification failed (or was not enabled), 100 The return value is an index into this verified chain, rather than the list of 115 In this case the return value is the depth of the top-most element of the 123 The return value indicates the match depth or failure to match just as with 125 When the return value is nonnegative, the storage pointed to by the B<usage>, 165 SSL_dane_enable() and SSL_dane_tlsa_add() return a positive value on success. 175 negative value when DANE authentication failed or was not enabled, a [all …]
|
H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 40 made to set the salt length below the minimum value. It is otherwise similar 48 set the digest to anything other than the restricted value. Otherwise these are 85 All these functions return 1 for success and 0 or a negative value for failure. 86 In particular a return value of -2 indicates the operation is not supported by
|
H A D | MD5.pod | 11 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 24 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 36 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 87 MD2(), MD4(), and MD5() return pointers to the hash value.
|
H A D | CRYPTO_get_ex_new_index.pod | 88 are called in increasing order of their B<index> value. 98 B<idx> parameter should be an already-created index value. 102 release the data, it must make sure to set a B<NULL> value at the index, 122 The exdata value may be allocated later on with CRYPTO_alloc_ex_data(), 134 The B<idx> is the index and is the value returned when the callbacks were 143 When the dup_func() returns, the value in B<*from_d> is copied to the 158 note that NULL may be a valid value.
|
H A D | DH_get0_pqg.pod | 16 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 55 value will be returned for that parameter. 64 prime group then the value of I<q> will be set to q = (p - 1) / 2 if I<q> is 75 no value will be returned for that parameter. 103 set to a value greater or equal to 2 * maximum_target_security_strength(BN_num_bits(I<p>)) 113 needed, duplicate the received value using BN_dup() and pass the 121 return the respective value, or NULL if it is unset.
|
H A D | RAND_cleanup.pod | 12 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 26 RAND_cleanup() returns no value.
|
H A D | CMS_get0_type.pod | 20 CMS_ContentInfo structure based on this value. 42 The B<ASN1_OBJECT> values returned can be converted to an integer B<NID> value 53 The return value of CMS_get0_content() is a pointer to the B<ASN1_OCTET_STRING>
|
H A D | BIO_socket_wait.pod | 39 If B<nap_milliseconds> is < 0 then a default value of 100 ms is used. 42 A value of 0 enables waiting indefinitely (i.e, no timeout), 43 while a value < 0 means that BIO_do_connect() is tried only once.
|
H A D | OSSL_HTTP_REQ_CTX.pod | 35 const char *name, const char *value); 70 A value <= 0 indicates that 91 OSSL_HTTP_REQ_CTX_add1_header() adds header I<name> with value I<value> to the 124 I<timeout> < 0 takes over any value set via the I<overall_timeout> argument of 128 If the value is 1 or 2 then a persistent connection is requested. 129 If the value is 2 then a persistent connection is required, 143 the HTTP header C<Content-Type> is also added with the given string value. 183 If the C<Content-Length> header is present and exceeds this value or 184 the content is an ASN.1 encoded structure with a length exceeding this value 201 value is 256. If the number of HTTP headers in a response exceeds the limit,
|
H A D | OSSL_PARAM.pod | 15 void *data; /* value being passed in or out */ 93 The I<data_type> is a value that describes the type and organization of 168 The parameter data is a floating point value in native form. 254 To return a value, it should change the contents of the memory that 265 B<OSSL_PARAM_UNSIGNED_INTEGER>, is plausible to pass the value as an 274 with I<data> pointing at the place for the value to be put. 290 native endianness, and set I<return_size> to the same value as 348 *(char **)params[i].data = "foo value"; 349 params[i].return_size = 9; /* length of "foo value" string */ 351 memcpy(params[i].data, "bar value", 10); [all …]
|
/openssl/crypto/cmp/ |
