/openssl/doc/man3/ |
H A D | ERR_set_mark.pod | 23 ERR_pop_to_mark() will pop the top of the error stack until a mark is found. 24 The mark is then removed. If there is no mark, the whole stack is removed. 28 ERR_count_to_mark() returns the number of entries on the error stack above the 30 error stack, the number of entries in the error stack is returned. 33 stack (which is the entry obtainable via L<ERR_peek_last_error(3)>). 37 ERR_set_mark() returns 0 if the error stack is empty, otherwise 1. 40 error stack, which implies that the stack became empty, otherwise 1. 42 ERR_count_to_mark() returns the number of error stack entries found above the 43 most recent mark, if any, or the total number of error stack entries. 45 ERR_pop() returns 1 if an error was popped or 0 if the error stack was empty.
|
H A D | DEFINE_STACK_OF.pod | 21 - stack container 78 This can be used in every header file that references the stack. 122 B<sk_I<TYPE>_new_reserve>() allocates a new stack. The new stack will have 128 to the newly created stack. If I<compare> is NULL then no comparison 188 element in the sorted stack is returned. 200 or an empty stack if the passed stack is NULL. 204 copied or an empty stack if the passed stack is NULL. 233 and B<sk_I<TYPE>_find_all>() on a NULL stack, empty stack, or with 250 passed stack is NULL. 256 return an empty stack or NULL if an error occurs. [all …]
|
H A D | SSL_load_client_CA_file.pod | 20 int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, 22 int SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, 24 int SSL_add_store_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, 37 and adds their subject name to the already existing I<stack>. 41 already existing I<stack>. 45 I<stack>. 64 The operation failed, check out the error stack for the reason.
|
H A D | PKCS12_SAFEBAG_get0_attrs.pod | 19 PKCS12_SAFEBAG_get0_attrs() retrieves the stack of B<X509_ATTRIBUTE>s from a 22 PKCS12_get_attr_gen() retrieves an attribute by NID from a stack of 27 PKCS12_SAFEBAG_get0_attrs() returns the stack of B<X509_ATTRIBUTE>s from a
|
H A D | SSL_get_ciphers.pod | 30 SSL_get_ciphers() returns the stack of available SSL_CIPHERs for B<ssl>, 34 SSL_CTX_get_ciphers() returns the stack of available SSL_CIPHERs for B<ctx>. 36 SSL_get1_supported_ciphers() returns the stack of enabled SSL_CIPHERs for 49 SSL_get_client_ciphers() returns the stack of available SSL_CIPHERs matching the 89 return a pointer to an internal cipher stack, which will be freed later on when 93 The stack returned by SSL_get1_supported_ciphers() should be freed using
|
H A D | PEM_X509_INFO_read_bio_ex.pod | 47 If the input stack I<sk> is NULL a new stack is allocated, 48 else the given stack is extended. 61 a stack of B<X509_INFO> objects or NULL on failure.
|
H A D | X509_new.pod | 45 chain B<x> and returns a copy of the stack, or an empty stack if B<a> is NULL. 58 each certificate. It also returns a copy of the stack, using sk_X509_dup(), 70 X509_chain_up_ref() returns a copy of the stack or NULL if an error occurred.
|
H A D | X509_STORE_get0_param.pod | 47 X509_STORE_get1_objects() returns a pointer to a stack of the retrieved 50 X509_STORE_get0_objects() returns a pointer to a stack of B<X509_OBJECT>. 52 X509_STORE_get1_all_certs() returns a pointer to a stack of the retrieved
|
H A D | SSL_CTX_add_extra_chain_cert.pod | 29 The returned stack should not be freed by the caller. 33 The returned stack should not be freed by the caller. 65 1 on success and 0 for failure. Check out the error stack to find out the
|
H A D | ADMISSIONS.pod | 109 The B<PROFESSION_INFOS> type is a stack of B<PROFESSION_INFO>; see 122 The B<ADMISSION_SYNTAX> type has an authority name and a stack of 133 stack of B<PROFESSION_INFO> items.
