/openssl/apps/lib/ |
H A D | vms_term_sock.c | 131 status, in main() local 169 int status; in TerminalSocket() local 295 int status; in CreateSocketPair() local 331 if (status < 0) { in CreateSocketPair() 341 if (status < 0) { in CreateSocketPair() 360 if (! (status & 1)) { in CreateSocketPair() 371 if (! (status & 1)) { in CreateSocketPair() 392 if (! (status & 1)) { in CreateSocketPair() 444 if (status < 0) { in CreateSocketPair() 508 int status; in TerminalDeviceAst() local [all …]
|
H A D | http_server.c | 118 int status; in spawn_loop() local 144 if ((fpid = waitpid(-1, &status, 0)) > 0) { in spawn_loop() 158 if (status != 0) { in spawn_loop() 159 if (WIFEXITED(status)) in spawn_loop() 161 (long)fpid, WEXITSTATUS(status)); in spawn_loop() 162 else if (WIFSIGNALED(status)) in spawn_loop() 164 (long)fpid, WTERMSIG(status), in spawn_loop() 166 WCOREDUMP(status) ? " (core dumped)" : in spawn_loop() 539 int http_server_send_status(BIO *cbio, int status, const char *reason) in http_server_send_status() argument 543 status, reason) > 0; in http_server_send_status()
|
/openssl/crypto/cmp/ |
H A D | cmp_status.c | 33 if (!ossl_assert(si != NULL && si->status != NULL)) in ossl_cmp_pkisi_get_status() 35 return ossl_cmp_asn1_get_int(si->status); in ossl_cmp_pkisi_get_status() 38 const char *ossl_cmp_PKIStatus_to_string(int status) in ossl_cmp_PKIStatus_to_string() argument 40 switch (status) { in ossl_cmp_PKIStatus_to_string() 57 "PKIStatus: invalid=%d", status); in ossl_cmp_PKIStatus_to_string() 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 179 || status < 0 in snprint_PKIStatusInfo_parts() 209 if (!failinfo_found && status != OSSL_CMP_PKISTATUS_accepted in snprint_PKIStatusInfo_parts() 210 && status != OSSL_CMP_PKISTATUS_grantedWithMods) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument [all …]
|
H A D | cmp_client.c | 76 if (ossl_cmp_pkisi_get_status(crep->status) in unprotected_exception() 97 if ((ctx->status = ossl_cmp_pkisi_get_status(si)) < 0) in save_statusInfo() 230 if (ctx->status != OSSL_CMP_PKISTATUS_rejection) { in send_receive_check() 232 if (ctx->status == OSSL_CMP_PKISTATUS_waiting) in send_receive_check() 420 switch (ossl_cmp_pkisi_get_status(crep->status)) { in get1_cert_status() 453 ctx->status); in get1_cert_status() 555 if (!save_statusInfo(ctx, crep->status)) in cert_response() 646 ctx->status = -1; in initial_certreq() 750 ctx->status = -1; in OSSL_CMP_exec_RR_ses() 766 if (sk_OSSL_CMP_PKISI_num(rrep->status) < 1) { in OSSL_CMP_exec_RR_ses() [all …]
|
/openssl/providers/implementations/rands/seeding/ |
H A D | rand_vms.c | 388 uint32_t status; in data_collect_method() local 395 lib$signal(status); in data_collect_method() 400 lib$signal(status); in data_collect_method() 405 lib$signal(status); in data_collect_method() 410 lib$signal(status); in data_collect_method() 418 lib$signal(status); in data_collect_method() 423 lib$signal(status); in data_collect_method() 427 lib$signal(status); in data_collect_method() 436 lib$signal(status); in data_collect_method() 440 lib$signal(status); in data_collect_method() [all …]
|
H A D | rand_vxworks.c | 136 RANDOM_NUM_GEN_STATUS status = randStatus(); in ossl_pool_acquire_entropy() local 138 if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) in ossl_pool_acquire_entropy() 139 || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { in ossl_pool_acquire_entropy()
|
/openssl/test/helpers/ |
H A D | handshake.c | 467 switch (status) { in decrypt_session_ticket_cb() 733 peer_status_t status; member 875 peer->status = PEER_RETRY; in do_reneg_setup_step() 1017 peer->status = PEER_ERROR; in do_reneg_setup_step() 1030 peer->status = PEER_SUCCESS; in do_reneg_setup_step() 1529 client.status = PEER_RETRY; in do_handshake_internal() 1530 server.status = PEER_WAITING; in do_handshake_internal() 1545 status = handshake_status(client.status, server.status, in do_handshake_internal() 1551 status = handshake_status(server.status, client.status, in do_handshake_internal() 1555 switch (status) { in do_handshake_internal() [all …]
|
/openssl/crypto/ |
H A D | LPdir_vms.c | 71 int status; in LP_find_file() local 150 status = lib$find_file(&(*ctx)->filespec_dsc, &(*ctx)->result_dsc, in LP_find_file() 153 if (status == RMS$_NMF) { in LP_find_file() 155 vaxc$errno = status; in LP_find_file() 159 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file() 161 vaxc$errno = status; in LP_find_file() 194 int status = lib$find_file_end(&(*ctx)->VMS_context); in LP_find_file_end() local 198 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file_end() 200 vaxc$errno = status; in LP_find_file_end()
