/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/cmp/ |
H A D | cmp_client.c | 361 int ossl_cmp_exchange_certConf(OSSL_CMP_CTX *ctx, int fail_info, in ossl_cmp_exchange_certConf() argument 389 if ((si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt)) == NULL) in ossl_cmp_exchange_error() 486 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 494 return fail_info; in OSSL_CMP_certConf_cb() 504 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in OSSL_CMP_certConf_cb() 519 return fail_info; in OSSL_CMP_certConf_cb() 534 int fail_info = 0; /* no failure */ in cert_response() local 599 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in cert_response() 616 if ((fail_info = cb(ctx, ctx->newCert, fail_info, &txt)) != 0 in cert_response() 624 if (!ossl_cmp_exchange_certConf(ctx, fail_info, txt)) in cert_response() [all …]
|
H A D | cmp_status.c | 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 193 if (fail_info != 0) { in snprint_PKIStatusInfo_parts() 197 if ((fail_info & (1 << failure)) != 0) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument 296 if ((fail_info & (1 << failure)) != 0) { in OSSL_CMP_STATUSINFO_new()
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/cmp/ |
H A D | cmp_client.c | 361 int ossl_cmp_exchange_certConf(OSSL_CMP_CTX *ctx, int fail_info, in ossl_cmp_exchange_certConf() argument 389 if ((si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt)) == NULL) in ossl_cmp_exchange_error() 486 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 494 return fail_info; in OSSL_CMP_certConf_cb() 504 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in OSSL_CMP_certConf_cb() 519 return fail_info; in OSSL_CMP_certConf_cb() 534 int fail_info = 0; /* no failure */ in cert_response() local 599 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in cert_response() 616 if ((fail_info = cb(ctx, ctx->newCert, fail_info, &txt)) != 0 in cert_response() 624 if (!ossl_cmp_exchange_certConf(ctx, fail_info, txt)) in cert_response() [all …]
|
H A D | cmp_status.c | 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 193 if (fail_info != 0) { in snprint_PKIStatusInfo_parts() 197 if ((fail_info & (1 << failure)) != 0) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument 296 if ((fail_info & (1 << failure)) != 0) { in OSSL_CMP_STATUSINFO_new()
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/cmp/ |
H A D | cmp_client.c | 361 int ossl_cmp_exchange_certConf(OSSL_CMP_CTX *ctx, int fail_info, in ossl_cmp_exchange_certConf() argument 389 if ((si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt)) == NULL) in ossl_cmp_exchange_error() 486 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 494 return fail_info; in OSSL_CMP_certConf_cb() 504 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in OSSL_CMP_certConf_cb() 519 return fail_info; in OSSL_CMP_certConf_cb() 534 int fail_info = 0; /* no failure */ in cert_response() local 599 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in cert_response() 616 if ((fail_info = cb(ctx, ctx->newCert, fail_info, &txt)) != 0 in cert_response() 624 if (!ossl_cmp_exchange_certConf(ctx, fail_info, txt)) in cert_response() [all …]
|
H A D | cmp_status.c | 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 193 if (fail_info != 0) { in snprint_PKIStatusInfo_parts() 197 if ((fail_info & (1 << failure)) != 0) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument 296 if ((fail_info & (1 << failure)) != 0) { in OSSL_CMP_STATUSINFO_new()
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/cmp/ |
H A D | cmp_client.c | 361 int ossl_cmp_exchange_certConf(OSSL_CMP_CTX *ctx, int fail_info, in ossl_cmp_exchange_certConf() argument 389 if ((si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt)) == NULL) in ossl_cmp_exchange_error() 486 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 494 return fail_info; in OSSL_CMP_certConf_cb() 504 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in OSSL_CMP_certConf_cb() 519 return fail_info; in OSSL_CMP_certConf_cb() 534 int fail_info = 0; /* no failure */ in cert_response() local 599 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in cert_response() 616 if ((fail_info = cb(ctx, ctx->newCert, fail_info, &txt)) != 0 in cert_response() 624 if (!ossl_cmp_exchange_certConf(ctx, fail_info, txt)) in cert_response() [all …]
|
H A D | cmp_status.c | 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 193 if (fail_info != 0) { in snprint_PKIStatusInfo_parts() 197 if ((fail_info & (1 << failure)) != 0) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument 296 if ((fail_info & (1 << failure)) != 0) { in OSSL_CMP_STATUSINFO_new()
|
/dports/security/openssl-devel/openssl-3.0.2/crypto/cmp/ |
H A D | cmp_client.c | 361 int ossl_cmp_exchange_certConf(OSSL_CMP_CTX *ctx, int fail_info, in ossl_cmp_exchange_certConf() argument 389 if ((si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt)) == NULL) in ossl_cmp_exchange_error() 486 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 494 return fail_info; in OSSL_CMP_certConf_cb() 504 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in OSSL_CMP_certConf_cb() 519 return fail_info; in OSSL_CMP_certConf_cb() 534 int fail_info = 0; /* no failure */ in cert_response() local 599 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in cert_response() 616 if ((fail_info = cb(ctx, ctx->newCert, fail_info, &txt)) != 0 in cert_response() 624 if (!ossl_cmp_exchange_certConf(ctx, fail_info, txt)) in cert_response() [all …]
|
