Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 145) sorted by relevance

123456

/openssl/apps/lib/
H A Dvms_term_sock.c131 status, in main() local
169 int status; in TerminalSocket() local
295 int status; in CreateSocketPair() local
331 if (status < 0) { in CreateSocketPair()
341 if (status < 0) { in CreateSocketPair()
360 if (! (status & 1)) { in CreateSocketPair()
371 if (! (status & 1)) { in CreateSocketPair()
392 if (! (status & 1)) { in CreateSocketPair()
444 if (status < 0) { in CreateSocketPair()
508 int status; in TerminalDeviceAst() local
[all …]
H A Dhttp_server.c83 int status; in spawn_loop() local
110 if ((fpid = waitpid(-1, &status, 0)) > 0) { in spawn_loop()
124 if (status != 0) { in spawn_loop()
125 if (WIFEXITED(status)) { in spawn_loop()
128 (long)fpid, WEXITSTATUS(status)); in spawn_loop()
129 } else if (WIFSIGNALED(status)) { in spawn_loop()
133 if (WCOREDUMP(status)) in spawn_loop()
138 (long)fpid, WTERMSIG(status), dumped); in spawn_loop()
531 int status, const char *reason) in http_server_send_status() argument
536 status, reason); in http_server_send_status()
/openssl/crypto/cmp/
H A Dcmp_status.c35 if (!ossl_assert(si != NULL && si->status != NULL)) in ossl_cmp_pkisi_get_status()
37 res = ossl_cmp_asn1_get_int(si->status); in ossl_cmp_pkisi_get_status()
41 const char *ossl_cmp_PKIStatus_to_string(int status) in ossl_cmp_PKIStatus_to_string() argument
43 switch (status) { in ossl_cmp_PKIStatus_to_string()
60 "PKIStatus: invalid=%d", status); in ossl_cmp_PKIStatus_to_string()
169 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument
183 || status < 0 in snprint_PKIStatusInfo_parts()
216 if (!failinfo_found && status != OSSL_CMP_PKISTATUS_accepted in snprint_PKIStatusInfo_parts()
217 && status != OSSL_CMP_PKISTATUS_grantedWithMods) { in snprint_PKIStatusInfo_parts()
278 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument
[all …]
H A Dcmp_client.c96 ctx->status = ossl_cmp_pkisi_get_status(si); in save_statusInfo()
97 if (ctx->status < OSSL_CMP_PKISTATUS_accepted) in save_statusInfo()
545 ctx->status); in get1_cert_status()
682 si = crep->status; in cert_response()
803 ctx->status = OSSL_CMP_PKISTATUS_request; in initial_certreq()
811 ctx->status = OSSL_CMP_PKISTATUS_trans; in initial_certreq()
906 ctx->status = OSSL_CMP_PKISTATUS_request; in OSSL_CMP_exec_RR_ses()
917 ctx->status = OSSL_CMP_PKISTATUS_trans; in OSSL_CMP_exec_RR_ses()
1033 ctx->status = OSSL_CMP_PKISTATUS_request; in STACK_OF()
1038 ctx->status = OSSL_CMP_PKISTATUS_trans; in STACK_OF()
[all …]
H A Dcmp_server.c174 int status = OSSL_CMP_PKISTATUS_waiting, in delayed_delivery() local
190 status = OSSL_CMP_PKISTATUS_rejection; in delayed_delivery()
198 si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt); in delayed_delivery()
395 OSSL_CMP_CERTSTATUS *status = NULL; in process_certConf() local
405 || ctx->status != OSSL_CMP_PKISTATUS_trans) { in process_certConf()
415 status = sk_OSSL_CMP_CERTSTATUS_value(ccc, 0); in process_certConf()
418 if (status != NULL) { in process_certConf()
419 int certReqId = ossl_cmp_asn1_get_int(status->certReqId); in process_certConf()
420 ASN1_OCTET_STRING *certHash = status->certHash; in process_certConf()
421 OSSL_CMP_PKISI *si = status->statusInfo; in process_certConf()
[all …]
/openssl/providers/implementations/rands/seeding/
H A Drand_vms.c389 uint32_t status; in data_collect_method() local
396 lib$signal(status); in data_collect_method()
401 lib$signal(status); in data_collect_method()
406 lib$signal(status); in data_collect_method()
411 lib$signal(status); in data_collect_method()
419 lib$signal(status); in data_collect_method()
424 lib$signal(status); in data_collect_method()
428 lib$signal(status); in data_collect_method()
437 lib$signal(status); in data_collect_method()
441 lib$signal(status); in data_collect_method()
[all …]
H A Drand_vxworks.c115 RANDOM_NUM_GEN_STATUS status = randStatus(); in ossl_pool_acquire_entropy() local
117 if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) in ossl_pool_acquire_entropy()
118 || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { in ossl_pool_acquire_entropy()
/openssl/test/helpers/
H A Dhandshake.c473 switch (status) { in decrypt_session_ticket_cb()
747 peer_status_t status; member
889 peer->status = PEER_RETRY; in do_reneg_setup_step()
1031 peer->status = PEER_ERROR; in do_reneg_setup_step()
1044 peer->status = PEER_SUCCESS; in do_reneg_setup_step()
1543 client.status = PEER_RETRY; in do_handshake_internal()
1544 server.status = PEER_WAITING; in do_handshake_internal()
