| /src/crypto/krb5/src/lib/krb5/os/ |
| H A D | ref_std_conf.out | 1 krb5_get_default_realm() returned 'DEFAULT.REALM.TST' 3 krb5_get_default_realm() returned 'NEW.DEFAULT.REALM' 4 krb5_get_realm_domain(DEFAULT_REALM.TST) returned 'MIT.EDU' 5 krb_get_host_realm(bad.idea) returned: 'US.GOV' 6 krb_get_host_realm(itar.bad.idea) returned: 'NSA.GOV' 7 krb_get_host_realm(really.BAD.IDEA.) returned: 'NSA.GOV' 8 krb_get_host_realm(clipper.bad.idea) returned: 'NIST.GOV' 9 krb_get_host_realm(KeYEsCrOW.BaD.IDea) returned: 'NSA.GOV' 10 krb_get_host_realm(pgp.good.idea) returned: '' 11 krb_get_host_realm(no_domain) returned: ''
|
| /src/crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/ |
| H A D | bigtest.c | 12 DBT key, value, returned; in main() local 33 returned.data = NULL; in main() 40 if (db->get(db, &key, &returned, 0) != 0) in main() 42 assert (returned.size == 3200); in main() 44 if (((int *)returned.data)[i] != 0xDEADBEEF) in main() 52 if ((db->seq(db, &key, &returned, 0)) != 0) in main() 55 assert(returned.size == 3200); in main() 58 if (((int *)returned.data)[i] != 0xDEADBEEF) in main() 65 if (db->get(db, &key, &returned, 0) != 0) in main() 67 assert(returned.size == 1200); in main() [all …]
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_get_stream_read_state.pod | 41 This value is returned if called on a non-QUIC SSL object, or on a QUIC 46 This value is returned on a stream which has not been concluded and remains 51 This value is returned if SSL_get_stream_read_state() is called on a 58 For SSL_get_stream_read_state(), this value is returned when the remote peer has 61 returned. 63 For SSL_get_stream_write_state(), this value is returned when the local 69 This value is returned when the applicable stream part was reset by the local 82 When this value is returned, the application error code which was signalled can 88 This value is returned when the applicable stream part was reset by the remote 100 When this value is returned, the application error code which was signalled can [all …]
|
| H A D | SSL_get_ciphers.pod | 32 is returned. 47 If B<ssl> is NULL or no ciphers are available, NULL is returned. 51 available, or B<ssl> is not operating in server mode, NULL is returned. 57 into the returned stacks of SSL_CIPHER objects sk and Signalling Cipher-Suite 64 is returned. 69 size of that buffer. A pointer to B<buf> is returned on success or NULL on 71 of names then a truncated list of names will be returned. Note that just because 86 sorted list of available ciphers, until NULL is returned. 93 The stack returned by SSL_get1_supported_ciphers() should be freed using 96 The stacks returned by SSL_bytes_to_cipher_list() should be freed using
|
| H A D | SSL_CTX_get_verify_mode.pod | 27 in B<ctx>. If no limit has been explicitly set, -1 is returned and the 31 in B<ssl>. If no limit has been explicitly set, -1 is returned and the 36 NULL pointer is returned and the default callback will be used. 40 NULL pointer is returned and the default callback will be used.
|
| H A D | SSL_get_peer_cert_chain.pod | 22 If the peer did not present a certificate, NULL is returned. 37 is returned by these functions. Applications can call SSL_session_reused() 40 The reference count of each certificate in the returned STACK_OF(X509) object 41 is not incremented and the returned stack may be invalidated by renegotiation. 42 If applications wish to use any certificates in the returned chain
|
| H A D | X509_NAME_get_index_by_NID.pod | 34 should initially be set to -1. If there are no more entries -1 is returned. 35 If B<nid> is invalid (doesn't correspond to a valid OID) then -2 is returned. 41 0 to (X509_NAME_entry_count(name) - 1). The value returned is an 46 B<obj>, if no such entry exists -1 is returned. At most B<len> bytes 48 terminated. The length of the output string written is returned 50 of space needed in B<buf> (excluding the final null) is returned.
|
| H A D | SSL_get1_builtin_sigalgs.pod | 17 The string returned must be freed by the user using L<OPENSSL_free(3)>. 26 NULL may be returned if no memory could be allocated. Otherwise, a 27 newly allocated string is always returned but it may have strlen == 0.
