Lines Matching defs:value
83 * value of errno from OpenSSL into our debug CRT.
189 PY_SSL_ERROR_SYSCALL, /* look at error stack/return value/errno */
670 * zero return value to SSL_ERROR_SSL with a special error code. */
1058 ASN1_OBJECT *name, ASN1_STRING *value)
1069 if (ASN1_STRING_type(value) == V_ASN1_BIT_STRING) {
1070 buflen = ASN1_STRING_length(value);
1071 pyattr = Py_BuildValue("Ny#", pyname, ASN1_STRING_get0_data(value), buflen);
1074 buflen = ASN1_STRING_to_UTF8(&valuebuf, value);
1096 ASN1_STRING *value;
1138 value = X509_NAME_ENTRY_get_data(entry);
1139 attr = _create_tuple_for_attribute(state, name, value);
1395 "Invalid value %.200s",
1527 /* Ignore empty DP value, CVE-2019-5010 */
2143 static int PySSL_set_context(PySSLSocket *self, PyObject *value,
2146 if (PyObject_TypeCheck(value, self->ctx->state->PySSLContext_Type)) {
2147 Py_INCREF(value);
2148 Py_SETREF(self->ctx, (PySSLContext *)value);
2156 PyErr_SetString(PyExc_TypeError, "The value must be a SSLContext");
2207 PySSL_set_owner(PySSLSocket *self, PyObject *value, void *c)
2209 Py_XSETREF(self->owner, PyWeakref_NewRef(value, NULL));
2863 static int PySSL_set_session(PySSLSocket *self, PyObject *value,
2870 if (!Py_IS_TYPE(value, get_state_sock(self)->PySSLSession_Type)) {
2874 pysess = (PySSLSession *)value;
2996 "invalid value for verify_mode");
3400 "invalid return value from SSL_CTX_get_verify_mode");
3590 PyErr_SetString(PyExc_ValueError, "value must be non-negative");
4291 PyObject *value, *stats = PyDict_New();
4296 value = PyLong_FromLong(SSL_CTX_sess_ ## SSL_NAME (self->ctx)); \
4297 if (value == NULL) \
4299 r = PyDict_SetItemString(stats, KEY_NAME, value); \
4300 Py_DECREF(value); \
4858 If the return value is an empty bytes instance, this means either
6037 #define addbool(m, key, value) \
6039 PyObject *bool_obj = (value) ? Py_True : Py_False; \