/openssl/apps/lib/ |
H A D | vms_term_sock.c | 131 status, in main() local 169 int status; in TerminalSocket() local 295 int status; in CreateSocketPair() local 331 if (status < 0) { in CreateSocketPair() 341 if (status < 0) { in CreateSocketPair() 360 if (! (status & 1)) { in CreateSocketPair() 371 if (! (status & 1)) { in CreateSocketPair() 392 if (! (status & 1)) { in CreateSocketPair() 444 if (status < 0) { in CreateSocketPair() 508 int status; in TerminalDeviceAst() local [all …]
|
H A D | http_server.c | 83 int status; in spawn_loop() local 110 if ((fpid = waitpid(-1, &status, 0)) > 0) { in spawn_loop() 124 if (status != 0) { in spawn_loop() 125 if (WIFEXITED(status)) { in spawn_loop() 128 (long)fpid, WEXITSTATUS(status)); in spawn_loop() 129 } else if (WIFSIGNALED(status)) { in spawn_loop() 133 if (WCOREDUMP(status)) in spawn_loop() 138 (long)fpid, WTERMSIG(status), dumped); in spawn_loop() 532 int status, const char *reason) in http_server_send_status() argument 537 status, reason); in http_server_send_status()
|
/openssl/crypto/cmp/ |
H A D | cmp_status.c | 35 if (!ossl_assert(si != NULL && si->status != NULL)) in ossl_cmp_pkisi_get_status() 37 res = ossl_cmp_asn1_get_int(si->status); in ossl_cmp_pkisi_get_status() 41 const char *ossl_cmp_PKIStatus_to_string(int status) in ossl_cmp_PKIStatus_to_string() argument 43 switch (status) { in ossl_cmp_PKIStatus_to_string() 60 "PKIStatus: invalid=%d", status); in ossl_cmp_PKIStatus_to_string() 169 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 183 || status < 0 in snprint_PKIStatusInfo_parts() 216 if (!failinfo_found && status != OSSL_CMP_PKISTATUS_accepted in snprint_PKIStatusInfo_parts() 217 && status != OSSL_CMP_PKISTATUS_grantedWithMods) { in snprint_PKIStatusInfo_parts() 278 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument [all …]
|
H A D | cmp_client.c | 96 ctx->status = ossl_cmp_pkisi_get_status(si); in save_statusInfo() 97 if (ctx->status < OSSL_CMP_PKISTATUS_accepted) in save_statusInfo() 548 ctx->status); in get1_cert_status() 685 si = crep->status; in cert_response() 806 ctx->status = OSSL_CMP_PKISTATUS_request; in initial_certreq() 814 ctx->status = OSSL_CMP_PKISTATUS_trans; in initial_certreq() 909 ctx->status = OSSL_CMP_PKISTATUS_request; in OSSL_CMP_exec_RR_ses() 920 ctx->status = OSSL_CMP_PKISTATUS_trans; in OSSL_CMP_exec_RR_ses() 1036 ctx->status = OSSL_CMP_PKISTATUS_request; in STACK_OF() 1041 ctx->status = OSSL_CMP_PKISTATUS_trans; in STACK_OF() [all …]
|
H A D | cmp_server.c | 174 int status = OSSL_CMP_PKISTATUS_waiting, in delayed_delivery() local 190 status = OSSL_CMP_PKISTATUS_rejection; in delayed_delivery() 198 si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt); in delayed_delivery() 395 OSSL_CMP_CERTSTATUS *status = NULL; in process_certConf() local 405 || ctx->status != OSSL_CMP_PKISTATUS_trans) { in process_certConf() 415 status = sk_OSSL_CMP_CERTSTATUS_value(ccc, 0); in process_certConf() 418 if (status != NULL) { in process_certConf() 419 int certReqId = ossl_cmp_asn1_get_int(status->certReqId); in process_certConf() 420 ASN1_OCTET_STRING *certHash = status->certHash; in process_certConf() 421 OSSL_CMP_PKISI *si = status->statusInfo; in process_certConf() [all …]
