Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 149) sorted by relevance

123456

/openssl/apps/lib/
H A Dvms_term_sock.c131 status, in main() local
169 int status; in TerminalSocket() local
295 int status; in CreateSocketPair() local
331 if (status < 0) { in CreateSocketPair()
341 if (status < 0) { in CreateSocketPair()
360 if (! (status & 1)) { in CreateSocketPair()
371 if (! (status & 1)) { in CreateSocketPair()
392 if (! (status & 1)) { in CreateSocketPair()
444 if (status < 0) { in CreateSocketPair()
508 int status; in TerminalDeviceAst() local
[all …]
H A Dhttp_server.c83 int status; in spawn_loop() local
110 if ((fpid = waitpid(-1, &status, 0)) > 0) { in spawn_loop()
124 if (status != 0) { in spawn_loop()
125 if (WIFEXITED(status)) { in spawn_loop()
128 (long)fpid, WEXITSTATUS(status)); in spawn_loop()
129 } else if (WIFSIGNALED(status)) { in spawn_loop()
133 if (WCOREDUMP(status)) in spawn_loop()
138 (long)fpid, WTERMSIG(status), dumped); in spawn_loop()
532 int status, const char *reason) in http_server_send_status() argument
537 status, reason); in http_server_send_status()
/openssl/crypto/cmp/
H A Dcmp_status.c35 if (!ossl_assert(si != NULL && si->status != NULL)) in ossl_cmp_pkisi_get_status()
37 res = ossl_cmp_asn1_get_int(si->status); in ossl_cmp_pkisi_get_status()
41 const char *ossl_cmp_PKIStatus_to_string(int status) in ossl_cmp_PKIStatus_to_string() argument
43 switch (status) { in ossl_cmp_PKIStatus_to_string()
60 "PKIStatus: invalid=%d", status); in ossl_cmp_PKIStatus_to_string()
169 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument
183 || status < 0 in snprint_PKIStatusInfo_parts()
216 if (!failinfo_found && status != OSSL_CMP_PKISTATUS_accepted in snprint_PKIStatusInfo_parts()
217 && status != OSSL_CMP_PKISTATUS_grantedWithMods) { in snprint_PKIStatusInfo_parts()
278 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument
[all …]
H A Dcmp_client.c96 ctx->status = ossl_cmp_pkisi_get_status(si); in save_statusInfo()
97 if (ctx->status < OSSL_CMP_PKISTATUS_accepted) in save_statusInfo()
548 ctx->status); in get1_cert_status()
685 si = crep->status; in cert_response()
809 ctx->status = OSSL_CMP_PKISTATUS_request; in initial_certreq()
817 ctx->status = OSSL_CMP_PKISTATUS_trans; in initial_certreq()
912 ctx->status = OSSL_CMP_PKISTATUS_request; in OSSL_CMP_exec_RR_ses()
923 ctx->status = OSSL_CMP_PKISTATUS_trans; in OSSL_CMP_exec_RR_ses()
1039 ctx->status = OSSL_CMP_PKISTATUS_request; in STACK_OF()
1044 ctx->status = OSSL_CMP_PKISTATUS_trans; in STACK_OF()
[all …]
H A Dcmp_server.c174 int status = OSSL_CMP_PKISTATUS_waiting, in delayed_delivery() local
190 status = OSSL_CMP_PKISTATUS_rejection; in delayed_delivery()
198 si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt); in delayed_delivery()
404 OSSL_CMP_CERTSTATUS *status = NULL; in process_certConf() local
414 || ctx->status != OSSL_CMP_PKISTATUS_trans) { in process_certConf()
424 status = sk_OSSL_CMP_CERTSTATUS_value(ccc, 0); in process_certConf()
427 if (status != NULL) { in process_certConf()
428 int certReqId = ossl_cmp_asn1_get_int(status->certReqId); in process_certConf()
429 ASN1_OCTET_STRING *certHash = status->certHash; in process_certConf()
430 OSSL_CMP_PKISI *si = status->statusInfo; in process_certConf()
[all …]
/openssl/providers/implementations/rands/seeding/
H A Drand_vms.c389 uint32_t status; in data_collect_method() local
396 lib$signal(status); in data_collect_method()
401 lib$signal(status); in data_collect_method()
406 lib$signal(status); in data_collect_method()
411 lib$signal(status); in data_collect_method()
419 lib$signal(status); in data_collect_method()
424 lib$signal(status); in data_collect_method()
428 lib$signal(status); in data_collect_method()
437 lib$signal(status); in data_collect_method()
441 lib$signal(status); in data_collect_method()
[all …]
H A Drand_vxworks.c115 RANDOM_NUM_GEN_STATUS status = randStatus(); in ossl_pool_acquire_entropy() local
117 if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) in ossl_pool_acquire_entropy()
118 || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { in ossl_pool_acquire_entropy()
/openssl/test/helpers/
H A Dhandshake.c474 switch (status) { in decrypt_session_ticket_cb()
748 peer_status_t status; member
890 peer->status = PEER_RETRY; in do_reneg_setup_step()
1032 peer->status = PEER_ERROR; in do_reneg_setup_step()
1045 peer->status = PEER_SUCCESS; in do_reneg_setup_step()
1544 client.status = PEER_RETRY; in do_handshake_internal()
1545 server.status = PEER_WAITING; in do_handshake_internal()
1560 status = handshake_status(client.status, server.status, in do_handshake_internal()
1566 status = handshake_status(server.status, client.status, in do_handshake_internal()
1570 switch (status) { in do_handshake_internal()
[all …]
/openssl/crypto/
H A DLPdir_vms.c71 int status; in LP_find_file() local
