Home
last modified time | relevance | path

Searched refs:value (Results 226 – 250 of 861) sorted by relevance

12345678910>>...35

/openssl/doc/man3/
H A DSSL_CTX_set_cert_verify_callback.pod35 In server mode, a return value of 0 leads to handshake failure.
39 Otherwise, when the return value is less than or equal to 0, the handshake will
53 In any case a viable verification result value must be reflected
71 SSL_CTX_set_cert_verify_callback() does not return a value.
H A DSSL_connect.pod28 to continue the handshake, indicating the problem by the return value -1.
30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or
63 return value B<ret> to find out the reason.
75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
H A DSSL_read_early_data.pod105 the server, but the total number of bytes written must not exceed the value
145 same way as a 0 return value from L<SSL_read_ex(3)>.
212 this then the connection will abort. This value can be set by calling
214 value for this setting can be obtained by calling
216 value for this setting is 16,384 bytes.
223 The configured value for max_early_data on a server may change over time as
225 max_early_data value. The recv_max_early_data should always be equal to or
226 higher than any recently configured max_early_data value in order to avoid
228 the current configured max_early_data value.
279 changed to accept a lower max early data value such as by calling
[all …]
H A DSSL_set_verify_result.pod24 value will reappear.
30 SSL_set_verify_result() does not provide a return value.
H A DOSSL_CMP_CTX_new.pod208 OSSL_CMP_CTX_set_option() sets the given value for the given option
234 A value <= 0 means no limitation (waiting indefinitely).
241 A value <= 0 means no limitation (waiting indefinitely).
251 The value 0 indicates that TLS is not used.
390 If TLS is not used this defaults to the value of
452 Any previously set value is freed.
455 as default value for the recipient of CMP requests
456 and as default value for the expected sender of CMP responses.
547 the I<ref> value is taken as the fallback value for the senderKID.
555 the value set using OSSL_CMP_CTX_set1_issuer(),
[all …]
H A DX509_NAME_ENTRY_get_object.pod36 X509_NAME_ENTRY_get_data() retrieves the field value of B<ne> in
41 X509_NAME_ENTRY_set_data() sets the field value of B<ne> to string type
42 B<type> and value determined by B<bytes> and B<len>.
H A DSSL_do_handshake.pod31 return value of SSL_do_handshake() will yield B<SSL_ERROR_WANT_READ> or
49 return value B<ret> to find out the reason.
61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
H A DPKCS12_add_cert.pod22 int nid_type, const unsigned char *value, int len);
36 I<iter> is zero then a default value for iteration count of 2048 is used.
43 the supplied I<nid_type> containing the supplied value as an ASN1 octet string.
H A DPKCS12_add_safe.pod26 depends on the value of B<safe_nid>:
34 as the iteration count. If I<iter> is zero then a default value for iteration
62 PKCS12_add_safe() returns a value of 1 indicating success or 0 for failure.
H A DSSL_SESSION_set1_id.pod20 SSL_SESSION_get_id() returns a pointer to the internal session id value for the
29 SSL_SESSION_get_id() returns a pointer to the session id value.
/openssl/doc/man7/
H A DEVP_KDF-X942-ASN1.pod39 This value should not be used in production and should only be used for ACVP
61 information. Setting this value also sets "use-keybits" to 0.
65 The default value of 1 will use the KEK key length (in bits) as the
66 "supp-pubinfo". A value of 0 disables setting the "supp-pubinfo".
H A DEVP_KDF-HKDF.pod41 This parameter sets the info value.
65 operation. The value returned will be the intermediate fixed-length pseudorandom
97 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the
124 salt value "salt" and info value "label":
H A DEVP_SIGNATURE-RSA.pod82 The type of padding to be used. Its value can be one of the following:
107 NULL is used if this optional value is not set.
111 The "pss" mode minimum salt length. The value can either be an integer,
112 a string value representing a number or one of the following string values:
151 The default value of 1 causes an error during signature generation or
H A DEVP_PKEY-HMAC.pod30 The MAC key value.
58 a new provider side key object is created with the supplied raw key value. This
65 The MAC key value.
/openssl/doc/internal/man3/
H A DOPENSSL_SA.pod30 TYPE *value);
55 at zero. If I<idx> refers to a value that has not been set then NULL is
58 B<ossl_sa_I<TYPE>_set>() sets element I<idx> in I<sa> to I<value>, where I<idx>
72 pointer to the associated value is passed as the second argument.
77 a pointer to the associated value is passed as the second argument and
H A Dossl_provider_new.pod40 const char *value);
172 The parameters are a combination of I<name> and I<value>, and the
173 provider will use the name to find the value it wants.
230 still returns success. On success the I<actualprov> value is populated with a
321 value is a directory specification and merge it with the module path.
322 Otherwise, merge the value of the OpenSSL built in macro B<MODULESDIR>
330 The command C<openssl version -m> can be used to find out the value
338 ossl_provider_up_ref() returns the value of the reference count after
341 ossl_provider_free() doesn't return any value.
344 activated providers. A return value of 0 means that the callback was not
[all …]
/openssl/test/
H A Dv3ext.c325 const char *value; member
378 BIO *extbio = BIO_new_mem_buf(extvalues[i].value, in test_ext_syntax()
379 strlen(extvalues[i].value)); in test_ext_syntax()
400 TEST_info("Value: %s", extvalues[i].value); in test_ext_syntax()
408 TEST_info("Value: %s", extvalues[i].value); in test_ext_syntax()
/openssl/demos/cms/
H A Dcms_ver.c41 utctime = t->value.utctime; in print_signingTime()
45 gtime = t->value.generalizedtime; in print_signingTime()
/openssl/crypto/x509/
H A Dv3_pmaps.c82 if (!val->value || !val->name) { in v2i_POLICY_MAPPINGS()
88 obj2 = OBJ_txt2obj(val->value, 0); in v2i_POLICY_MAPPINGS()
H A Dt_acert.c56 bs = at->value.asn1_string; in print_attribute()
65 ASN1_parse_dump(bp, at->value.sequence->data, in print_attribute()
66 at->value.sequence->length, i, 1); in print_attribute()
H A Dv3_tlsf.c105 if (val->value) in v2i_TLS_FEATURE()
106 extval = val->value; in v2i_TLS_FEATURE()
/openssl/crypto/perlasm/
H A Darm-xlate.pl204 my ($reg, $value) = ($1, $2);
207 …oad via literal pool into $reg: value too large for clang - redo manually") if length($value) > 10;
/openssl/crypto/pkcs12/
H A Dp12_attr.c113 return OPENSSL_uni2utf8(atype->value.bmpstring->data, in PKCS12_get_friendlyname()
114 atype->value.bmpstring->length); in PKCS12_get_friendlyname()
/openssl/util/perl/OpenSSL/
H A DOrdinals.pm920 my $value = shift;
924 $self->{$item} = "$value" if defined $value;
930 my $value = shift;
934 $self->{$item} = "$value" if defined $value;
/openssl/crypto/asn1/
H A Dtasn_utl.c48 int ossl_asn1_set_choice_selector(ASN1_VALUE **pval, int value, in ossl_asn1_set_choice_selector() argument
55 *sel = value; in ossl_asn1_set_choice_selector()
273 if (atbl->value == selector) in ossl_asn1_do_adb()

Completed in 41 milliseconds

12345678910>>...35