Lines Matching refs:value
23 static int parse_boolean(const char *value, int *result) in parse_boolean() argument
25 if (OPENSSL_strcasecmp(value, "Yes") == 0) { in parse_boolean()
29 else if (OPENSSL_strcasecmp(value, "No") == 0) { in parse_boolean()
33 TEST_error("parse_boolean given: '%s'", value); in parse_boolean()
38 static int parse_##name##_##field(struct_type *ctx, const char *value) \
40 return parse_boolean(value, &ctx->field); \
44 static int parse_##name##_##field(struct_type *ctx, const char *value) \
47 ctx->field = OPENSSL_strdup(value); \
52 static int parse_##name##_##field(struct_type *ctx, const char *value) \
54 ctx->field = atoi(value); \
61 int value; member
66 int *value, const char *name) in parse_enum() argument
71 *value = enums[i].value; in parse_enum()
79 int value) in enum_name() argument
83 if (enums[i].value == value) { in enum_name()
101 __owur static int parse_expected_result(SSL_TEST_CTX *test_ctx, const char *value) in parse_expected_result() argument
105 &ret_value, value)) { in parse_expected_result()
129 __owur static int parse_alert(int *alert, const char *value) in parse_alert() argument
131 return parse_enum(ssl_alerts, OSSL_NELEM(ssl_alerts), alert, value); in parse_alert()
134 __owur static int parse_client_alert(SSL_TEST_CTX *test_ctx, const char *value) in parse_client_alert() argument
136 return parse_alert(&test_ctx->expected_client_alert, value); in parse_client_alert()
139 __owur static int parse_server_alert(SSL_TEST_CTX *test_ctx, const char *value) in parse_server_alert() argument
141 return parse_alert(&test_ctx->expected_server_alert, value); in parse_server_alert()
161 __owur static int parse_protocol(SSL_TEST_CTX *test_ctx, const char *value) in parse_protocol() argument
164 &test_ctx->expected_protocol, value); in parse_protocol()
182 const char *value) in parse_client_verify_callback() argument
187 &ret_value, value)) { in parse_client_verify_callback()
210 const char *value) in parse_servername() argument
214 &ret_value, value)) { in parse_servername()
222 const char *value) in parse_expected_servername() argument
226 &ret_value, value)) { in parse_expected_servername()
253 const char *value) in parse_servername_callback() argument
257 OSSL_NELEM(ssl_servername_callbacks), &ret_value, value)) { in parse_servername_callback()
278 __owur static int parse_session_ticket(SSL_TEST_CTX *test_ctx, const char *value) in parse_session_ticket() argument
282 &ret_value, value)) { in parse_session_ticket()
308 __owur static int parse_session_id(SSL_TEST_CTX *test_ctx, const char *value) in parse_session_id() argument
312 &ret_value, value)) { in parse_session_id()
334 __owur static int parse_test_method(SSL_TEST_CTX *test_ctx, const char *value) in parse_test_method() argument
338 &ret_value, value)) { in parse_test_method()
381 __owur static int parse_handshake_mode(SSL_TEST_CTX *test_ctx, const char *value) in parse_handshake_mode() argument
385 &ret_value, value)) { in parse_handshake_mode()
409 __owur static int parse_key_update_type(SSL_TEST_CTX *test_ctx, const char *value) in parse_key_update_type() argument
413 &ret_value, value)) { in parse_key_update_type()
429 const char *value) in parse_ct_validation() argument
433 &ret_value, value)) { in parse_ct_validation()
462 const char *value) in parse_certstatus() argument
466 value)) { in parse_certstatus()
498 const char *value) in parse_max_fragment_len_mode() argument
503 OSSL_NELEM(ssl_max_fragment_len_mode), &ret_value, value)) { in parse_max_fragment_len_mode()
519 __owur static int parse_expected_key_type(int *ptype, const char *value) in parse_expected_key_type() argument
524 if (value == NULL) in parse_expected_key_type()
526 ameth = EVP_PKEY_asn1_find_str(NULL, value, -1); in parse_expected_key_type()
530 nid = OBJ_sn2nid(value); in parse_expected_key_type()
532 nid = OBJ_ln2nid(value); in parse_expected_key_type()
535 nid = EC_curve_nist2nid(value); in parse_expected_key_type()
555 const char *value) in parse_expected_tmp_key_type() argument
557 return parse_expected_key_type(&test_ctx->expected_tmp_key_type, value); in parse_expected_tmp_key_type()
561 const char *value) in parse_expected_server_cert_type() argument
564 value); in parse_expected_server_cert_type()
568 const char *value) in parse_expected_server_sign_type() argument
571 value); in parse_expected_server_sign_type()
575 const char *value) in parse_expected_client_cert_type() argument
578 value); in parse_expected_client_cert_type()
582 const char *value) in parse_expected_client_sign_type() argument
585 value); in parse_expected_client_sign_type()
591 __owur static int parse_expected_sign_hash(int *ptype, const char *value) in parse_expected_sign_hash() argument
595 if (value == NULL) in parse_expected_sign_hash()
597 nid = OBJ_sn2nid(value); in parse_expected_sign_hash()
599 nid = OBJ_ln2nid(value); in parse_expected_sign_hash()
607 const char *value) in parse_expected_server_sign_hash() argument
610 value); in parse_expected_server_sign_hash()
614 const char *value) in parse_expected_client_sign_hash() argument
617 value); in parse_expected_client_sign_hash()
621 const char *value, in parse_expected_ca_names() argument
624 if (value == NULL) in parse_expected_ca_names()
626 if (!strcmp(value, "empty")) in parse_expected_ca_names()
629 *pnames = SSL_load_client_CA_file_ex(value, libctx, NULL); in parse_expected_ca_names()
633 const char *value) in parse_expected_server_ca_names() argument
635 return parse_expected_ca_names(&test_ctx->expected_server_ca_names, value, in parse_expected_server_ca_names()
639 const char *value) in parse_expected_client_ca_names() argument
641 return parse_expected_ca_names(&test_ctx->expected_client_ca_names, value, in parse_expected_client_ca_names()
663 int (*parse)(SSL_TEST_CTX *test_ctx, const char *value);
704 int (*parse)(SSL_TEST_CLIENT_CONF *conf, const char *value);
724 int (*parse)(SSL_TEST_SERVER_CONF *conf, const char *value);
807 if (!ssl_test_client_options[j].parse(client, option->value)) { in parse_client_options()
809 option->value, option->name); in parse_client_options()
840 if (!ssl_test_server_options[j].parse(server, option->value)) { in parse_server_options()
842 option->value, option->name); in parse_server_options()
876 if (!parse_client_options(&ctx->extra.client, conf, option->value)) in SSL_TEST_CTX_create()
879 if (!parse_server_options(&ctx->extra.server, conf, option->value)) in SSL_TEST_CTX_create()
882 if (!parse_server_options(&ctx->extra.server2, conf, option->value)) in SSL_TEST_CTX_create()
886 option->value)) in SSL_TEST_CTX_create()
890 option->value)) in SSL_TEST_CTX_create()
894 option->value)) in SSL_TEST_CTX_create()
899 if (!ssl_test_ctx_options[j].parse(ctx, option->value)) { in SSL_TEST_CTX_create()
901 option->value, option->name); in SSL_TEST_CTX_create()