|
/openssl/providers/implementations/rands/seeding/ |
H A D | rand_vms.c | 389 uint32_t status; in data_collect_method() local 396 lib$signal(status); in data_collect_method() 401 lib$signal(status); in data_collect_method() 406 lib$signal(status); in data_collect_method() 411 lib$signal(status); in data_collect_method() 419 lib$signal(status); in data_collect_method() 424 lib$signal(status); in data_collect_method() 428 lib$signal(status); in data_collect_method() 437 lib$signal(status); in data_collect_method() 441 lib$signal(status); in data_collect_method() [all …]
|
H A D | rand_vxworks.c | 115 RANDOM_NUM_GEN_STATUS status = randStatus(); in ossl_pool_acquire_entropy() local 117 if ((status == RANDOM_NUM_GEN_ENOUGH_ENTROPY) in ossl_pool_acquire_entropy() 118 || (status == RANDOM_NUM_GEN_MAX_ENTROPY)) { in ossl_pool_acquire_entropy()
|
/openssl/test/helpers/ |
H A D | handshake.c | 473 switch (status) { in decrypt_session_ticket_cb() 747 peer_status_t status; member 889 peer->status = PEER_RETRY; in do_reneg_setup_step() 1031 peer->status = PEER_ERROR; in do_reneg_setup_step() 1044 peer->status = PEER_SUCCESS; in do_reneg_setup_step() 1543 client.status = PEER_RETRY; in do_handshake_internal() 1544 server.status = PEER_WAITING; in do_handshake_internal() 1559 status = handshake_status(client.status, server.status, in do_handshake_internal() 1565 status = handshake_status(server.status, client.status, in do_handshake_internal() 1569 switch (status) { in do_handshake_internal() [all …]
|
/openssl/crypto/ |
H A D | LPdir_vms.c | 71 int status; in LP_find_file() local 150 status = lib$find_file(&(*ctx)->filespec_dsc, &(*ctx)->result_dsc, in LP_find_file() 153 if (status == RMS$_NMF) { in LP_find_file() 155 vaxc$errno = status; in LP_find_file() 159 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file() 161 vaxc$errno = status; in LP_find_file() 194 int status = lib$find_file_end(&(*ctx)->VMS_context); in LP_find_file_end() local 198 if (!$VMS_STATUS_SUCCESS(status)) { in LP_find_file_end() 200 vaxc$errno = status; in LP_find_file_end()
|
/openssl/test/ |
H A D | bn_internal_test.c | 30 int status = 0; in test_is_prime_enhanced() local 38 &status)) in test_is_prime_enhanced() 39 && TEST_int_eq(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_prime_enhanced() 51 int status = 0; in test_is_composite_enhanced() local 58 &status)) in test_is_composite_enhanced() 59 && TEST_int_ne(status, BN_PRIMETEST_PROBABLY_PRIME); in test_is_composite_enhanced()
|
H A D | cmp_status_test.c | 43 int status; in execute_PKISI_test() local 52 status = ossl_cmp_pkisi_get_status(si); in execute_PKISI_test() 53 if (!TEST_int_eq(fixture->pkistatus, status) in execute_PKISI_test() 54 || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) in execute_PKISI_test()
|
H A D | provider_status_test.c | 112 int status; in get_provider_params() local 125 params[2] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_STATUS, &status); in get_provider_params() 136 || !TEST_true(status == 1)) in get_provider_params() 147 unsigned int status = 0; in test_provider_status() local 160 params[0] = OSSL_PARAM_construct_uint(OSSL_PROV_PARAM_STATUS, &status); in test_provider_status() 163 || !TEST_true(status == 1)) in test_provider_status() 192 || !TEST_uint_eq(status, 0)) in test_provider_status()