|
/openssl/test/ |
H A D | bn_internal_test.c | 30 int status = 0; in test_is_prime_enhanced() local 38 &status)) in test_is_prime_enhanced() 39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced() 51 int status = 0; in test_is_composite_enhanced() local 58 &status)) in test_is_composite_enhanced() 59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
|
H A D | provider_status_test.c | 111 int status; in get_provider_params() local 124 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params() 135 || !TEST_true(status == 1)) in get_provider_params() 146 unsigned int status = 0; in test_provider_status() local 157 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status() 160 || !TEST_true(status == 1)) in test_provider_status() 179 || !TEST_uint_eq(status, 0)) in test_provider_status()
|
H A D | cmp_status_test.c | 44 int status; in execute_PKISI_test() local 53 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test() 54 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test() 55 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
|
/openssl/crypto/dso/ |
H A D | dso_vms.c | 272 int status = 0; in vms_bind_sym() local 317 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym() 318 status = do_find_symbol(ptr, &symname_dsc, sym, 0); in vms_bind_sym() 320 if (!$VMS_STATUS_SUCCESS(status)) { in vms_bind_sym() 332 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_bind_sym() 334 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym() 364 int status; in vms_merger() local 418 status = sys$parse(&fab, 0, 0); in vms_merger() 420 if (!$VMS_STATUS_SUCCESS(status)) { in vms_merger() 430 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_merger() [all …]
|
/openssl/crypto/ui/ |
H A D | ui_openssl.c | 167 static long status; variable 466 status = sys$assign(&terminal, &channel, 0, 0); in open_console() 469 if (status != SS$_NORMAL) { in open_console() 471 "status=%%X%08X", status); in open_console() 479 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) in open_console() 503 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) { in noecho_console() 506 status, iosb.iosb$w_value); in noecho_console() 538 status, iosb.iosb$w_value); in echo_console() 561 status = sys$dassgn(channel); in close_console() 562 if (status != SS$_NORMAL) { in close_console() [all …]
|
/openssl/doc/designs/ddd/ |
H A D | ddd-06-mem-uv.c | 10 typedef void (app_connect_cb)(APP_CONN *conn, int status, void *arg); 11 typedef void (app_write_cb)(APP_CONN *conn, int status, void *arg); 14 static void tcp_connect_done(uv_connect_t *tcp_connect, int status); 321 static void net_write_done(uv_write_t *req, int status) in net_write_done() argument 326 if (status < 0) { in net_write_done() 327 fprintf(stderr, "UV write failed %d\n", status); in net_write_done() 440 if (status < 0) { in tcp_connect_done() 541 if (status < 0) { in post_write_get() 542 fprintf(stderr, "write failed: %d\n", status); in post_write_get() 554 if (status < 0) { in post_connect() [all …]
|
/openssl/crypto/ts/ |
H A D | ts_rsp_print.c | 72 long status; in TS_STATUS_INFO_print_bio() local 76 status = ASN1_INTEGER_get(a->status); in TS_STATUS_INFO_print_bio() 77 if (0 <= status && status < (long)OSSL_NELEM(status_map)) in TS_STATUS_INFO_print_bio() 78 BIO_printf(bio, "%s\n", status_map[status]); in TS_STATUS_INFO_print_bio()
|
H A D | ts_asn1.c | 125 ASN1_SIMPLE(TS_STATUS_INFO, status, ASN1_INTEGER), 135 long status; variable 137 status = ASN1_INTEGER_get(a->status_info->status); 140 if (status != 0 && status != 1) { 150 } else if (status == 0 || status == 1) {
|
/openssl/doc/man3/ |
H A D | SCT_validate.pod | 40 Failure to provide the certificate will result in the validation status being 48 (see RFC 6962). If it is required but not provided, the validation status will 56 status will be SCT_VALIDATION_STATUS_UNKNOWN_LOG. 61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION. 65 status will be SCT_VALIDATION_STATUS_INVALID. 67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID. 83 SCT_get_validation_status() returns the validation status of the SCT.