|
/openssl/doc/designs/quic-design/ |
H A D | error-handling.md | 7 The errors are put on the error stack (rather a queue but error stack is 10 error return value. The `SSL_get_error()` call depends on the stack being 40 entries on the error stack. 43 to the error stack. 61 depend on the error stack contents. 64 error stack before returning to the user. 75 is detected the error stack entries are moved to this error stack in 80 are copied to the thread local error stack. They are always kept on 81 the QUIC_CHANNEL error stack as well for possible further calls from 83 SSL_R_QUIC_CONNECTION_TERMINATED is added to the stack. [all …]
|
/openssl/crypto/perlasm/ |
H A D | x86asm.pl | 30 if ($opcode =~ /^push/) { $stack+=4; } 31 elsif ($opcode =~ /^pop/) { $stack-=4; } 51 sub ::stack_push{ my $num=$_[0]*4; $stack+=$num; &sub("esp",$num); } 52 sub ::stack_pop { my $num=$_[0]*4; $stack-=$num; &add("esp",$num); } 53 sub ::blindpop { &pop($_[0]); $stack+=4; } 54 sub ::wparam { &DWP($stack+4*$_[0],"esp"); } 221 $stack=4; 235 $stack=0; 245 $stack+=16; # readjust esp as if we didn't pop anything
|
H A D | x86masm.pl | 115 $::stack=4; 121 $::stack=0;
|
H A D | x86nasm.pl | 117 $::stack=4; 121 { $::stack=0;
|
H A D | x86gas.pl | 128 $::stack=4; 134 $::stack=0;
|
/openssl/ssl/quic/ |
H A D | json_enc.c | 119 unsigned char *stack; in json_ensure_stack_size() local 125 stack = json->stack_small; in json_ensure_stack_size() 127 if (json->stack == json->stack_small) in json_ensure_stack_size() 128 json->stack = NULL; in json_ensure_stack_size() 130 stack = OPENSSL_realloc(json->stack, num_bytes); in json_ensure_stack_size() 131 if (stack == NULL) in json_ensure_stack_size() 135 json->stack = stack; in json_ensure_stack_size() 208 return (json->stack[obyte] & (1U << obit)) != 0; in json_peek() 253 if (json->stack != json->stack_small) in ossl_json_cleanup() 254 OPENSSL_free(json->stack); in ossl_json_cleanup() [all …]
|
/openssl/crypto/bn/ |
H A D | bn_ctx.c | 67 BN_STACK stack; member 86 BN_STACK *stack = &ctx->stack; in ctxdbg() local 99 while (fpidx < stack->depth) { in ctxdbg() 100 while (bnidx++ < stack->indexes[fpidx]) in ctxdbg() 126 BN_STACK_init(&ret->stack); in BN_CTX_new_ex() 163 ctx->stack.size, ctx->pool.size); in BN_CTX_free() 174 BN_STACK_finish(&ctx->stack); in BN_CTX_free() 186 else if (!BN_STACK_push(&ctx->stack, ctx->used)) { in BN_CTX_start() 201 unsigned int fp = BN_STACK_pop(&ctx->stack); in BN_CTX_end()
|
/openssl/crypto/ |
H A D | ex_data.c | 225 EX_CALLBACK *stack[10]; in ossl_crypto_new_ex_data_ex() local 240 if (mx < (int)OSSL_NELEM(stack)) in ossl_crypto_new_ex_data_ex() 241 storage = stack; in ossl_crypto_new_ex_data_ex() 259 if (storage != stack) in ossl_crypto_new_ex_data_ex() 278 EX_CALLBACK *stack[10]; in CRYPTO_dup_ex_data() local 302 if (mx < (int)OSSL_NELEM(stack)) in CRYPTO_dup_ex_data() 303 storage = stack; in CRYPTO_dup_ex_data() 336 if (storage != stack) in CRYPTO_dup_ex_data() 373 struct ex_callback_entry stack[10]; in CRYPTO_free_ex_data() local 387 storage = stack; in CRYPTO_free_ex_data() [all …]
|
/openssl/apps/ |
