Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 126) sorted by relevance

123456

/openssl/apps/lib/
H A Dvms_term_sock.c131 status, in main() local
169 int status; in TerminalSocket() local
295 int status; in CreateSocketPair() local
331 if (status < 0) { in CreateSocketPair()
341 if (status < 0) { in CreateSocketPair()
360 if (! (status & 1)) { in CreateSocketPair()
371 if (! (status & 1)) { in CreateSocketPair()
392 if (! (status & 1)) { in CreateSocketPair()
444 if (status < 0) { in CreateSocketPair()
508 int status; in TerminalDeviceAst() local
[all …]
H A Dhttp_server.c118 int status; in spawn_loop() local
144 if ((fpid = waitpid(-1, &status, 0)) > 0) { in spawn_loop()
158 if (status != 0) { in spawn_loop()
159 if (WIFEXITED(status)) in spawn_loop()
161 (long)fpid, WEXITSTATUS(status)); in spawn_loop()
162 else if (WIFSIGNALED(status)) in spawn_loop()
164 (long)fpid, WTERMSIG(status), in spawn_loop()
166 WCOREDUMP(status) ? " (core dumped)" : in spawn_loop()
539 int http_server_send_status(BIO *cbio, int status, const char *reason) in http_server_send_status() argument
543 status, reason) > 0; in http_server_send_status()
/openssl/crypto/cmp/
H A Dcmp_status.c33 if (!ossl_assert(si != NULL && si->status != NULL)) in ossl_cmp_pkisi_get_status()
35 return ossl_cmp_asn1_get_int(si->status); in ossl_cmp_pkisi_get_status()
38 const char *ossl_cmp_PKIStatus_to_string(int status) in ossl_cmp_PKIStatus_to_string() argument
40 switch (status) { in ossl_cmp_PKIStatus_to_string()
57 "PKIStatus: invalid=%d", status); in ossl_cmp_PKIStatus_to_string()
165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument
179 || status < 0 in snprint_PKIStatusInfo_parts()
209 if (!failinfo_found && status != OSSL_CMP_PKISTATUS_accepted in snprint_PKIStatusInfo_parts()
210 && status != OSSL_CMP_PKISTATUS_grantedWithMods) { in snprint_PKIStatusInfo_parts()
271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument
[all …]
H A Dcmp_client.c76 if (ossl_cmp_pkisi_get_status(crep->status) in unprotected_exception()
97 if ((ctx->status = ossl_cmp_pkisi_get_status(si)) < 0) in save_statusInfo()
230 if (ctx->status != OSSL_CMP_PKISTATUS_rejection) { in send_receive_check()
232 if (ctx->status == OSSL_CMP_PKISTATUS_waiting) in send_receive_check()
420 switch (ossl_cmp_pkisi_get_status(crep->status)) { in get1_cert_status()
453 ctx->status); in get1_cert_status()
555 if (!save_statusInfo(ctx, crep->status)) in cert_response()
646 ctx->status = -1; in initial_certreq()
750 ctx->status = -1; in OSSL_CMP_exec_RR_ses()
766 if (sk_OSSL_CMP_PKISI_num(rrep->status) < 1) { in OSSL_CMP_exec_RR_ses()
[all …]
/openssl/providers/implementations/rands/seeding/
H A Drand_vms.c388 uint32_t status; in data_collect_method() local
395 lib$signal(status); in data_collect_method()
400 lib$signal(status); in data_collect_method()
405 lib$signal(status); in data_collect_method()
410 lib$signal(status); in data_collect_method()
418 lib$signal(status); in data_collect_method()
423 lib$signal(status); in data_collect_method()
427 lib$signal(status); in data_collect_method()
436 lib$signal(status); in data_collect_method()
440 lib$signal(status); in data_collect_method()
[all …]
H A Drand_vxworks.c136 RANDOM_NUM_GEN_STATUS status = randStatus(); in ossl_pool_acquire_entropy() local
138 if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) in ossl_pool_acquire_entropy()
139 || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { in ossl_pool_acquire_entropy()
/openssl/test/helpers/
H A Dhandshake.c467 switch (status) { in decrypt_session_ticket_cb()
733 peer_status_t status; member
875 peer->status = PEER_RETRY; in do_reneg_setup_step()
1017 peer->status = PEER_ERROR; in do_reneg_setup_step()
1030 peer->status = PEER_SUCCESS; in do_reneg_setup_step()
1529 client.status = PEER_RETRY; in do_handshake_internal()
1530 server.status = PEER_WAITING; in do_handshake_internal()
1545 status = handshake_status(client.status, server.status, in do_handshake_internal()
1551 status = handshake_status(server.status, client.status, in do_handshake_internal()
1555 switch (status) { in do_handshake_internal()
[all …]
/openssl/crypto/
H A DLPdir_vms.c71 int status; in LP_find_file() local
150 status = lib$find_file(&(*ctx)->filespec_dsc, &(*ctx)->result_dsc, in LP_find_file()
