Lines Matching defs:value
23 static int parse_boolean(const char *value, int *result)
25 if (OPENSSL_strcasecmp(value, "Yes") == 0) {
29 else if (OPENSSL_strcasecmp(value, "No") == 0) {
33 TEST_error("parse_boolean given: '%s'", value);
38 static int parse_##name##_##field(struct_type *ctx, const char *value) \
40 return parse_boolean(value, &ctx->field); \
44 static int parse_##name##_##field(struct_type *ctx, const char *value) \
47 ctx->field = OPENSSL_strdup(value); \
52 static int parse_##name##_##field(struct_type *ctx, const char *value) \
54 ctx->field = atoi(value); \
61 int value;
66 int *value, const char *name)
71 *value = enums[i].value;
79 int value)
83 if (enums[i].value == value) {
101 __owur static int parse_expected_result(SSL_TEST_CTX *test_ctx, const char *value)
105 &ret_value, value)) {
129 __owur static int parse_alert(int *alert, const char *value)
131 return parse_enum(ssl_alerts, OSSL_NELEM(ssl_alerts), alert, value);
134 __owur static int parse_client_alert(SSL_TEST_CTX *test_ctx, const char *value)
136 return parse_alert(&test_ctx->expected_client_alert, value);
139 __owur static int parse_server_alert(SSL_TEST_CTX *test_ctx, const char *value)
141 return parse_alert(&test_ctx->expected_server_alert, value);
161 __owur static int parse_protocol(SSL_TEST_CTX *test_ctx, const char *value)
164 &test_ctx->expected_protocol, value);
182 const char *value)
187 &ret_value, value)) {
210 const char *value)
214 &ret_value, value)) {
222 const char *value)
226 &ret_value, value)) {
253 const char *value)
257 OSSL_NELEM(ssl_servername_callbacks), &ret_value, value)) {
278 __owur static int parse_session_ticket(SSL_TEST_CTX *test_ctx, const char *value)
282 &ret_value, value)) {
308 __owur static int parse_session_id(SSL_TEST_CTX *test_ctx, const char *value)
312 &ret_value, value)) {
333 __owur static int parse_test_method(SSL_TEST_CTX *test_ctx, const char *value)
337 &ret_value, value)) {
380 __owur static int parse_handshake_mode(SSL_TEST_CTX *test_ctx, const char *value)
384 &ret_value, value)) {
408 __owur static int parse_key_update_type(SSL_TEST_CTX *test_ctx, const char *value)
412 &ret_value, value)) {
428 const char *value)
432 &ret_value, value)) {
460 const char *value)
464 value)) {
496 const char *value)
501 OSSL_NELEM(ssl_max_fragment_len_mode), &ret_value, value)) {
517 __owur static int parse_expected_key_type(int *ptype, const char *value)
522 if (value == NULL)
524 ameth = EVP_PKEY_asn1_find_str(NULL, value, -1);
528 nid = OBJ_sn2nid(value);
530 nid = OBJ_ln2nid(value);
533 nid = EC_curve_nist2nid(value);
542 const char *value)
544 return parse_expected_key_type(&test_ctx->expected_tmp_key_type, value);
548 const char *value)
551 value);
555 const char *value)
558 value);
562 const char *value)
565 value);
569 const char *value)
572 value);
578 __owur static int parse_expected_sign_hash(int *ptype, const char *value)
582 if (value == NULL)
584 nid = OBJ_sn2nid(value);
586 nid = OBJ_ln2nid(value);
594 const char *value)
597 value);
601 const char *value)
604 value);
608 const char *value,
611 if (value == NULL)
613 if (!strcmp(value, "empty"))
616 *pnames = SSL_load_client_CA_file_ex(value, libctx, NULL);
620 const char *value)
622 return parse_expected_ca_names(&test_ctx->expected_server_ca_names, value,
626 const char *value)
628 return parse_expected_ca_names(&test_ctx->expected_client_ca_names, value,
647 int (*parse)(SSL_TEST_CTX *test_ctx, const char *value);
686 int (*parse)(SSL_TEST_CLIENT_CONF *conf, const char *value);
706 int (*parse)(SSL_TEST_SERVER_CONF *conf, const char *value);
788 if (!ssl_test_client_options[j].parse(client, option->value)) {
789 TEST_info("Bad value %s for option %s",
790 option->value, option->name);
821 if (!ssl_test_server_options[j].parse(server, option->value)) {
822 TEST_info("Bad value %s for option %s",
823 option->value, option->name);
857 if (!parse_client_options(&ctx->extra.client, conf, option->value))
860 if (!parse_server_options(&ctx->extra.server, conf, option->value))
863 if (!parse_server_options(&ctx->extra.server2, conf, option->value))
867 option->value))
871 option->value))
875 option->value))
880 if (!ssl_test_ctx_options[j].parse(ctx, option->value)) {
881 TEST_info("Bad value %s for option %s",
882 option->value, option->name);