H A D | cmp_status.c | 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 193 if (fail_info != 0) { in snprint_PKIStatusInfo_parts() 197 if ((fail_info & (1 << failure)) != 0) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument 296 if ((fail_info & (1 << failure)) != 0) { in OSSL_CMP_STATUSINFO_new()
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/crypto/cmp/ |
H A D | cmp_client.c | 361 int ossl_cmp_exchange_certConf(OSSL_CMP_CTX *ctx, int fail_info, in ossl_cmp_exchange_certConf() argument 389 if ((si = OSSL_CMP_STATUSINFO_new(status, fail_info, txt)) == NULL) in ossl_cmp_exchange_error() 486 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 494 return fail_info; in OSSL_CMP_certConf_cb() 504 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in OSSL_CMP_certConf_cb() 519 return fail_info; in OSSL_CMP_certConf_cb() 534 int fail_info = 0; /* no failure */ in cert_response() local 599 fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_incorrectData; in cert_response() 616 if ((fail_info = cb(ctx, ctx->newCert, fail_info, &txt)) != 0 in cert_response() 624 if (!ossl_cmp_exchange_certConf(ctx, fail_info, txt)) in cert_response() [all …]
|
H A D | cmp_status.c | 165 char *snprint_PKIStatusInfo_parts(int status, int fail_info, in snprint_PKIStatusInfo_parts() argument 193 if (fail_info != 0) { in snprint_PKIStatusInfo_parts() 197 if ((fail_info & (1 << failure)) != 0) { in snprint_PKIStatusInfo_parts() 271 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, in OSSL_CMP_STATUSINFO_new() argument 296 if ((fail_info & (1 << failure)) != 0) { in OSSL_CMP_STATUSINFO_new()
|
/dports/net-mgmt/net-snmp/net-snmp-5.9/testing/rfc1213/ |
H A D | test_fun | 20 fail_info() 56 fail_info "FAIL\n"
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | cmp_msg_test.c | 25 int fail_info; member 110 (fixture->cmp_ctx, fixture->fail_info, NULL)); in execute_certconf_create_test() 286 fixture->fail_info = 0; in test_cmp_create_certconf() 300 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; in test_cmp_create_certconf_badAlg() 314 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; in test_cmp_create_certconf_fail_info_max()
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | cmp_msg_test.c | 25 int fail_info; member 110 (fixture->cmp_ctx, fixture->fail_info, NULL)); in execute_certconf_create_test() 286 fixture->fail_info = 0; in test_cmp_create_certconf() 300 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; in test_cmp_create_certconf_badAlg() 314 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; in test_cmp_create_certconf_fail_info_max()
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | cmp_msg_test.c | 25 int fail_info; member 110 (fixture->cmp_ctx, fixture->fail_info, NULL)); in execute_certconf_create_test() 286 fixture->fail_info = 0; in test_cmp_create_certconf() 300 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; in test_cmp_create_certconf_badAlg() 314 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; in test_cmp_create_certconf_fail_info_max()
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | cmp_msg_test.c | 25 int fail_info; member 110 (fixture->cmp_ctx, fixture->fail_info, NULL)); in execute_certconf_create_test() 286 fixture->fail_info = 0; in test_cmp_create_certconf() 300 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; in test_cmp_create_certconf_badAlg() 314 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; in test_cmp_create_certconf_fail_info_max()
|
/dports/security/openssl-devel/openssl-3.0.2/test/ |
H A D | cmp_msg_test.c | 25 int fail_info; member 110 (fixture->cmp_ctx, fixture->fail_info, NULL)); in execute_certconf_create_test() 286 fixture->fail_info = 0; in test_cmp_create_certconf() 300 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; in test_cmp_create_certconf_badAlg() 314 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; in test_cmp_create_certconf_fail_info_max()
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/test/ |
H A D | cmp_msg_test.c | 25 int fail_info; member 110 (fixture->cmp_ctx, fixture->fail_info, NULL)); in execute_certconf_create_test() 286 fixture->fail_info = 0; in test_cmp_create_certconf() 300 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; in test_cmp_create_certconf_badAlg() 314 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; in test_cmp_create_certconf_fail_info_max()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | OSSL_CMP_STATUSINFO_new.pod | 14 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, 30 and interprets I<fail_info> as bit pattern for the failInfo field.
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | OSSL_CMP_STATUSINFO_new.pod | 14 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, 30 and interprets I<fail_info> as bit pattern for the failInfo field.
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | OSSL_CMP_STATUSINFO_new.pod | 14 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, 30 and interprets I<fail_info> as bit pattern for the failInfo field.
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | OSSL_CMP_STATUSINFO_new.pod | 14 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, 30 and interprets I<fail_info> as bit pattern for the failInfo field.
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/doc/man3/ |
H A D | OSSL_CMP_STATUSINFO_new.pod | 14 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, 30 and interprets I<fail_info> as bit pattern for the failInfo field.
|
/dports/security/openssl-devel/openssl-3.0.2/doc/man3/ |
H A D | OSSL_CMP_STATUSINFO_new.pod | 14 OSSL_CMP_PKISI *OSSL_CMP_STATUSINFO_new(int status, int fail_info, 30 and interprets I<fail_info> as bit pattern for the failInfo field.
|