1559 status = handshake_status(client.status, server.status, in do_handshake_internal()
1565 status = handshake_status(server.status, client.status, in do_handshake_internal()
1569 switch (status) { in do_handshake_internal()
[all …]
/openssl/crypto/
H A DLPdir_vms.c71 int status; in LP_find_file() local
150 status = lib$find_file(&(*ctx)->filespec_dsc, &(*ctx)->result_dsc, in LP_find_file()
153 if (status == RMS$_NMF) { in LP_find_file()
155 vaxc$errno = status; in LP_find_file()
159 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file()
161 vaxc$errno = status; in LP_find_file()
194 int status = lib$find_file_end(&(*ctx)->VMS_context); in LP_find_file_end() local
198 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file_end()
200 vaxc$errno = status; in LP_find_file_end()
/openssl/test/
H A Dbn_internal_test.c30 int status = 0; in test_is_prime_enhanced() local
38 &status)) in test_is_prime_enhanced()
39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced()
51 int status = 0; in test_is_composite_enhanced() local
58 &status)) in test_is_composite_enhanced()
59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
H A Dcmp_status_test.c43 int status; in execute_PKISI_test() local
52 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test()
53 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test()
54 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
H A Dprovider_status_test.c112 int status; in get_provider_params() local
125 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params()
136 || !TEST_true(status == 1)) in get_provider_params()
147 unsigned int status = 0; in test_provider_status() local
160 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status()
163 || !TEST_true(status == 1)) in test_provider_status()
192 || !TEST_uint_eq(status, 0)) in test_provider_status()
/openssl/crypto/dso/
H A Ddso_vms.c286 int status = 0; in vms_bind_sym() local
331 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym()
332 status = do_find_symbol(ptr, &symname_dsc, sym, 0); in vms_bind_sym()
334 if (!$VMS_STATUS_SUCCESS(status)) { in vms_bind_sym()
346 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_bind_sym()
348 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym()
378 int status; in vms_merger() local
432 status = sys$parse(&fab, 0, 0); in vms_merger()
434 if (!$VMS_STATUS_SUCCESS(status)) { in vms_merger()
444 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_merger()
[all …]
/openssl/crypto/ui/
H A Dui_openssl.c167 static long status; variable
466 status = sys$assign(&terminal, &channel, 0, 0); in open_console()
469 if (status != SS$_NORMAL) { in open_console()
471 "status=%%X%08X", status); in open_console()
479 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) in open_console()
503 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) { in noecho_console()
506 status, iosb.iosb$w_value); in noecho_console()
538 status, iosb.iosb$w_value); in echo_console()
561 status = sys$dassgn(channel); in close_console()
562 if (status != SS$_NORMAL) { in close_console()
[all …]
/openssl/crypto/ts/
H A Dts_rsp_print.c72 long status; in TS_STATUS_INFO_print_bio() local
76 status = ASN1_INTEGER_get(a->status); in TS_STATUS_INFO_print_bio()
77 if (0 <= status && status < (long)OSSL_NELEM(status_map)) in TS_STATUS_INFO_print_bio()
78 BIO_printf(bio, "%s\n", status_map[status]); in TS_STATUS_INFO_print_bio()
H A Dts_asn1.c125 ASN1_SIMPLE(TS_STATUS_INFO, status, ASN1_INTEGER),
135 long status; variable
137 status = ASN1_INTEGER_get(a->status_info->status);
140 if (status != 0 && status != 1) {
150 } else if (status == 0 || status == 1) {
/openssl/doc/designs/ddd/
H A Dddd-06-mem-uv.c13 typedef void (app_connect_cb)(APP_CONN *conn, int status, void *arg);
14 typedef void (app_write_cb)(APP_CONN *conn, int status, void *arg);
404 static void net_write_done(uv_udp_send_t *req, int status) in net_write_done() argument
406 static void net_write_done(uv_write_t *req, int status) in net_write_done()
412 if (status < 0) { in net_write_done()
413 fprintf(stderr, "UV write failed %d\n", status); in net_write_done()
553 if (status < 0) { in tcp_connect_done()
690 if (status < 0) { in post_write_get()
691 fprintf(stderr, "write failed: %d\n", status); in post_write_get()
705 if (status < 0) { in post_connect()
[all …]
/openssl/doc/man3/
H A DSCT_validate.pod40 Failure to provide the certificate will result in the validation status being
48 (see RFC 6962). If it is required but not provided, the validation status will
56 status will be SCT_VALIDATION_STATUS_UNKNOWN_LOG.
