/openssl/doc/man3/ |
H A D | SSL_CTX_set_cert_verify_callback.pod | 35 In server mode, a return value of 0 leads to handshake failure. 39 Otherwise, when the return value is less than or equal to 0, the handshake will 53 In any case a viable verification result value must be reflected 71 SSL_CTX_set_cert_verify_callback() does not return a value.
|
H A D | SSL_connect.pod | 28 to continue the handshake, indicating the problem by the return value -1. 30 return value of SSL_connect() will yield B<SSL_ERROR_WANT_READ> or 63 return value B<ret> to find out the reason. 75 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
|
H A D | SSL_read_early_data.pod | 105 the server, but the total number of bytes written must not exceed the value 145 same way as a 0 return value from L<SSL_read_ex(3)>. 212 this then the connection will abort. This value can be set by calling 214 value for this setting can be obtained by calling 216 value for this setting is 16,384 bytes. 223 The configured value for max_early_data on a server may change over time as 225 max_early_data value. The recv_max_early_data should always be equal to or 226 higher than any recently configured max_early_data value in order to avoid 228 the current configured max_early_data value. 279 changed to accept a lower max early data value such as by calling [all …]
|
H A D | SSL_set_verify_result.pod | 24 value will reappear. 30 SSL_set_verify_result() does not provide a return value.
|
H A D | OSSL_CMP_CTX_new.pod | 208 OSSL_CMP_CTX_set_option() sets the given value for the given option 234 A value <= 0 means no limitation (waiting indefinitely). 241 A value <= 0 means no limitation (waiting indefinitely). 251 The value 0 indicates that TLS is not used. 390 If TLS is not used this defaults to the value of 452 Any previously set value is freed. 455 as default value for the recipient of CMP requests 456 and as default value for the expected sender of CMP responses. 547 the I<ref> value is taken as the fallback value for the senderKID. 555 the value set using OSSL_CMP_CTX_set1_issuer(), [all …]
|
H A D | X509_NAME_ENTRY_get_object.pod | 36 X509_NAME_ENTRY_get_data() retrieves the field value of B<ne> in 41 X509_NAME_ENTRY_set_data() sets the field value of B<ne> to string type 42 B<type> and value determined by B<bytes> and B<len>.
|
H A D | SSL_do_handshake.pod | 31 return value of SSL_do_handshake() will yield B<SSL_ERROR_WANT_READ> or 49 return value B<ret> to find out the reason. 61 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
|
H A D | PKCS12_add_cert.pod | 22 int nid_type, const unsigned char *value, int len); 36 I<iter> is zero then a default value for iteration count of 2048 is used. 43 the supplied I<nid_type> containing the supplied value as an ASN1 octet string.
|
H A D | PKCS12_add_safe.pod | 26 depends on the value of B<safe_nid>: 34 as the iteration count. If I<iter> is zero then a default value for iteration 62 PKCS12_add_safe() returns a value of 1 indicating success or 0 for failure.
|
H A D | SSL_SESSION_set1_id.pod | 20 SSL_SESSION_get_id() returns a pointer to the internal session id value for the 29 SSL_SESSION_get_id() returns a pointer to the session id value.
|
/openssl/doc/man7/ |
H A D | EVP_KDF-X942-ASN1.pod | 39 This value should not be used in production and should only be used for ACVP 61 information. Setting this value also sets "use-keybits" to 0. 65 The default value of 1 will use the KEK key length (in bits) as the 66 "supp-pubinfo". A value of 0 disables setting the "supp-pubinfo".
|
H A D | EVP_KDF-HKDF.pod | 41 This parameter sets the info value. 65 operation. The value returned will be the intermediate fixed-length pseudorandom 97 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the 124 salt value "salt" and info value "label":
|
H A D | EVP_SIGNATURE-RSA.pod | 82 The type of padding to be used. Its value can be one of the following: 107 NULL is used if this optional value is not set. 111 The "pss" mode minimum salt length. The value can either be an integer, 112 a string value representing a number or one of the following string values: 151 The default value of 1 causes an error during signature generation or
|
H A D | EVP_PKEY-HMAC.pod | 30 The MAC key value. 58 a new provider side key object is created with the supplied raw key value. This 65 The MAC key value.
|
/openssl/doc/internal/man3/ |
H A D | OPENSSL_SA.pod | 30 TYPE *value); 55 at zero. If I<idx> refers to a value that has not been set then NULL is 58 B<ossl_sa_I<TYPE>_set>() sets element I<idx> in I<sa> to I<value>, where I<idx> 72 pointer to the associated value is passed as the second argument. 77 a pointer to the associated value is passed as the second argument and
|
H A D | ossl_provider_new.pod | 40 const char *value); 172 The parameters are a combination of I<name> and I<value>, and the 173 provider will use the name to find the value it wants. 230 still returns success. On success the I<actualprov> value is populated with a 321 value is a directory specification and merge it with the module path. 322 Otherwise, merge the value of the OpenSSL built in macro B<MODULESDIR> 330 The command C<openssl version -m> can be used to find out the value 338 ossl_provider_up_ref() returns the value of the reference count after 341 ossl_provider_free() doesn't return any value. 344 activated providers. A return value of 0 means that the callback was not [all …]
|
/openssl/test/ |
H A D | v3ext.c | 325 const char *value; member 378 BIO *extbio = BIO_new_mem_buf(extvalues[i].value, in test_ext_syntax() 379 strlen(extvalues[i].value)); in test_ext_syntax() 400 TEST_info("Value: %s", extvalues[i].value); in test_ext_syntax() 408 TEST_info("Value: %s", extvalues[i].value); in test_ext_syntax()
|
/openssl/demos/cms/ |
H A D | cms_ver.c | 41 utctime = t->value.utctime; in print_signingTime() 45 gtime = t->value.generalizedtime; in print_signingTime()
|
/openssl/crypto/x509/ |
H A D | v3_pmaps.c | 82 if (!val->value || !val->name) { in v2i_POLICY_MAPPINGS() 88 obj2 = OBJ_txt2obj(val->value, 0); in v2i_POLICY_MAPPINGS()
|
H A D | t_acert.c | 56 bs = at->value.asn1_string; in print_attribute() 65 ASN1_parse_dump(bp, at->value.sequence->data, in print_attribute() 66 at->value.sequence->length, i, 1); in print_attribute()
|
H A D | v3_tlsf.c | 105 if (val->value) in v2i_TLS_FEATURE() 106 extval = val->value; in v2i_TLS_FEATURE()
|
/openssl/crypto/perlasm/ |
H A D | arm-xlate.pl | 204 my ($reg, $value) = ($1, $2); 207 …oad via literal pool into $reg: value too large for clang - redo manually") if length($value) > 10;
|
/openssl/crypto/pkcs12/ |
H A D | p12_attr.c | 113 return OPENSSL_uni2utf8(atype->value.bmpstring->data, in PKCS12_get_friendlyname() 114 atype->value.bmpstring->length); in PKCS12_get_friendlyname()
|
/openssl/util/perl/OpenSSL/ |
H A D | Ordinals.pm | 920 my $value = shift; 924 $self->{$item} = "$value" if defined $value; 930 my $value = shift; 934 $self->{$item} = "$value" if defined $value;
|
/openssl/crypto/asn1/ |
H A D | tasn_utl.c | 48 int ossl_asn1_set_choice_selector(ASN1_VALUE **pval, int value, in ossl_asn1_set_choice_selector() argument 55 *sel = value; in ossl_asn1_set_choice_selector() 273 if (atbl->value == selector) in ossl_asn1_do_adb()
|