153 if (status == RMS$_NMF) { in LP_find_file()
155 vaxc$errno = status; in LP_find_file()
159 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file()
161 vaxc$errno = status; in LP_find_file()
194 int status = lib$find_file_end(&(*ctx)->VMS_context); in LP_find_file_end() local
198 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file_end()
200 vaxc$errno = status; in LP_find_file_end()
/openssl/test/
H A Dbn_internal_test.c30 int status = 0; in test_is_prime_enhanced() local
38 &status)) in test_is_prime_enhanced()
39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced()
51 int status = 0; in test_is_composite_enhanced() local
58 &status)) in test_is_composite_enhanced()
59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
H A Dprovider_status_test.c111 int status; in get_provider_params() local
124 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params()
135 || !TEST_true(status == 1)) in get_provider_params()
146 unsigned int status = 0; in test_provider_status() local
157 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status()
160 || !TEST_true(status == 1)) in test_provider_status()
179 || !TEST_uint_eq(status, 0)) in test_provider_status()
H A Dcmp_status_test.c44 int status; in execute_PKISI_test() local
53 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test()
54 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test()
55 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
/openssl/crypto/dso/
H A Ddso_vms.c272 int status = 0; in vms_bind_sym() local
317 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym()
318 status = do_find_symbol(ptr, &symname_dsc, sym, 0); in vms_bind_sym()
320 if (!$VMS_STATUS_SUCCESS(status)) { in vms_bind_sym()
332 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_bind_sym()
334 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym()
364 int status; in vms_merger() local
418 status = sys$parse(&fab, 0, 0); in vms_merger()
420 if (!$VMS_STATUS_SUCCESS(status)) { in vms_merger()
430 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_merger()
[all …]
/openssl/crypto/ui/
H A Dui_openssl.c167 static long status; variable
466 status = sys$assign(&terminal, &channel, 0, 0); in open_console()
469 if (status != SS$_NORMAL) { in open_console()
471 "status=%%X%08X", status); in open_console()
479 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) in open_console()
503 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) { in noecho_console()
506 status, iosb.iosb$w_value); in noecho_console()
538 status, iosb.iosb$w_value); in echo_console()
561 status = sys$dassgn(channel); in close_console()
562 if (status != SS$_NORMAL) { in close_console()
[all …]
/openssl/doc/designs/ddd/
H A Dddd-06-mem-uv.c10 typedef void (app_connect_cb)(APP_CONN *conn, int status, void *arg);
11 typedef void (app_write_cb)(APP_CONN *conn, int status, void *arg);
14 static void tcp_connect_done(uv_connect_t *tcp_connect, int status);
321 static void net_write_done(uv_write_t *req, int status) in net_write_done() argument
326 if (status < 0) { in net_write_done()
327 fprintf(stderr, "UV write failed %d\n", status); in net_write_done()
440 if (status < 0) { in tcp_connect_done()
541 if (status < 0) { in post_write_get()
542 fprintf(stderr, "write failed: %d\n", status); in post_write_get()
554 if (status < 0) { in post_connect()
[all …]
/openssl/crypto/ts/
H A Dts_rsp_print.c72 long status; in TS_STATUS_INFO_print_bio() local
76 status = ASN1_INTEGER_get(a->status); in TS_STATUS_INFO_print_bio()
77 if (0 <= status && status < (long)OSSL_NELEM(status_map)) in TS_STATUS_INFO_print_bio()
78 BIO_printf(bio, "%s\n", status_map[status]); in TS_STATUS_INFO_print_bio()
H A Dts_asn1.c125 ASN1_SIMPLE(TS_STATUS_INFO, status, ASN1_INTEGER),
135 long status; variable
137 status = ASN1_INTEGER_get(a->status_info->status);
140 if (status != 0 && status != 1) {
150 } else if (status == 0 || status == 1) {
/openssl/doc/man3/
H A DSCT_validate.pod40 Failure to provide the certificate will result in the validation status being
48 (see RFC 6962). If it is required but not provided, the validation status will
56 status will be SCT_VALIDATION_STATUS_UNKNOWN_LOG.
61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION.
65 status will be SCT_VALIDATION_STATUS_INVALID.
67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID.