|
/openssl/crypto/dso/ |
H A D | dso_vms.c | 286 int status = 0; in vms_bind_sym() local 331 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym() 332 status = do_find_symbol(ptr, &symname_dsc, sym, 0); in vms_bind_sym() 334 if (!$VMS_STATUS_SUCCESS(status)) { in vms_bind_sym() 346 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_bind_sym() 348 if (!$VMS_STATUS_SUCCESS(status)) in vms_bind_sym() 378 int status; in vms_merger() local 432 status = sys$parse(&fab, 0, 0); in vms_merger() 434 if (!$VMS_STATUS_SUCCESS(status)) { in vms_merger() 444 status = sys$getmsg(status, &length, &errstring_dsc, 1, 0); in vms_merger() [all …]
|
/openssl/crypto/ui/ |
H A D | ui_openssl.c | 167 static long status; variable 466 status = sys$assign(&terminal, &channel, 0, 0); in open_console() 469 if (status != SS$_NORMAL) { in open_console() 471 "status=%%X%08X", status); in open_console() 479 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) in open_console() 503 if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL)) { in noecho_console() 506 status, iosb.iosb$w_value); in noecho_console() 538 status, iosb.iosb$w_value); in echo_console() 561 status = sys$dassgn(channel); in close_console() 562 if (status != SS$_NORMAL) { in close_console() [all …]
|
/openssl/crypto/ts/ |
H A D | ts_rsp_print.c | 72 long status; in TS_STATUS_INFO_print_bio() local 76 status = ASN1_INTEGER_get(a->status); in TS_STATUS_INFO_print_bio() 77 if (0 <= status && status < (long)OSSL_NELEM(status_map)) in TS_STATUS_INFO_print_bio() 78 BIO_printf(bio, "%s\n", status_map[status]); in TS_STATUS_INFO_print_bio()
|
H A D | ts_asn1.c | 125 ASN1_SIMPLE(TS_STATUS_INFO, status, ASN1_INTEGER), 135 long status; variable 137 status = ASN1_INTEGER_get(a->status_info->status); 140 if (status != 0 && status != 1) { 150 } else if (status == 0 || status == 1) {
|
/openssl/doc/designs/ddd/ |
H A D | ddd-06-mem-uv.c | 13 typedef void (app_connect_cb)(APP_CONN *conn, int status, void *arg); 14 typedef void (app_write_cb)(APP_CONN *conn, int status, void *arg); 404 static void net_write_done(uv_udp_send_t *req, int status) in net_write_done() argument 406 static void net_write_done(uv_write_t *req, int status) in net_write_done() 412 if (status < 0) { in net_write_done() 413 fprintf(stderr, "UV write failed %d\n", status); in net_write_done() 553 if (status < 0) { in tcp_connect_done() 690 if (status < 0) { in post_write_get() 691 fprintf(stderr, "write failed: %d\n", status); in post_write_get() 705 if (status < 0) { in post_connect() [all …]
|
/openssl/doc/man3/ |
H A D | SCT_validate.pod | 40 Failure to provide the certificate will result in the validation status being 48 (see RFC 6962). If it is required but not provided, the validation status will 56 status will be SCT_VALIDATION_STATUS_UNKNOWN_LOG. 61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION. 65 status will be SCT_VALIDATION_STATUS_INVALID. 67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID. 83 SCT_get_validation_status() returns the validation status of the SCT.
