/openssl/apps/lib/ |
H A D | vms_term_sock.c | 131 status, in main() local 169 int status; in TerminalSocket() local 295 int status; in CreateSocketPair() local 331 if (status < 0) { in CreateSocketPair() 341 if (status < 0) { in CreateSocketPair() 360 if (! (status & 1)) { in CreateSocketPair() 371 if (! (status & 1)) { in CreateSocketPair() 392 if (! (status & 1)) { in CreateSocketPair() 444 if (status < 0) { in CreateSocketPair() 508 int status; in TerminalDeviceAst() local [all …]
|
H A D | http_server.c | 83 int status; in spawn_loop() local 110 if ((fpid = waitpid(-1, &status, 0)) > 0) { in spawn_loop() 124 if (status != 0) { in spawn_loop() 125 if (WIFEXITED(status)) { in spawn_loop() 128 (long)fpid, WEXITSTATUS(status)); in spawn_loop() 129 } else if (WIFSIGNALED(status)) { in spawn_loop() 133 if (WCOREDUMP(status)) in spawn_loop() 138 (long)fpid, WTERMSIG(status), dumped); in spawn_loop() 532 int status, const char *reason) in http_server_send_status() argument 537 status, reason); in http_server_send_status()
|
/openssl/crypto/cmp/ |
H A D | cmp_status.c | 35 if (!ossl_assert(si != NULL && si->status != NULL)) in ossl_cmp_pkisi_get_status() 37 res = ossl_cmp_asn1_get_int(si->status); in ossl_cmp_pkisi_get_status() 41 const char *ossl_cmp_PKIStatus_to_string(int status) in ossl_cmp_PKIStatus_to_string() argument 43 switch (status) { in ossl_cmp_PKIStatus_to_string() 60 "PKIStatus: invalid=%d", status); in ossl_cmp_PKIStatus_to_string() 169 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 183 || status < 0 in snprint_PKIStatusInfo_parts() 216 if (!failinfo_found && status != OSSL_CMP_PKISTATUS_accepted in snprint_PKIStatusInfo_parts() 217 && status != OSSL_CMP_PKISTATUS_grantedWithMods) { in snprint_PKIStatusInfo_parts() 278 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument [all …]
|
H A D | cmp_client.c | 96 ctx->status = ossl_cmp_pkisi_get_status(si); in save_statusInfo() 97 if (ctx->status < OSSL_CMP_PKISTATUS_accepted) in save_statusInfo() 548 ctx->status); in get1_cert_status() 685 si = crep->status; in cert_response() 809 ctx->status = OSSL_CMP_PKISTATUS_request; in initial_certreq() 817 ctx->status = OSSL_CMP_PKISTATUS_trans; in initial_certreq() 912 ctx->status = OSSL_CMP_PKISTATUS_request; in OSSL_CMP_exec_RR_ses() 923 ctx->status = OSSL_CMP_PKISTATUS_trans; in OSSL_CMP_exec_RR_ses() 1039 ctx->status = OSSL_CMP_PKISTATUS_request; in STACK_OF() 1044 ctx->status = OSSL_CMP_PKISTATUS_trans; in STACK_OF() [all …]
|
H A D | cmp_server.c | 174 int status = OSSL_CMP_PKISTATUS_waiting, in delayed_delivery() local 190 status = OSSL_CMP_PKISTATUS_rejection; in delayed_delivery() 198 si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt); in delayed_delivery() 404 OSSL_CMP_CERTSTATUS *status = NULL; in process_certConf() local 414 || ctx->status != OSSL_CMP_PKISTATUS_trans) { in process_certConf() 424 status = sk_OSSL_CMP_CERTSTATUS_value(ccc, 0); in process_certConf() 427 if (status != NULL) { in process_certConf() 428 int certReqId = ossl_cmp_asn1_get_int(status->certReqId); in process_certConf() 429 ASN1_OCTET_STRING *certHash = status->certHash; in process_certConf() 430 OSSL_CMP_PKISI *si = status->statusInfo; in process_certConf() [all …]
|
/openssl/providers/implementations/rands/seeding/ |
H A D | rand_vms.c | 389 uint32_t status; in data_collect_method() local 396 lib$signal(status); in data_collect_method() 401 lib$signal(status); in data_collect_method() 406 lib$signal(status); in data_collect_method() 411 lib$signal(status); in data_collect_method() 419 lib$signal(status); in data_collect_method() 424 lib$signal(status); in data_collect_method() 428 lib$signal(status); in data_collect_method() 437 lib$signal(status); in data_collect_method() 441 lib$signal(status); in data_collect_method() [all …]
|
H A D | rand_vxworks.c | 115 RANDOM_NUM_GEN_STATUS status = randStatus(); in ossl_pool_acquire_entropy() local 117 if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) in ossl_pool_acquire_entropy() 118 || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { in ossl_pool_acquire_entropy()
|
/openssl/test/helpers/ |
H A D | handshake.c | 474 switch (status) { in decrypt_session_ticket_cb() 748 peer_status_t status; member 890 peer->status = PEER_RETRY; in do_reneg_setup_step() 1032 peer->status = PEER_ERROR; in do_reneg_setup_step() 1045 peer->status = PEER_SUCCESS; in do_reneg_setup_step() 1544 client.status = PEER_RETRY; in do_handshake_internal() 1545 server.status = PEER_WAITING; in do_handshake_internal() 1560 status = handshake_status(client.status, server.status, in do_handshake_internal() 1566 status = handshake_status(server.status, client.status, in do_handshake_internal() 1570 switch (status) { in do_handshake_internal() [all …]
|
/openssl/crypto/ |
