Lines Matching refs:value

28 static int parse_boolean(const char *value, int *result)  in parse_boolean()  argument
30 if (OPENSSL_strcasecmp(value, "Yes") == 0) { in parse_boolean()
34 else if (OPENSSL_strcasecmp(value, "No") == 0) { in parse_boolean()
38 TEST_error("parse_boolean given: '%s'", value); in parse_boolean()
43 static int parse_##name##_##field(struct_type *ctx, const char *value) \
45 return parse_boolean(value, &ctx->field); \
49 static int parse_##name##_##field(struct_type *ctx, const char *value) \
52 ctx->field = OPENSSL_strdup(value); \
57 static int parse_##name##_##field(struct_type *ctx, const char *value) \
59 ctx->field = atoi(value); \
66 int value; member
71 int *value, const char *name) in parse_enum() argument
76 *value = enums[i].value; in parse_enum()
84 int value) in enum_name() argument
88 if (enums[i].value == value) { in enum_name()
106 __owur static int parse_expected_result(SSL_TEST_CTX *test_ctx, const char *value) in parse_expected_result() argument
110 &ret_value, value)) { in parse_expected_result()
134 __owur static int parse_alert(int *alert, const char *value) in parse_alert() argument
136 return parse_enum(ssl_alerts, OSSL_NELEM(ssl_alerts), alert, value); in parse_alert()
139 __owur static int parse_client_alert(SSL_TEST_CTX *test_ctx, const char *value) in parse_client_alert() argument
141 return parse_alert(&test_ctx->expected_client_alert, value); in parse_client_alert()
144 __owur static int parse_server_alert(SSL_TEST_CTX *test_ctx, const char *value) in parse_server_alert() argument
146 return parse_alert(&test_ctx->expected_server_alert, value); in parse_server_alert()
166 __owur static int parse_protocol(SSL_TEST_CTX *test_ctx, const char *value) in parse_protocol() argument
169 &test_ctx->expected_protocol, value); in parse_protocol()
187 const char *value) in parse_client_verify_callback() argument
192 &ret_value, value)) { in parse_client_verify_callback()
215 const char *value) in parse_servername() argument
219 &ret_value, value)) { in parse_servername()
227 const char *value) in parse_expected_servername() argument
231 &ret_value, value)) { in parse_expected_servername()
258 const char *value) in parse_servername_callback() argument
262 OSSL_NELEM(ssl_servername_callbacks), &ret_value, value)) { in parse_servername_callback()
283 __owur static int parse_session_ticket(SSL_TEST_CTX *test_ctx, const char *value) in parse_session_ticket() argument
287 &ret_value, value)) { in parse_session_ticket()
313 __owur static int parse_session_id(SSL_TEST_CTX *test_ctx, const char *value) in parse_session_id() argument
317 &ret_value, value)) { in parse_session_id()
339 __owur static int parse_test_method(SSL_TEST_CTX *test_ctx, const char *value) in parse_test_method() argument
343 &ret_value, value)) { in parse_test_method()
386 __owur static int parse_handshake_mode(SSL_TEST_CTX *test_ctx, const char *value) in parse_handshake_mode() argument
390 &ret_value, value)) { in parse_handshake_mode()
414 __owur static int parse_key_update_type(SSL_TEST_CTX *test_ctx, const char *value) in parse_key_update_type() argument
418 &ret_value, value)) { in parse_key_update_type()
434 const char *value) in parse_ct_validation() argument
438 &ret_value, value)) { in parse_ct_validation()
469 const char *value) in parse_certstatus() argument
473 value)) { in parse_certstatus()
505 const char *value) in parse_max_fragment_len_mode() argument
510 OSSL_NELEM(ssl_max_fragment_len_mode), &ret_value, value)) { in parse_max_fragment_len_mode()
526 __owur static int parse_expected_key_type(int *ptype, const char *value) in parse_expected_key_type() argument