83 SCT_get_validation_status() returns the validation status of the SCT.
H A DSSL_CTX_set_session_ticket_cb.pod45 used to decrypt the session ticket. The B<status> argument is the result of the
69 assigned to the SSL B<s>. The B<status> indicates the result of the ticket
70 decryption. The callback must check the B<status> value before performing any
76 The B<status> argument can be any of these values:
123 should return this value if B<status> is B<SSL_TICKET_EMPTY> or
129 the callback to return this value if B<status> has a value other than
133 should return this value if B<status> is B<SSL_TICKET_SUCCESS>.
138 callback to return this value if B<status> has a value other than
142 should return this value if B<status> is B<SSL_TICKET_SUCCESS_RENEW>.
146 If B<status> has the value B<SSL_TICKET_EMPTY> or B<SSL_TICKET_NO_DECRYPT> then
[all …]
H A DSSL_set_async_callback.pod24 int SSL_get_async_status(SSL *s, int *status);
44 SSL_get_async_status() returns the engine status. This function facilitates the
46 cryptographic operations are dispatched to an engine. The engine status is very
50 for a description of all of the status values.
68 this point then the status within the B<ASYNC_WAIT_CTX> would be set and the
100 The callback function has the option to check the status returned via
/openssl/apps/
H A DCA.pl.in117 my $status = system($cmd);
118 print "==> $status\n====\n" if $verbose;
119 return $status >> 8;
216 my $status = run("$VERIFY \"-CAfile\" ${CATOP}/$CACERT $file $EXTRA{verify}");
217 $RET = $status if $status != 0;
/openssl/crypto/conf/
H A Dconf_lib.c127 int status; in CONF_get_number() local
132 status = NCONF_get_number_e(NULL, group, name, &result); in CONF_get_number()
137 status = NCONF_get_number_e(&ctmp, group, name, &result); in CONF_get_number()
140 return status == 0 ? 0L : result; in CONF_get_number()
371 int status; in _CONF_get_number() local
375 status = NCONF_get_number_e(conf, section, name, &result); in _CONF_get_number()
377 return status == 0 ? 0L : result; in _CONF_get_number()
/openssl/crypto/async/
H A Dasync.c90 job->status = ASYNC_JOB_RUNNING; in async_job_new()
165 job->status = ASYNC_JOB_STOPPING; in async_start_func()
197 if (ctx->currjob->status == ASYNC_JOB_STOPPING) { in ASYNC_start_job()
206 if (ctx->currjob->status == ASYNC_JOB_PAUSING) { in ASYNC_start_job()
208 ctx->currjob->status = ASYNC_JOB_PAUSED; in ASYNC_start_job()
213 if (ctx->currjob->status == ASYNC_JOB_PAUSED) { in ASYNC_start_job()
307 job->status = ASYNC_JOB_PAUSING; in ASYNC_pause_job()
/openssl/crypto/ec/
H A Dec_backend.c114 int status = 0; in ec_set_check_group_type_from_param() local
119 status = (name != NULL); in ec_set_check_group_type_from_param()
122 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ec_set_check_group_type_from_param()
125 if (status) in ec_set_check_group_type_from_param()
687 int status = 0; in ossl_ec_encoding_param2id() local
693 status = (name != NULL); in ossl_ec_encoding_param2id()
696 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ossl_ec_encoding_param2id()
699 if (status) { in ossl_ec_encoding_param2id()
713 int status = 0; in ossl_ec_pt_format_param2id() local
719 status = (name != NULL); in ossl_ec_pt_format_param2id()
[all …]
/openssl/crypto/bn/
H A Dbn_prime.c269 int i, status, ret = -1; in bn_is_prime_int() local
311 ret = ossl_bn_miller_rabin_is_prime(w, checks, ctx, cb, 0, &status); in bn_is_prime_int()
314 ret = (status == BN_PRIMETEST_PROBABLY_PRIME); in bn_is_prime_int()
338 BN_GENCB *cb, int enhanced, int *status) in ossl_bn_miller_rabin_is_prime() argument
399 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime()
439 *status = BN_PRIMETEST_COMPOSITE_NOT_POWER_OF_PRIME; in ossl_bn_miller_rabin_is_prime()
441 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime()
443 *status = BN_PRIMETEST_COMPOSITE; in ossl_bn_miller_rabin_is_prime()
453 *status = BN_PRIMETEST_PROBABLY_PRIME; in ossl_bn_miller_rabin_is_prime()
/openssl/engines/
H A De_devcrypto.c71 } status; member
470 cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_cipher_methods()
499 cipher_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_cipher_methods()
503 cipher_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_cipher_methods()
648 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE) in dump_cipher_info()
916 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_digest_methods()
939 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods()
945 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCCPHASH; in prepare_digest_methods()
961 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods()
966 digest_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_digest_methods()
[all …]

Completed in 70 milliseconds

123456