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 45 used to decrypt the session ticket. The B<status> argument is the result of the 69 assigned to the SSL B<s>. The B<status> indicates the result of the ticket 70 decryption. The callback must check the B<status> value before performing any 76 The B<status> argument can be any of these values: 123 should return this value if B<status> is B<SSL_TICKET_EMPTY> or 129 the callback to return this value if B<status> has a value other than 133 should return this value if B<status> is B<SSL_TICKET_SUCCESS>. 138 callback to return this value if B<status> has a value other than 142 should return this value if B<status> is B<SSL_TICKET_SUCCESS_RENEW>. 146 If B<status> has the value B<SSL_TICKET_EMPTY> or B<SSL_TICKET_NO_DECRYPT> then [all …]
|
H A D | SSL_set_async_callback.pod | 24 int SSL_get_async_status(SSL *s, int *status); 44 SSL_get_async_status() returns the engine status. This function facilitates the 46 cryptographic operations are dispatched to an engine. The engine status is very 50 for a description of all of the status values. 68 this point then the status within the B<ASYNC_WAIT_CTX> would be set and the 100 The callback function has the option to check the status returned via
|
/openssl/apps/ |
H A D | CA.pl.in | 117 my $status = system($cmd); 118 print "==> $status\n====\n" if $verbose; 119 return $status >> 8; 216 my $status = run("$VERIFY \"-CAfile\" ${CATOP}/$CACERT $file $EXTRA{verify}"); 217 $RET = $status if $status != 0;
|
/openssl/crypto/conf/ |
H A D | conf_lib.c | 127 int status; in CONF_get_number() local 132 status = NCONF_get_number_e(NULL, group, name, &result); in CONF_get_number() 137 status = NCONF_get_number_e(&ctmp, group, name, &result); in CONF_get_number() 140 return status == 0 ? 0L : result; in CONF_get_number() 371 int status; in _CONF_get_number() local 375 status = NCONF_get_number_e(conf, section, name, &result); in _CONF_get_number() 377 return status == 0 ? 0L : result; in _CONF_get_number()
|
/openssl/crypto/async/ |
H A D | async.c | 90 job->status = ASYNC_JOB_RUNNING; in async_job_new() 165 job->status = ASYNC_JOB_STOPPING; in async_start_func() 197 if (ctx->currjob->status == ASYNC_JOB_STOPPING) { in ASYNC_start_job() 206 if (ctx->currjob->status == ASYNC_JOB_PAUSING) { in ASYNC_start_job() 208 ctx->currjob->status = ASYNC_JOB_PAUSED; in ASYNC_start_job() 213 if (ctx->currjob->status == ASYNC_JOB_PAUSED) { in ASYNC_start_job() 307 job->status = ASYNC_JOB_PAUSING; in ASYNC_pause_job()
|
/openssl/crypto/ec/ |
H A D | ec_backend.c | 114 int status = 0; in ec_set_check_group_type_from_param() local 119 status = (name != NULL); in ec_set_check_group_type_from_param() 122 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ec_set_check_group_type_from_param() 125 if (status) in ec_set_check_group_type_from_param() 687 int status = 0; in ossl_ec_encoding_param2id() local 693 status = (name != NULL); in ossl_ec_encoding_param2id() 696 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ossl_ec_encoding_param2id() 699 if (status) { in ossl_ec_encoding_param2id() 713 int status = 0; in ossl_ec_pt_format_param2id() local 719 status = (name != NULL); in ossl_ec_pt_format_param2id() [all …]
|
/openssl/crypto/bn/ |
H A D | bn_prime.c | 269 int i, status, ret = -1; in bn_is_prime_int() local 311 ret = ossl_bn_miller_rabin_is_prime(w, checks, ctx, cb, 0, &status); in bn_is_prime_int() 314 ret = (status == BN_PRIMETEST_PROBABLY_PRIME); in bn_is_prime_int() 338 BN_GENCB *cb, int enhanced, int *status) in ossl_bn_miller_rabin_is_prime() argument 399 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime() 439 *status = BN_PRIMETEST_COMPOSITE_NOT_POWER_OF_PRIME; in ossl_bn_miller_rabin_is_prime() 441 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime() 443 *status = BN_PRIMETEST_COMPOSITE; in ossl_bn_miller_rabin_is_prime() 453 *status = BN_PRIMETEST_PROBABLY_PRIME; in ossl_bn_miller_rabin_is_prime()
|
/openssl/engines/ |
H A D | e_devcrypto.c | 71 } status; member 470 cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_cipher_methods() 499 cipher_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_cipher_methods() 503 cipher_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_cipher_methods() 648 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE) in dump_cipher_info() 916 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_digest_methods() 939 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods() 945 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCCPHASH; in prepare_digest_methods() 961 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods() 966 digest_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_digest_methods() [all …]
|