Searched refs:reasons (Results 1 – 25 of 67) sorted by relevance
123
/openssl/util/ |
H A D | mkerr.pl | 303 my @reasons = sort grep( /^${lib}_/, keys %rcodes ); 369 foreach my $i ( @reasons ) { 473 foreach my $i ( @reasons ) { 559 foreach my $i ( @reasons ) {
|
H A D | find-unused-errs | 27 echo Function and reasons
|
/openssl/crypto/x509/ |
H A D | v3_crld.c | 225 if (!set_reasons(&point->reasons, cnf->value)) in crldp_from_section() 334 ASN1_IMP_OPT(DIST_POINT, reasons, ASN1_BIT_STRING, 1), 474 if (point->reasons) in i2r_crldp() 475 print_reasons(out, "Reasons", point->reasons, indent); in i2r_crldp()
|
H A D | v3_purp.c | 319 if (dp->reasons != NULL) { in setup_dp() 320 if (dp->reasons->length > 0) in setup_dp() 321 dp->dp_reasons = dp->reasons->data[0]; in setup_dp() 322 if (dp->reasons->length > 1) in setup_dp() 323 dp->dp_reasons |= (dp->reasons->data[1] << 8); in setup_dp()
|
H A D | x509_vfy.c | 1159 unsigned int reasons, best_reasons = 0; in get_crl_sk() local 1166 reasons = *preasons; in get_crl_sk() 1167 crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); in get_crl_sk() 1187 best_reasons = reasons; in get_crl_sk() 1588 unsigned int reasons; in get_crl_delta() local 1593 reasons = ctx->current_reasons; in get_crl_delta() 1595 &issuer, &crl_score, &reasons, ctx->crls); in get_crl_delta() 1606 get_crl_sk(ctx, &crl, &dcrl, &issuer, &crl_score, &reasons, skcrl); in get_crl_delta() 1615 ctx->current_reasons = reasons; in get_crl_delta()
|
/openssl/doc/man3/ |
H A D | SSL_get_peer_signature_nid.pod | 36 possible reasons for failure: the cipher suite has no signature (e.g. it
|
H A D | ERR_GET_LIB.pod | 31 libraries may use the same value to signal different reasons.
|
H A D | SSL_get_verify_result.pod | 21 of a certificate can fail because of many reasons at the same time. Only
|
H A D | OPENSSL_config.pod | 44 There are several reasons why calling the OpenSSL configuration routines is
|
H A D | OPENSSL_LH_stats.pod | 32 many entries are in it. For historical reasons, this function also outputs a
|
H A D | SSL_set_shutdown.pod | 74 for other reasons.
|
H A D | X509_sign.pod | 48 For efficiency reasons and to work around ASN.1 encoding issues the encoding
|
H A D | OCSP_request_add1_nonce.pod | 56 performance reasons. As a result they do not support nonces.
|
H A D | EVP_PKEY_check.pod | 52 within SP800-56A and SP800-56B. For backwards compatibility reasons the OpenSSL
|
H A D | RAND_bytes.pod | 45 If the default RAND_METHOD has been changed then for compatibility reasons the
|
H A D | RAND_add.pod | 76 for compatibility reasons only. See HISTORY section below.
|
H A D | SSL_get_conn_close_info.pod | 125 triggered for QUIC protocol reasons. Otherwise, connection closure was triggered
|
H A D | DH_generate_parameters.pod | 136 DH_check() and DH_check_params() respectively, but the error reasons are added
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 331 value, and the reasons and cRLIssuer fields will be omitted. 352 =item reasons 354 A multi-value field that contains the reasons for revocation. The recognized 377 reasons = keyCompromise, CACompromise 404 A multi-value field that contains the reasons for revocation. The recognized
|
/openssl/doc/designs/ |
H A D | thread-api.md | 5 concurrency and parallelism in some circumstances. There are various reasons why
|
/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 96 For backwards compatibility reasons the default xoflen length for B<shake128> is 100 For backwards compatibility reasons the default xoflen length for B<shake256> is
|
/openssl/doc/internal/man7/ |
H A D | deprecation.pod | 46 The implementation of a deprecated symbol is kept for one of two reasons:
|
/openssl/ |
H A D | CONTRIBUTING.md | 20 or there may be special reasons why a feature is not implemented.
|
H A D | README-PROVIDERS.md | 46 compatibility reasons. This provider is **not** loaded by default.
|
/openssl/include/openssl/ |
H A D | err.h.in | 204 * reasons, as they provide an easy way to place different types of 210 * For backward compatibility reasons, this flag
|
Completed in 51 milliseconds
123