|
| H A D | OCSP_request_add1_nonce.pod | 39 nonces are present and equal 1 is returned. If the nonces are absent 2 is 40 returned. If a nonce is present in the response only 3 is returned. If nonces 41 are present and unequal 0 is returned. If the nonce is present in the request 42 only then -1 is returned.
|
| H A D | SSL_get_peer_certificate.pod | 25 peer presented. If the peer did not present a certificate, NULL is returned. 35 That a certificate is returned does not indicate information about the 39 The reference count of the X509 object returned by SSL_get1_peer_certificate() 44 The reference count of the X509 object returned by SSL_get0_peer_certificate()
|
| H A D | X509_STORE_get0_param.pod | 24 parameters for I<xs>. The returned pointer must not be freed by the 29 is responsible for freeing the returned list, 34 returned pointer must not be freed by the calling application. If the store is 39 The caller is responsible for freeing the returned list
|
| H A D | SSL_CTX_set_alpn_select_cb.pod | 75 matches an item in the B<client>, B<client_len> list is selected, and returned 82 item in B<client>, B<client_len> is returned in B<out>, B<outlen> and 83 B<OPENSSL_NPN_NO_OVERLAP> is returned. This can be useful when implementing 84 the NPN callback. In the ALPN case, the value returned in B<out> and B<outlen> 85 must be ignored if B<OPENSSL_NPN_NO_OVERLAP> has been returned from 103 Negotiation. The returned list must be in protocol-list format, described 105 returned by setting B<out> to point to it and B<outlen> to its length. This 119 the client can request any protocol it chooses. The value returned from 161 A match was found and is returned in B<out>, B<outlen>. 165 No match was found. The first item in B<client>, B<client_len> is returned in
|
| H A D | SSL_CIPHER_get_name.pod | 58 If B<cipher> is NULL, 0 is returned. 65 B<NID_undef> is returned. 69 for AEAD cipher suites) then B<NID_undef> is returned. 76 used by B<c>. If there is no key exchange, then B<NID_undef> is returned. 78 cipher suites) B<NID_kx_any> is returned. Examples (not comprehensive): 86 used by B<c>. If there is no authentication, then B<NID_undef> is returned. 88 TLS 1.3 cipher suites) B<NID_auth_any> is returned. Examples (not comprehensive): 114 B<NULL> is returned. 116 The string returned by SSL_CIPHER_description() consists of several fields
|
| H A D | X509_get_default_cert_file.pod | 37 returned by X509_get_default_cert_file(). The value returned by the latter 41 returned by the X509_get_default_cert_file() should be used. 45 returned by X509_get_default_cert_dir(). The value specified by this environment 51 environment variable name returned by X509_get_default_cert_dir_env() is
|
| H A D | PEM_read.pod | 70 <type>-----" is returned via the B<name> argument, any encapsulation headers 71 are returned in B<header> and the base64-decoded content and its length are 72 returned via B<data> and B<len> respectively. 76 PEM_get_EVP_CIPHER_INFO() can be used to determine the B<data> returned by 80 B<cinfo> argument and the B<header> returned via PEM_read() or PEM_read_bio(). 81 If the call is successful 1 is returned and the cipher and IV are stored at the 84 or some internal error happens 0 is returned. 91 The B<data> and B<len> arguments are those returned by the previous call to
|
| H A D | SSL_CTX_set_tlsext_status_cb.pod | 49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The 50 callback function should determine whether the returned OCSP response is 66 The response returned by the server can be obtained via a call to 91 returned), SSL_TLSEXT_ERR_NOACK (meaning that an OCSP response should not be 92 returned) or SSL_TLSEXT_ERR_ALERT_FATAL (meaning that a fatal error has 107 side if the client requested OCSP stapling. Otherwise -1 is returned.