150 status = lib$find_file(&(*ctx)->filespec_dsc, &(*ctx)->result_dsc, in LP_find_file()
153 if (status == RMS$_NMF) { in LP_find_file()
155 vaxc$errno = status; in LP_find_file()
159 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file()
161 vaxc$errno = status; in LP_find_file()
194 int status = lib$find_file_end(&(*ctx)->VMS_context); in LP_find_file_end() local
198 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file_end()
200 vaxc$errno = status; in LP_find_file_end()
/openssl/test/
H A Dbn_internal_test.c30 int status = 0; in test_is_prime_enhanced() local
38 &status)) in test_is_prime_enhanced()
39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced()
51 int status = 0; in test_is_composite_enhanced() local
58 &status)) in test_is_composite_enhanced()
59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
H A Dcmp_status_test.c43 int status; in execute_PKISI_test() local
52 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test()
53 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test()
54 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
H A Dprovider_status_test.c112 int status; in get_provider_params() local
125 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params()
136 || !TEST_true(status == 1)) in get_provider_params()
147 unsigned int status = 0; in test_provider_status() local
160 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status()
163 || !TEST_true(status == 1)) in test_provider_status()
192 || !TEST_uint_eq(status, 0)) in test_provider_status()
/openssl/crypto/dso/
H A Ddso_vms.c286 int status = 0; in vms_bind_sym() local
331 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym()
332 status = do_find_symbol(ptr, &symname_dsc, sym, 0); in vms_bind_sym()
334 if (!$VMS_STATUS_SUCCESS(status)) { in vms_bind_sym()
346 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_bind_sym()
348 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym()
378 int status; in vms_merger() local
432 status = sys$parse(&fab, 0, 0); in vms_merger()
434 if (!$VMS_STATUS_SUCCESS(status)) { in vms_merger()
444 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_merger()
[all …]
/openssl/crypto/ui/
H A Dui_openssl.c167 static long status; variable
466 status = sys$assign(&terminal, &channel, 0, 0); in open_console()
469 if (status != SS$_NORMAL) { in open_console()
471 "status=%%X%08X", status); in open_console()
479 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) in open_console()
503 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) { in noecho_console()
506 status, iosb.iosb$w_value); in noecho_console()
538 status, iosb.iosb$w_value); in echo_console()
561 status = sys$dassgn(channel); in close_console()
562 if (status != SS$_NORMAL) { in close_console()
[all …]
/openssl/crypto/ts/
H A Dts_rsp_print.c72 long status; in TS_STATUS_INFO_print_bio() local
76 status = ASN1_INTEGER_get(a->status); in TS_STATUS_INFO_print_bio()
77 if (0 <= status && status < (long)OSSL_NELEM(status_map)) in TS_STATUS_INFO_print_bio()
78 BIO_printf(bio, "%s\n", status_map[status]); in TS_STATUS_INFO_print_bio()
H A Dts_asn1.c125 ASN1_SIMPLE(TS_STATUS_INFO, status, ASN1_INTEGER),
135 long status; variable
137 status = ASN1_INTEGER_get(a->status_info->status);
140 if (status != 0 && status != 1) {
150 } else if (status == 0 || status == 1) {
/openssl/demos/http3/
H A Dossl-nghttp3-demo-server.c129 ssl_ids[i].status = status; in add_id_status()
157 if (ssl_ids[i].status & ISCONNECTION) { in get_ids_connection()
186 if (ssl_ids[i].status & TOBEREMOVED) { in remove_marked_ids()
191 ssl_ids[i].status = 0; in remove_marked_ids()
207 ssl_ids[i].status = ssl_ids[i].status | status; in set_id_status()
224 return ssl_ids[i].status; in get_id_status()
703 int status; in read_from_ssl_ids() local
709 if (status & CLIENTUNIOPEN) { in read_from_ssl_ids()
722 int status; in read_from_ssl_ids() local
727 if (status & SERVERCLOSED) { in read_from_ssl_ids()
[all …]
/openssl/doc/designs/ddd/
H A Dddd-06-mem-uv.c13 typedef void (app_connect_cb)(APP_CONN *conn, int status, void *arg);
14 typedef void (app_write_cb)(APP_CONN *conn, int status, void *arg);
404 static void net_write_done(uv_udp_send_t *req, int status) in net_write_done() argument
406 static void net_write_done(uv_write_t *req, int status) in net_write_done()
412 if (status < 0) { in net_write_done()
413 fprintf(stderr, "UV write failed %d\n", status); in net_write_done()
553 if (status < 0) { in tcp_connect_done()
690 if (status < 0) { in post_write_get()
691 fprintf(stderr, "write failed: %d\n", status); in post_write_get()
705 if (status < 0) { in post_connect()
[all …]
/openssl/doc/man3/
H A DSCT_validate.pod40 Failure to provide the certificate will result in the validation status being
48 (see RFC 6962). If it is required but not provided, the validation status will
56 status will be SCT_VALIDATION_STATUS_UNKNOWN_LOG.