H A D | list.c | 101 STACK_OF(EVP_CIPHER) *cipher_stack = stack; in collect_ciphers() 185 STACK_OF(EVP_MD) *digest_stack = stack; in collect_digests() 251 static void collect_macs(EVP_MAC *mac, void *stack) in collect_macs() argument 253 STACK_OF(EVP_MAC) *mac_stack = stack; in collect_macs() 317 STACK_OF(EVP_KDF) *kdf_stack = stack; in collect_kdfs() 387 STACK_OF(EVP_RAND) *rand_stack = stack; in collect_rands() 513 STACK_OF(OSSL_ENCODER) *encoder_stack = stack; in collect_encoders() 640 STACK_OF(EVP_KEYMGMT) *km_stack = stack; in collect_keymanagers() 703 STACK_OF(EVP_SIGNATURE) *sig_stack = stack; in collect_signatures() 810 STACK_OF(EVP_KEM) *kem_stack = stack; in collect_kem() [all …]
|
H A D | crl2pkcs7.c | 22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 194 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument 219 sk_X509_push(stack, xi->x509); in add_certs_from_file()
|
/openssl/crypto/stack/ |
H A D | build.info | 2 SOURCE[../../libcrypto]=stack.c 3 SOURCE[../../providers/libfips.a]=stack.c
|
/openssl/Configurations/ |
H A D | INTERNALS.Configure | 22 condition stack that tell if a build.info should be processed or if it 23 should just be skipped over. The possible states of the stack top are 26 # The top item of this stack has the following values 34 stack top is > 0. Condition lines (IF, ELSIF, ELSE and ENDIF 36 stack states, so they are a little more intricate. 39 the skip stack should look like after each line is processed:
|
/openssl/ssl/ |
H A D | ssl_cert.c | 852 } else if (!sk_X509_NAME_push(stack, xn)) { in add_file_cert_subjects_to_stack() 897 num = sk_X509_NAME_num(stack); in SSL_add_file_cert_subjects_to_stack() 899 xn = sk_X509_NAME_value(stack, idx); in SSL_add_file_cert_subjects_to_stack() 935 num = sk_X509_NAME_num(stack); in SSL_add_dir_cert_subjects_to_stack() 937 xn = sk_X509_NAME_value(stack, idx); in SSL_add_dir_cert_subjects_to_stack() 989 static int add_uris_recursive(STACK_OF(X509_NAME) *stack, in add_uris_recursive() argument 1020 if (sk_X509_NAME_find(stack, xn) >= 0) { in add_uris_recursive() 1023 } else if (!sk_X509_NAME_push(stack, xn)) { in add_uris_recursive() 1047 = sk_X509_NAME_set_cmp_func(stack, xname_sk_cmp); in SSL_add_store_cert_subjects_to_stack() 1048 int ret = add_uris_recursive(stack, store, 1); in SSL_add_store_cert_subjects_to_stack() [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_rsa_get0_all_params.pod | 39 the I<primes> stack contains I<p>, I<q>, and then the rest of the primes 44 the I<exps> stack contains I<dP>, I<dQ>, and then the rest of the exponents 49 the I<coeffs> stack contains I<qInv>, and then the rest of the coefficients
|
/openssl/crypto/asn1/ |
H A D | tasn_prn.c | 290 STACK_OF(const_ASN1_VALUE) *stack; in asn1_template_print_ctx() 305 stack = (STACK_OF(const_ASN1_VALUE) *)*fld; in asn1_template_print_ctx() 306 for (i = 0; i < sk_const_ASN1_VALUE_num(stack); i++) { in asn1_template_print_ctx() 310 skitem = sk_const_ASN1_VALUE_value(stack, i); in asn1_template_print_ctx() 317 stack == NULL ? "ABSENT" : "EMPTY") <= 0) in asn1_template_print_ctx()
|