533 if (value == NULL) in parse_expected_key_type()
536 ameth = EVP_PKEY_asn1_find_str(NULL, value, -1); in parse_expected_key_type()
540 nid = OBJ_sn2nid(value); in parse_expected_key_type()
547 if (strcmp("RSA", value) == 0) { in parse_expected_key_type()
549 } else if (strcmp("RSA-PSS", value) == 0) { in parse_expected_key_type()
551 } else if (strcmp("Ed448", value) == 0) { in parse_expected_key_type()
553 } else if (strcmp("Ed25519", value) == 0) { in parse_expected_key_type()
555 } else if (strcmp("EC", value) == 0) { in parse_expected_key_type()
558 nid = OBJ_ln2nid(value); in parse_expected_key_type()
562 nid = OBJ_sn2nid(value); in parse_expected_key_type()
565 nid = EC_curve_nist2nid(value); in parse_expected_key_type()
585 const char *value) in parse_expected_tmp_key_type() argument
587 return parse_expected_key_type(&test_ctx->expected_tmp_key_type, value); in parse_expected_tmp_key_type()
591 const char *value) in parse_expected_server_cert_type() argument
594 value); in parse_expected_server_cert_type()
598 const char *value) in parse_expected_server_sign_type() argument
601 value); in parse_expected_server_sign_type()
605 const char *value) in parse_expected_client_cert_type() argument
608 value); in parse_expected_client_cert_type()
612 const char *value) in parse_expected_client_sign_type() argument
615 value); in parse_expected_client_sign_type()
621 __owur static int parse_expected_sign_hash(int *ptype, const char *value) in parse_expected_sign_hash() argument
625 if (value == NULL) in parse_expected_sign_hash()
627 nid = OBJ_sn2nid(value); in parse_expected_sign_hash()
629 nid = OBJ_ln2nid(value); in parse_expected_sign_hash()
637 const char *value) in parse_expected_server_sign_hash() argument
640 value); in parse_expected_server_sign_hash()
644 const char *value) in parse_expected_client_sign_hash() argument
647 value); in parse_expected_client_sign_hash()
651 const char *value, in parse_expected_ca_names() argument
654 if (value == NULL) in parse_expected_ca_names()
656 if (!strcmp(value, "empty")) in parse_expected_ca_names()
659 *pnames = SSL_load_client_CA_file_ex(value, libctx, NULL); in parse_expected_ca_names()
663 const char *value) in parse_expected_server_ca_names() argument
665 return parse_expected_ca_names(&test_ctx->expected_server_ca_names, value, in parse_expected_server_ca_names()
669 const char *value) in parse_expected_client_ca_names() argument
671 return parse_expected_ca_names(&test_ctx->expected_client_ca_names, value, in parse_expected_client_ca_names()
693 int (*parse)(SSL_TEST_CTX *test_ctx, const char *value);
734 int (*parse)(SSL_TEST_CLIENT_CONF *conf, const char *value);
754 int (*parse)(SSL_TEST_SERVER_CONF *conf, const char *value);
837 if (!ssl_test_client_options[j].parse(client, option->value)) { in parse_client_options()
839 option->value, option->name); in parse_client_options()
870 if (!ssl_test_server_options[j].parse(server, option->value)) { in parse_server_options()
872 option->value, option->name); in parse_server_options()
906 if (!parse_client_options(&ctx->extra.client, conf, option->value)) in SSL_TEST_CTX_create()
909 if (!parse_server_options(&ctx->extra.server, conf, option->value)) in SSL_TEST_CTX_create()
912 if (!parse_server_options(&ctx->extra.server2, conf, option->value)) in SSL_TEST_CTX_create()
916 option->value)) in SSL_TEST_CTX_create()
920 option->value)) in SSL_TEST_CTX_create()
924 option->value)) in SSL_TEST_CTX_create()
929 if (!ssl_test_ctx_options[j].parse(ctx, option->value)) { in SSL_TEST_CTX_create()
931 option->value, option->name); in SSL_TEST_CTX_create()