61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION.
65 status will be SCT_VALIDATION_STATUS_INVALID.
67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID.
83 SCT_get_validation_status() returns the validation status of the SCT.
H A DSSL_CTX_set_session_ticket_cb.pod45 used to decrypt the session ticket. The B<status> argument is the result of the
69 assigned to the SSL B<s>. The B<status> indicates the result of the ticket
70 decryption. The callback must check the B<status> value before performing any
76 The B<status> argument can be any of these values:
123 should return this value if B<status> is B<SSL_TICKET_EMPTY> or
129 the callback to return this value if B<status> has a value other than
133 should return this value if B<status> is B<SSL_TICKET_SUCCESS>.
138 callback to return this value if B<status> has a value other than
142 should return this value if B<status> is B<SSL_TICKET_SUCCESS_RENEW>.
146 If B<status> has the value B<SSL_TICKET_EMPTY> or B<SSL_TICKET_NO_DECRYPT> then
[all …]
/openssl/apps/
H A DCA.pl.in117 my $status = system($cmd);
118 print "==> $status\n====\n" if $verbose;
119 return $status >> 8;
216 my $status = run("$VERIFY \"-CAfile\" ${CATOP}/$CACERT $file $EXTRA{verify}");
217 $RET = $status if $status != 0;
/openssl/crypto/ec/
H A Dec_backend.c115 int status = 0; in ec_set_check_group_type_from_param() local
120 status = (name != NULL); in ec_set_check_group_type_from_param()
123 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ec_set_check_group_type_from_param()
126 if (status) in ec_set_check_group_type_from_param()
681 int status = 0; in ossl_ec_encoding_param2id() local
687 status = (name != NULL); in ossl_ec_encoding_param2id()
690 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ossl_ec_encoding_param2id()
693 if (status) { in ossl_ec_encoding_param2id()
707 int status = 0; in ossl_ec_pt_format_param2id() local
713 status = (name != NULL); in ossl_ec_pt_format_param2id()
[all …]
/openssl/crypto/async/
H A Dasync.c86 job->status = ASYNC_JOB_RUNNING; in async_job_new()
161 job->status = ASYNC_JOB_STOPPING; in async_start_func()
193 if (ctx->currjob->status == ASYNC_JOB_STOPPING) { in ASYNC_start_job()
202 if (ctx->currjob->status == ASYNC_JOB_PAUSING) { in ASYNC_start_job()
204 ctx->currjob->status = ASYNC_JOB_PAUSED; in ASYNC_start_job()
209 if (ctx->currjob->status == ASYNC_JOB_PAUSED) { in ASYNC_start_job()
302 job->status = ASYNC_JOB_PAUSING; in ASYNC_pause_job()
/openssl/crypto/conf/
H A Dconf_lib.c127 int status; in CONF_get_number() local
132 status = NCONF_get_number_e(NULL, group, name, &result); in CONF_get_number()
137 status = NCONF_get_number_e(&ctmp, group, name, &result); in CONF_get_number()
140 return status == 0 ? 0L : result; in CONF_get_number()
372 int status; in _CONF_get_number() local
376 status = NCONF_get_number_e(conf, section, name, &result); in _CONF_get_number()
378 return status == 0 ? 0L : result; in _CONF_get_number()
/openssl/crypto/bn/
H A Dbn_prime.c278 int i, status, ret = -1; in bn_is_prime_int() local
320 if (!ossl_bn_miller_rabin_is_prime(w, checks, ctx, cb, 0, &status)) { in bn_is_prime_int()
324 ret = (status == BN_PRIMETEST_PROBABLY_PRIME); in bn_is_prime_int()
348 BN_GENCB *cb, int enhanced, int *status) in ossl_bn_miller_rabin_is_prime() argument
409 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime()
449 *status = BN_PRIMETEST_COMPOSITE_NOT_POWER_OF_PRIME; in ossl_bn_miller_rabin_is_prime()
451 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime()
453 *status = BN_PRIMETEST_COMPOSITE; in ossl_bn_miller_rabin_is_prime()
463 *status = BN_PRIMETEST_PROBABLY_PRIME; in ossl_bn_miller_rabin_is_prime()

Completed in 65 milliseconds

123456