61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION.
65 status will be SCT_VALIDATION_STATUS_INVALID.
67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID.
83 SCT_get_validation_status() returns the validation status of the SCT.
H A DSSL_CTX_set_session_ticket_cb.pod45 used to decrypt the session ticket. The B<status> argument is the result of the
69 assigned to the SSL B<s>. The B<status> indicates the result of the ticket
70 decryption. The callback must check the B<status> value before performing any
76 The B<status> argument can be any of these values:
123 should return this value if B<status> is B<SSL_TICKET_EMPTY> or
129 the callback to return this value if B<status> has a value other than
133 should return this value if B<status> is B<SSL_TICKET_SUCCESS>.
138 callback to return this value if B<status> has a value other than
142 should return this value if B<status> is B<SSL_TICKET_SUCCESS_RENEW>.
146 If B<status> has the value B<SSL_TICKET_EMPTY> or B<SSL_TICKET_NO_DECRYPT> then
[all …]
/openssl/apps/
H A DCA.pl.in117 my $status = system($cmd);
118 print "==> $status\n====\n" if $verbose;
119 return $status >> 8;
216 my $status = run("$VERIFY \"-CAfile\" ${CATOP}/$CACERT $file $EXTRA{verify}");
217 $RET = $status if $status != 0;
/openssl/crypto/ec/
H A Dec_backend.c115 int status = 0; in ec_set_check_group_type_from_param() local
120 status = (name != NULL); in ec_set_check_group_type_from_param()
123 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ec_set_check_group_type_from_param()
126 if (status) in ec_set_check_group_type_from_param()
687 int status = 0; in ossl_ec_encoding_param2id() local
693 status = (name != NULL); in ossl_ec_encoding_param2id()
696 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ossl_ec_encoding_param2id()
699 if (status) { in ossl_ec_encoding_param2id()
713 int status = 0; in ossl_ec_pt_format_param2id() local
719 status = (name != NULL); in ossl_ec_pt_format_param2id()
[all …]
/openssl/crypto/async/
H A Dasync.c86 job->status = ASYNC_JOB_RUNNING; in async_job_new()
161 job->status = ASYNC_JOB_STOPPING; in async_start_func()
193 if (ctx->currjob->status == ASYNC_JOB_STOPPING) { in ASYNC_start_job()
202 if (ctx->currjob->status == ASYNC_JOB_PAUSING) { in ASYNC_start_job()
204 ctx->currjob->status = ASYNC_JOB_PAUSED; in ASYNC_start_job()
209 if (ctx->currjob->status == ASYNC_JOB_PAUSED) { in ASYNC_start_job()
302 job->status = ASYNC_JOB_PAUSING; in ASYNC_pause_job()
/openssl/crypto/conf/
H A Dconf_lib.c127 int status; in CONF_get_number() local
132 status = NCONF_get_number_e(NULL, group, name, &result); in CONF_get_number()
137 status = NCONF_get_number_e(&ctmp, group, name, &result); in CONF_get_number()
140 return status == 0 ? 0L : result; in CONF_get_number()
371 int status; in _CONF_get_number() local
375 status = NCONF_get_number_e(conf, section, name, &result); in _CONF_get_number()
377 return status == 0 ? 0L : result; in _CONF_get_number()
/openssl/crypto/bn/
H A Dbn_prime.c278 int i, status, ret = -1; in bn_is_prime_int() local
320 if (!ossl_bn_miller_rabin_is_prime(w, checks, ctx, cb, 0, &status)) { in bn_is_prime_int()
324 ret = (status == BN_PRIMETEST_PROBABLY_PRIME); in bn_is_prime_int()
348 BN_GENCB *cb, int enhanced, int *status) in ossl_bn_miller_rabin_is_prime() argument
409 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime()
449 *status = BN_PRIMETEST_COMPOSITE_NOT_POWER_OF_PRIME; in ossl_bn_miller_rabin_is_prime()
451 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime()
453 *status = BN_PRIMETEST_COMPOSITE; in ossl_bn_miller_rabin_is_prime()
463 *status = BN_PRIMETEST_PROBABLY_PRIME; in ossl_bn_miller_rabin_is_prime()
/openssl/engines/
H A De_devcrypto.c72 } status; member
471 cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_cipher_methods()
500 cipher_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_cipher_methods()
504 cipher_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_cipher_methods()
649 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE) in dump_cipher_info()
917 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_digest_methods()
940 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods()
946 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCCPHASH; in prepare_digest_methods()
962 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods()
967 digest_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_digest_methods()
[all …]

Completed in 88 milliseconds

123456