Searched refs:fatal (Results 1 – 25 of 44) sorted by relevance
12
/openssl/doc/man3/ |
H A D | SSL_alert_type_string.pod | 58 =item "F"/"fatal" 85 MAC. This message is always fatal. 91 fatal. 129 other fields. This is always fatal. 148 message is always fatal. 154 This message is always fatal. 160 message is always fatal. 173 message is always fatal. 180 always fatal. 187 fatal. [all …]
|
H A D | DTLSv1_listen.pod | 100 A return value of 0 indicates a non-fatal error. This could (for 104 call to DTLSv1_listen() in the event of a non-fatal error. 106 A return value of <0 indicates a fatal error. This could (for example) be 109 For DTLSv1_listen(), prior to OpenSSL 1.1.0, fatal and non-fatal errors both 111 errors as non-fatal), whilst return codes >0 indicate success.
|
H A D | ERR_GET_LIB.pod | 24 ERR_FATAL_ERROR() indicates whether a given error code is a fatal error. 42 is fatal, respectively.
|
H A D | CONF_modules_load_file.pod | 51 considered fatal and no further modules are loaded. 82 consider a configuration file error as fatal and exit immediately. 97 considered fatal):
|
H A D | SSL_extension_supported.pod | 119 If B<add_cb> returns -1 a fatal handshake error occurs using the TLS 164 1. If it returns 0 or a negative value a fatal handshake error occurs 259 If the same custom extension type is received multiple times a fatal 262 the ClientHello a fatal B<unsupported_extension> alert is sent and the
|
H A D | SSL_set_shutdown.pod | 39 or a fatal error.
|
H A D | SSL_do_handshake.pod | 58 The TLS/SSL handshake was not successful because a fatal error occurred either
|
H A D | SSL_accept.pod | 57 The TLS/SSL handshake was not successful because a fatal error occurred either
|
H A D | SSL_CTX_set_alpn_select_cb.pod | 88 select a protocol. It is fatal to the connection if this callback returns 177 B<SSL_TLSEXT_ERR_OK> if successful. Any other value is fatal to the connection.
|
H A D | ASN1_EXTERN_FUNCS.pod | 128 The return value should be negative if a fatal error occurred, or 0 if a 129 non-fatal error occurred. Otherwise it should return the length of the encoded
|
H A D | X509V3_get_d2i.pod | 207 and 0 if it fails due to a non-fatal error (extension not found, already exists, 208 cannot be encoded) or -1 due to a fatal error such as a memory allocation
|
H A D | SSL_CTX_set_session_id_context.pod | 51 will not be reused but a fatal error will be flagged and the handshake
|
H A D | SSL_CTX_set_cert_cb.pod | 27 fatal internal error alert. A negative return value will suspend the handshake
|
H A D | SSL_get_error.pod | 155 Some non-recoverable, fatal I/O error occurred. The OpenSSL error queue may 165 A non-recoverable, fatal error in the SSL library occurred, usually a protocol
|
H A D | SSL_connect.pod | 72 The TLS/SSL handshake was not successful, because a fatal error occurred either
|
H A D | PKCS12_create.pod | 65 a fatal error is returned.
|
H A D | d2i_RSAPrivateKey.pod | 236 /* fatal error handling */ 240 /* non-fatal error handling */
|
H A D | BIO_sendmmsg.pod | 167 The call failed due to a transient, non-fatal error (for example, because the 186 =item Non-fatal errors
|
H A D | SSL_CTX_set_tlsext_status_cb.pod | 92 returned) or SSL_TLSEXT_ERR_ALERT_FATAL (meaning that a fatal error has
|
H A D | SSL_get_session.pod | 55 non-resumable if the connection is not closed down cleanly, e.g. if a fatal
|
/openssl/apps/lib/ |
H A D | http_server.c | 315 goto fatal; in http_server_get_asn1_req() 414 goto fatal; in http_server_get_asn1_req() 496 goto fatal; in http_server_get_asn1_req() 510 fatal: in http_server_get_asn1_req()
|
/openssl/ssl/ |
H A D | tls13_enc.c | 38 unsigned char *out, size_t outlen, int fatal) in tls13_hkdf_expand() argument 56 if (fatal) { in tls13_hkdf_expand() 71 if (fatal) in tls13_hkdf_expand() 99 if (fatal) in tls13_hkdf_expand()
|
H A D | ssl_sess.c | 555 int fatal = 0; in ssl_get_prev_session() local 579 fatal = 1; in ssl_get_prev_session() 628 fatal = 1; in ssl_get_prev_session() 646 fatal = 1; in ssl_get_prev_session() 679 if (fatal) in ssl_get_prev_session()
|
H A D | t1_enc.c | 32 unsigned char *out, size_t olen, int fatal) in tls1_PRF() argument 42 if (fatal) in tls1_PRF() 80 if (fatal) in tls1_PRF()
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 1136 /* fatal */ 1138 /* fatal */ 1142 /* fatal */ 1144 /* fatal */ 1153 /* fatal */ 1155 /* fatal */ 1157 /* fatal */ 1159 /* fatal */ 1162 /* fatal */ 1164 /* fatal */ [all …]
|
Completed in 110 milliseconds
12