H A D | LPdir_vms.c | 71 int status; in LP_find_file() local 150 status = lib$find_file(&(*ctx)->filespec_dsc, &(*ctx)->result_dsc, in LP_find_file() 153 if (status == RMS$_NMF) { in LP_find_file() 155 vaxc$errno = status; in LP_find_file() 159 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file() 161 vaxc$errno = status; in LP_find_file() 194 int status = lib$find_file_end(&(*ctx)->VMS_context); in LP_find_file_end() local 198 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file_end() 200 vaxc$errno = status; in LP_find_file_end()
|
/openssl/test/ |
H A D | bn_internal_test.c | 30 int status = 0; in test_is_prime_enhanced() local 38 &status)) in test_is_prime_enhanced() 39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced() 51 int status = 0; in test_is_composite_enhanced() local 58 &status)) in test_is_composite_enhanced() 59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
|
H A D | cmp_status_test.c | 43 int status; in execute_PKISI_test() local 52 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test() 53 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test() 54 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
|
H A D | provider_status_test.c | 112 int status; in get_provider_params() local 125 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params() 136 || !TEST_true(status == 1)) in get_provider_params() 147 unsigned int status = 0; in test_provider_status() local 160 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status() 163 || !TEST_true(status == 1)) in test_provider_status() 192 || !TEST_uint_eq(status, 0)) in test_provider_status()
|
/openssl/crypto/dso/ |
H A D | dso_vms.c | 286 int status = 0; in vms_bind_sym() local 331 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym() 332 status = do_find_symbol(ptr, &symname_dsc, sym, 0); in vms_bind_sym() 334 if (!$VMS_STATUS_SUCCESS(status)) { in vms_bind_sym() 346 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_bind_sym() 348 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym() 378 int status; in vms_merger() local 432 status = sys$parse(&fab, 0, 0); in vms_merger() 434 if (!$VMS_STATUS_SUCCESS(status)) { in vms_merger() 444 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_merger() [all …]
|
/openssl/crypto/ui/ |
H A D | ui_openssl.c | 167 static long status; variable 466 status = sys$assign(&terminal, &channel, 0, 0); in open_console() 469 if (status != SS$_NORMAL) { in open_console() 471 "status=%%X%08X", status); in open_console() 479 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) in open_console() 503 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) { in noecho_console() 506 status, iosb.iosb$w_value); in noecho_console() 538 status, iosb.iosb$w_value); in echo_console() 561 status = sys$dassgn(channel); in close_console() 562 if (status != SS$_NORMAL) { in close_console() [all …]
|
/openssl/crypto/ts/ |
H A D | ts_rsp_print.c | 72 long status; in TS_STATUS_INFO_print_bio() local 76 status = ASN1_INTEGER_get(a->status); in TS_STATUS_INFO_print_bio() 77 if (0 <= status && status < (long)OSSL_NELEM(status_map)) in TS_STATUS_INFO_print_bio() 78 BIO_printf(bio, "%s\n", status_map[status]); in TS_STATUS_INFO_print_bio()
|
H A D | ts_asn1.c | 125 ASN1_SIMPLE(TS_STATUS_INFO, status, ASN1_INTEGER), 135 long status; variable 137 status = ASN1_INTEGER_get(a->status_info->status); 140 if (status != 0 && status != 1) { 150 } else if (status == 0 || status == 1) {
|
/openssl/demos/http3/ |
H A D | ossl-nghttp3-demo-server.c | 129 ssl_ids[i].status = status; in add_id_status() 157 if (ssl_ids[i].status & ISCONNECTION) { in get_ids_connection() 186 if (ssl_ids[i].status & TOBEREMOVED) { in remove_marked_ids() 191 ssl_ids[i].status = 0; in remove_marked_ids() 207 ssl_ids[i].status = ssl_ids[i].status | status; in set_id_status() 224 return ssl_ids[i].status; in get_id_status() 703 int status; in read_from_ssl_ids() local 709 if (status & CLIENTUNIOPEN) { in read_from_ssl_ids() 722 int status; in read_from_ssl_ids() local 727 if (status & SERVERCLOSED) { in read_from_ssl_ids() [all …]
|
/openssl/doc/designs/ddd/ |
H A D | ddd-06-mem-uv.c | 13 typedef void (app_connect_cb)(APP_CONN *conn, int status, void *arg); 14 typedef void (app_write_cb)(APP_CONN *conn, int status, void *arg); 404 static void net_write_done(uv_udp_send_t *req, int status) in net_write_done() argument 406 static void net_write_done(uv_write_t *req, int status) in net_write_done() 412 if (status < 0) { in net_write_done() 413 fprintf(stderr, "UV write failed %d\n", status); in net_write_done() 553 if (status < 0) { in tcp_connect_done() 690 if (status < 0) { in post_write_get() 691 fprintf(stderr, "write failed: %d\n", status); in post_write_get() 705 if (status < 0) { in post_connect() [all …]
|
/openssl/doc/man3/ |
H A D | SCT_validate.pod | 40 Failure to provide the certificate will result in the validation status being 48 (see RFC 6962). If it is required but not provided, the validation status will 56 status will be SCT_VALIDATION_STATUS_UNKNOWN_LOG. 61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION. 65 status will be SCT_VALIDATION_STATUS_INVALID. 67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID. 83 SCT_get_validation_status() returns the validation status of the SCT.