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 45 used to decrypt the session ticket. The B<status> argument is the result of the 69 assigned to the SSL B<s>. The B<status> indicates the result of the ticket 70 decryption. The callback must check the B<status> value before performing any 76 The B<status> argument can be any of these values: 123 should return this value if B<status> is B<SSL_TICKET_EMPTY> or 129 the callback to return this value if B<status> has a value other than 133 should return this value if B<status> is B<SSL_TICKET_SUCCESS>. 138 callback to return this value if B<status> has a value other than 142 should return this value if B<status> is B<SSL_TICKET_SUCCESS_RENEW>. 146 If B<status> has the value B<SSL_TICKET_EMPTY> or B<SSL_TICKET_NO_DECRYPT> then [all …]
|
/openssl/apps/ |
H A D | CA.pl.in | 117 my $status = system($cmd); 118 print "==> $status\n====\n" if $verbose; 119 return $status >> 8; 216 my $status = run("$VERIFY \"-CAfile\" ${CATOP}/$CACERT $file $EXTRA{verify}"); 217 $RET = $status if $status != 0;
|
/openssl/crypto/ec/ |
H A D | ec_backend.c | 115 int status = 0; in ec_set_check_group_type_from_param() local 120 status = (name != NULL); in ec_set_check_group_type_from_param() 123 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ec_set_check_group_type_from_param() 126 if (status) in ec_set_check_group_type_from_param() 681 int status = 0; in ossl_ec_encoding_param2id() local 687 status = (name != NULL); in ossl_ec_encoding_param2id() 690 status = OSSL_PARAM_get_utf8_ptr(p, &name); in ossl_ec_encoding_param2id() 693 if (status) { in ossl_ec_encoding_param2id() 707 int status = 0; in ossl_ec_pt_format_param2id() local 713 status = (name != NULL); in ossl_ec_pt_format_param2id() [all …]
|
/openssl/crypto/async/ |
H A D | async.c | 86 job->status = ASYNC_JOB_RUNNING; in async_job_new() 161 job->status = ASYNC_JOB_STOPPING; in async_start_func() 193 if (ctx->currjob->status == ASYNC_JOB_STOPPING) { in ASYNC_start_job() 202 if (ctx->currjob->status == ASYNC_JOB_PAUSING) { in ASYNC_start_job() 204 ctx->currjob->status = ASYNC_JOB_PAUSED; in ASYNC_start_job() 209 if (ctx->currjob->status == ASYNC_JOB_PAUSED) { in ASYNC_start_job() 302 job->status = ASYNC_JOB_PAUSING; in ASYNC_pause_job()
|
/openssl/crypto/conf/ |
H A D | conf_lib.c | 127 int status; in CONF_get_number() local 132 status = NCONF_get_number_e(NULL, group, name, &result); in CONF_get_number() 137 status = NCONF_get_number_e(&ctmp, group, name, &result); in CONF_get_number() 140 return status == 0 ? 0L : result; in CONF_get_number() 371 int status; in _CONF_get_number() local 375 status = NCONF_get_number_e(conf, section, name, &result); in _CONF_get_number() 377 return status == 0 ? 0L : result; in _CONF_get_number()
|
/openssl/crypto/bn/ |
H A D | bn_prime.c | 278 int i, status, ret = -1; in bn_is_prime_int() local 320 if (!ossl_bn_miller_rabin_is_prime(w, checks, ctx, cb, 0, &status)) { in bn_is_prime_int() 324 ret = (status == BN_PRIMETEST_PROBABLY_PRIME); in bn_is_prime_int() 348 BN_GENCB *cb, int enhanced, int *status) in ossl_bn_miller_rabin_is_prime() argument 409 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime() 449 *status = BN_PRIMETEST_COMPOSITE_NOT_POWER_OF_PRIME; in ossl_bn_miller_rabin_is_prime() 451 *status = BN_PRIMETEST_COMPOSITE_WITH_FACTOR; in ossl_bn_miller_rabin_is_prime() 453 *status = BN_PRIMETEST_COMPOSITE; in ossl_bn_miller_rabin_is_prime() 463 *status = BN_PRIMETEST_PROBABLY_PRIME; in ossl_bn_miller_rabin_is_prime()
|
/openssl/engines/ |
H A D | e_devcrypto.c | 72 } status; member 471 cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_cipher_methods() 500 cipher_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_cipher_methods() 504 cipher_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_cipher_methods() 649 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE) in dump_cipher_info() 917 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; in prepare_digest_methods() 940 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods() 946 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCCPHASH; in prepare_digest_methods() 962 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; in prepare_digest_methods() 967 digest_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; in prepare_digest_methods() [all …]
|