H A D | cmp_server.c | 246 p10cr = req->body->value.p10cr; in process_cert_request() 248 OSSL_CRMF_MSGS *reqs = req->body->value.ir; /* same for cr and kur */ in process_cert_request() 321 if (sk_OSSL_CMP_REVDETAILS_num(req->body->value.rr) != 1) { in process_rr() 325 details = sk_OSSL_CMP_REVDETAILS_value(req->body->value.rr, 0); in process_rr() 363 if (!srv_ctx->process_genm(srv_ctx, req, req->body->value.genm, &itavs)) in process_genm() 379 errorContent = req->body->value.error; in process_error() 401 ccc = req->body->value.certConf; in process_certConf() 520 prc = req->body->value.pollReq; in process_pollReq()
|
/openssl/doc/man1/ |
H A D | openssl-rand.pod.in | 23 appended to the num value to indicate the requested value be scaled as a 28 The string 'max' may be substituted for a numerical value in num, to request the
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fc.md | 78 amount of flow control budget which has been spent. It is a monotonic value 121 value is added to the TX-side SWM value. Note that this may be zero, though 126 frame, with the integer value contained in that frame (or when we receive the 132 Update event is passed to the state machine with a value lower than that passed 136 The Get TX Window function returns our credit value (that is, it returns the 137 number of controlled bytes we are allowed to send). This value is reduced by the 139 simply the difference between the last On TX Window Updated value and the sum of 143 value which would be returned by the Get TX Window function changes from 171 bytes we can send is the lesser value of the values returned by the Get TX 202 bumped). `numBytes` is the new CWM value, and is monotonic with regard to all [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_mock_srv_new.pod | 66 ossl_cmp_mock_srv_set1_newWithNew() sets the value (which may be NULL) 69 ossl_cmp_mock_srv_set1_newWithOld() sets the value (which may be NULL) 72 ossl_cmp_mock_srv_set1_oldWithNew() sets the value (which may be NULL) 95 ossl_cmp_mock_srv_free() does not return a value.
|
H A D | ossl_cmp_asn1_octet_string_set1.pod | 20 ossl_cmp_asn1_octet_string_set1() frees any previous value of the variable 24 ossl_cmp_asn1_octet_string_set1_bytes() frees any previous value of the variable
|
/openssl/crypto/ |
H A D | armcap.c | 228 static unsigned int sysctl_query(const char *name, unsigned int value) in sysctl_query() argument 233 return (sysctlbyname(name, &sys_value, &len, NULL, 0) == 0 && sys_value == 1) ? value : 0; in sysctl_query() 239 static unsigned int arm_probe_for(void (*probe)(void), volatile unsigned int value) in arm_probe_for() argument 243 return value; in arm_probe_for()
|
/openssl/doc/man7/ |
H A D | EVP_KDF-X963.pod | 37 This parameter specifies an optional value for shared info. 53 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if 66 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the 92 value "label":
|
/openssl/include/openssl/ |
H A D | x509v3.h.in | 141 ASN1_TYPE *value; member 377 ",name:", (val)->name, ",value:", (val)->value) 573 void GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value); 576 ASN1_OBJECT *oid, ASN1_TYPE *value); 625 const char *value, int is_nc); 638 const char *value); 640 const char *value); 652 const char *value); 654 const char *name, const char *value); 664 int X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool); [all …]
|
/openssl/crypto/x509/ |
H A D | v3_extku.c | 113 if (val->value) in v2i_EXTENDED_KEY_USAGE() 114 extval = val->value; in v2i_EXTENDED_KEY_USAGE()
|
/openssl/fuzz/ |
H A D | hashtable.c | 34 uint64_t value; member 180 memcpy(&valptr->value, &buf[3], sizeof(uint64_t)); in FuzzerTestOneInput() 313 OPENSSL_assert(v->value == lval); in FuzzerTestOneInput()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 69 ASN1_R_INVALID_VALUE:219:invalid value 77 ASN1_R_MISSING_VALUE:189:missing value 435 CONF_R_NO_VALUE:108:no value 557 DSA_R_BAD_Q_VALUE:102:bad q value 762 EVP_R_INVALID_VALUE:222:invalid value 1027 PROP_R_NO_VALUE:107:no value 1169 PROV_R_VALUE_ERROR:138:value error 1222 RSA_R_BAD_E_VALUE:101:bad e value 1335 SSL_R_BAD_DH_VALUE:102:bad dh value 1362 SSL_R_BAD_VALUE:384:bad value [all …]
|