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 45 used to decrypt the session ticket. The B<status> argument is the result of the 69 assigned to the SSL B<s>. The B<status> indicates the result of the ticket 70 decryption. The callback must check the B<status> value before performing any 76 The B<status> argument can be any of these values: 123 should return this value if B<status> is B<SSL_TICKET_EMPTY> or 129 the callback to return this value if B<status> has a value other than 133 should return this value if B<status> is B<SSL_TICKET_SUCCESS>. 138 callback to return this value if B<status> has a value other than 142 should return this value if B<status> is B<SSL_TICKET_SUCCESS_RENEW>. 146 If B<status> has the value B<SSL_TICKET_EMPTY> or B<SSL_TICKET_NO_DECRYPT> then [all …]
|
/openssl/apps/ |
H A D | CA.pl.in | 117 my $status = system($cmd); 118 print "==> $status\n====\n" if $verbose; 119 return $status >> 8; 216 my $status = run("$VERIFY \"-CAfile\" ${CATOP}/$CACERT $file $EXTRA{verify}"); 217 $RET = $status if $status != 0;
|
/openssl/crypto/ec/ |
H A D | ec_backend.c | 115 int status = 0; in ec_set_check_group_type_from_param() local 120 status = (name != NULL); in ec_set_check_group_type_from_param() 123 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ec_set_check_group_type_from_param() 126 if (status) in ec_set_check_group_type_from_param() 681 int status = 0; in ossl_ec_encoding_param2id() local 687 status = (name != NULL); in ossl_ec_encoding_param2id() 690 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ossl_ec_encoding_param2id() 693 if (status) { in ossl_ec_encoding_param2id() 707 int status = 0; in ossl_ec_pt_format_param2id() local 713 status = (name != NULL); in ossl_ec_pt_format_param2id() [all …]
|
/openssl/crypto/async/ |
H A D | async.c | 86 job->status = ASYNC_JOB_RUNNING; in async_job_new() 161 job->status = ASYNC_JOB_STOPPING; in async_start_func() 193 if (ctx->currjob->status == ASYNC_JOB_STOPPING) { in ASYNC_start_job() 202 if (ctx->currjob->status == ASYNC_JOB_PAUSING) { in ASYNC_start_job() 204 ctx->currjob->status = ASYNC_JOB_PAUSED; in ASYNC_start_job() 209 if (ctx->currjob->status == ASYNC_JOB_PAUSED) { in ASYNC_start_job() 302 job->status = ASYNC_JOB_PAUSING; in ASYNC_pause_job()
|
/openssl/crypto/conf/ |
H A D | conf_lib.c | 127 int status; in CONF_get_number() local 132 status = NCONF_get_number_e(NULL, group, name, &result); in CONF_get_number() 137 status = NCONF_get_number_e(&ctmp, group, name, &result); in CONF_get_number() 140 return status == 0 ? 0L : result; in CONF_get_number() 372 int status; in _CONF_get_number() local 376 status = NCONF_get_number_e(conf, section, name, &result); in _CONF_get_number() 378 return status == 0 ? 0L : result; in _CONF_get_number()
|
/openssl/crypto/bn/ |
H A D | bn_prime.c | 278 int i, status, ret = -1; in bn_is_prime_int() local 320 if (!ossl_bn_miller_rabin_is_prime(w, checks, ctx, cb, 0, &status)) { in bn_is_prime_int() 324 ret = (status == BN_PRIMETEST_PROBABLY_PRIME); in bn_is_prime_int() 348 BN_GENCB *cb, int enhanced, int *status) in ossl_bn_miller_rabin_is_prime() argument 409 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime() 449 *status = BN_PRIMETEST_COMPOSITE_NOT_POWER_OF_PRIME; in ossl_bn_miller_rabin_is_prime() 451 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime() 453 *status = BN_PRIMETEST_COMPOSITE; in ossl_bn_miller_rabin_is_prime() 463 *status = BN_PRIMETEST_PROBABLY_PRIME; in ossl_bn_miller_rabin_is_prime()
|