|
| H A D | SSL_new_listener.pod | 95 Accept connections in a loop by calling SSL_accept_connection(). Each returned 106 created by a listener object, that listener object is returned. If the I<ssl> 129 connection is created and returned on success. If no incoming connection is 131 returned. 133 The new SSL object returned from SSL_accept_connection() may or may not have 134 completed its handshake at the point it is returned. Optionally, you may use the 147 next pending connection, removing it from the queue. The returned connection 149 ultimately be returned may be different. 159 update the value returned by L<SSL_get_error(3)> if they fail. 217 returned from SSL_accept_connection(), calls to SSL_get0_listener() made from
|
| H A D | COMP_CTX_new.pod | 58 COMP_CTX_free() is used to free the returned B<COMP_CTX>. 75 into the OpenSSL library. In such a case, NULL will be returned. 108 the OpenSSL library. NULL may be returned if the algorithm fails to load dynamically. 140 If an error is returned, the stream is corrupted, and should be closed. 155 NID_undef is returned. 159 -1 is returned.
|
| H A D | X509v3_get_ext_by_NID.pod | 67 can take any value from 0 to X509_get_ext_count(I<x>) - 1. The returned 74 the extension is found, its index is returned, otherwise -1 is returned. 82 The deleted extension is returned and must be freed by the caller. 83 If I<loc> is an invalid index value, NULL is returned. 91 The STACK I<*target> is returned unchanged if I<exts> is NULL or an empty list.
|
| H A D | OSSL_STORE_INFO.pod | 75 The object returned by STORE_INFO_get1_<TYPE>() must be freed separately 92 B<OSSL_STORE_INFO> type (as returned by OSSL_STORE_INFO_get_type()) 100 holds if the B<OSSL_STORE_INFO> type (as returned by 142 named C<cookie.pem>, and in that case, the returned B<OSSL_STORE_INFO_NAME> 149 returned name will be the path of each object, so if C</foo/bar> was 151 C</foo/bar/cookie.pem> will be returned. 153 The returned URI is considered canonical and must be unique and permanent
|
| /src/crypto/openssl/doc/internal/man3/ |
| H A D | ossl_cmp_mock_srv_new.pod | 54 to be returned in cp/ip/kup messages. 64 returned in the caPubs field an ip message and in a genp of infoType caCerts. 67 of the newWithNew field to be returned in a genp of infoType rootCaKeyUpdate. 70 of the newWithOld field to be returned in a genp of infoType rootCaKeyUpdate. 73 of the oldWithNew field to be returned in a genp of infoType rootCaKeyUpdate. 75 ossl_cmp_mock_srv_set_statusInfo() sets the status info to be returned.
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | ticket.c | 379 krb5_const_principal returned, in check_server_referral() argument 437 if (strcmp(requested->realm, returned->realm) != 0) { in check_server_referral() 442 requested->realm, returned->realm); in check_server_referral() 446 if (krb5_principal_is_krbtgt(context, returned)) { in check_server_referral() 447 const char *realm = returned->name.name_string.val[1]; in check_server_referral() 457 } else if (krb5_principal_compare(context, returned, requested) == 0) { in check_server_referral() 489 if (krb5_principal_compare(context, requested, returned) != TRUE && in check_server_referral() 490 (krb5_realm_compare(context, requested, returned) != TRUE && in check_server_referral() 491 krb5_principal_is_krbtgt(context, returned) != TRUE)) in check_server_referral()
|
| /src/contrib/llvm-project/compiler-rt/lib/builtins/avr/ |
| H A D | udivmodqi4.S | 38 com r24 ; The uint8 quotient is returned via R24. 39 ret ; The uint8 remainder is returned via R25.
|
| H A D | udivmodhi4.S | 46 mov r23, r25 ; The quotient is returned in R23:R22. 48 mov r25, r27 ; The remainder is returned in in R25:R24.
|
| /src/crypto/krb5/src/lib/krb5/unicode/ucdata/ |
| H A D | api.txt | 81 If a zero is returned, there is no decomposition. If a non-zero is 82 returned, then the `num' and `decomp' variables are filled in with the 101 If a -1 is returned, memory allocation was not successful. If a zero is 102 returned, no decomposition occured. Any other value means the output string 106 returned in the "out" parameter needs to be deallocated by the caller. 119 If a zero is returned, the character is not a Hangul syllable. If a 120 non-zero is returned, the `num' field will be 2 or 3 and the syllable will 140 If a zero is returned, no composition is formed by the character pair. Any 204 no upper case equivalent. Otherwise the upper case equivalent is returned. 211 no lower case equivalent. Otherwise the lower case equivalent is returned. [all …]
|