Home
last modified time | relevance | path

Searched refs:fatal (Results 1 – 25 of 53) sorted by relevance

123

/openssl/doc/man3/
H A DSSL_alert_type_string.pod58 =item "F"/"fatal"
85 MAC. This message is always fatal.
91 fatal.
129 other fields. This is always fatal.
148 message is always fatal.
154 This message is always fatal.
160 message is always fatal.
173 message is always fatal.
180 always fatal.
187 fatal.
[all …]
H A DDTLSv1_listen.pod120 A return value of 0 indicates a non-fatal error. This could (for
124 call to DTLSv1_listen() in the event of a non-fatal error.
126 A return value of <0 indicates a fatal error. This could (for example) be
129 For DTLSv1_listen(), prior to OpenSSL 1.1.0, fatal and non-fatal errors both
131 errors as non-fatal), whilst return codes >0 indicate success.
H A DERR_GET_LIB.pod24 ERR_FATAL_ERROR() indicates whether a given error code is a fatal error.
42 is fatal, respectively.
H A DCONF_modules_load_file.pod51 considered fatal and no further modules are loaded.
82 consider a configuration file error as fatal and exit immediately.
97 considered fatal):
H A DSSL_extension_supported.pod119 If B<add_cb> returns -1 a fatal handshake error occurs using the TLS
164 1. If it returns 0 or a negative value a fatal handshake error occurs
259 If the same custom extension type is received multiple times a fatal
262 the ClientHello a fatal B<unsupported_extension> alert is sent and the
H A DPKCS12_create.pod87 a fatal error is returned.
100 If I<cb> is specified, then it should return 1 for success and -1 for a fatal error.
H A DSSL_set_shutdown.pod39 or a fatal error.
H A DSSL_do_handshake.pod58 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_accept.pod57 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DASN1_EXTERN_FUNCS.pod128 The return value should be negative if a fatal error occurred, or 0 if a
129 non-fatal error occurred. Otherwise it should return the length of the encoded
H A DX509V3_get_d2i.pod219 and 0 if it fails due to a non-fatal error (extension not found, already exists,
220 cannot be encoded) or -1 due to a fatal error such as a memory allocation
H A DSSL_CTX_set_session_id_context.pod51 will not be reused but a fatal error will be flagged and the handshake
H A DSSL_CTX_set_cert_cb.pod27 fatal internal error alert. A negative return value will suspend the handshake
H A DSSL_CTX_set_alpn_select_cb.pod97 fatal to the connection if this callback returns a value other than
192 B<SSL_TLSEXT_ERR_OK> if successful. Any other value is fatal to the connection.
H A DSSL_connect.pod72 The TLS/SSL handshake was not successful, because a fatal error occurred either
H A DSSL_get_error.pod167 Some non-recoverable, fatal I/O error occurred. The OpenSSL error queue may
177 A non-recoverable, fatal error in the SSL library occurred, usually a protocol
H A Dd2i_RSAPrivateKey.pod234 /* fatal error handling */
238 /* non-fatal error handling */
/openssl/doc/man7/
H A Dossl-guide-tls-client-non-block.pod38 currently unable to read or write will return immediately with a non-fatal
137 L<SSL_write_ex(3)>. Errors may be fatal (for example because the underlying
138 connection has failed), or non-fatal (for example because we are trying to read
146 out what type of error has occurred. If the error is non-fatal and can be
209 the event of a non-fatal failure, it waits until a retry of the I/O operation
211 in the previous section). It returns 1 in the event of a non-fatal error
212 (except EOF), 0 in the event of EOF, or -1 if a fatal error occurred.
225 socket it is very likely that calls to this function will fail with a non-fatal
241 this stage, so such a response is treated in the same way as a fatal error.
280 same way as a fatal error.
[all …]
H A Dossl-guide-quic-client-non-block.pod42 L<SSL_read_ex(3)> or L<SSL_write_ex(3)> will return immediately with a non-fatal
171 has failed), or non-fatal (for example because we are trying to read from the
179 out what type of error has occurred. If the error is non-fatal and can be
225 * Some stream fatal error occurred. This could be because of a
263 the event of a non-fatal failure, it waits until a retry of the I/O operation
265 in the previous section). It returns 1 in the event of a non-fatal error
266 (except EOF), 0 in the event of EOF, or -1 if a fatal error occurred.
329 this stage, so such a response is treated in the same way as a fatal error.
335 a nonblocking B<SSL> object, this call could fail with a non-fatal error. In
368 same way as a fatal error.
[all …]
H A Dossl-guide-quic-client-block.pod250 fatal for that stream), but the underlying connection itself may still be
285 * Some stream fatal error occurred. This could be because of a stream
312 fatal error. We can use L<SSL_get_stream_read_state(3)> to determine whether the
313 stream has been reset, or if some other fatal error has occurred.
/openssl/apps/lib/
H A Dhttp_server.c286 goto fatal; in http_server_get_asn1_req()
394 goto fatal; in http_server_get_asn1_req()
477 goto fatal; in http_server_get_asn1_req()
491 fatal: in http_server_get_asn1_req()
/openssl/ssl/
H A Dt1_enc.c32 unsigned char *out, size_t olen, int fatal) in tls1_PRF() argument
42 if (fatal) in tls1_PRF()
80 if (fatal) in tls1_PRF()
H A Dssl_sess.c589 int fatal = 0; in ssl_get_prev_session() local
613 fatal = 1; in ssl_get_prev_session()
662 fatal = 1; in ssl_get_prev_session()
680 fatal = 1; in ssl_get_prev_session()
713 if (fatal) in ssl_get_prev_session()
H A Dtls13_enc.c103 unsigned char *out, size_t outlen, int fatal) in tls13_hkdf_expand() argument
110 out, outlen, !fatal); in tls13_hkdf_expand()
111 if (ret == 0 && fatal) in tls13_hkdf_expand()
/openssl/include/openssl/
H A Dssl.h.in1156 /* fatal */
1158 /* fatal */
1162 /* fatal */
1164 /* fatal */
1173 /* fatal */
1175 /* fatal */
1177 /* fatal */
1179 /* fatal */
1182 /* fatal */
1184 /* fatal */
[all …]

Completed in 54 milliseconds

123