diff options
author | Heikki Vatiainen <hvn@radiatorsoftware.com> | 2023-12-26 19:17:13 +0200 |
---|---|---|
committer | Heikki Vatiainen <hvn@radiatorsoftware.com> | 2023-12-26 19:17:13 +0200 |
commit | f861ca528ed35e811570c6f5b5074a7da9d7759e (patch) | |
tree | 4a203e8373e0e85500b7c1c03cd33970dd385ba9 | |
parent | 3e537556f10b7fd3356c047f1e30c03dc5318652 (diff) |
GH-452 Add constants for OPENSSL_init_crypto and related functions.
-rw-r--r-- | Changes | 27 | ||||
-rw-r--r-- | constants.c | 881 | ||||
-rw-r--r-- | helper_script/constants.txt | 26 | ||||
-rw-r--r-- | lib/Net/SSLeay.pm | 26 | ||||
-rw-r--r-- | lib/Net/SSLeay.pod | 755 | ||||
-rw-r--r-- | t/local/21_constants.t | 28 |
6 files changed, 1076 insertions, 667 deletions
@@ -94,6 +94,33 @@ Revision history for Perl extension Net::SSLeay. testing and providing detailed test reports. Tested with GCC 13 g++, Clang 17 clang++ and Visual Studio Community 2022 C++ compilers. Discussion in GH-425 and GH-438. + - Add constants for OPENSSL_init_crypto and related functions: + - CONF_MFLAGS_DEFAULT_SECTION + - CONF_MFLAGS_IGNORE_ERRORS + - CONF_MFLAGS_IGNORE_MISSING_FILE + - CONF_MFLAGS_IGNORE_RETURN_CODES + - CONF_MFLAGS_NO_DSO + - CONF_MFLAGS_SILENT + - OPENSSL_INIT_ADD_ALL_CIPHERS + - OPENSSL_INIT_ADD_ALL_DIGESTS + - OPENSSL_INIT_ASYNC + - OPENSSL_INIT_ATFORK + - OPENSSL_INIT_ENGINE_AFALG + - OPENSSL_INIT_ENGINE_CAPI + - OPENSSL_INIT_ENGINE_CRYPTODEV + - OPENSSL_INIT_ENGINE_DYNAMIC + - OPENSSL_INIT_ENGINE_OPENSSL + - OPENSSL_INIT_ENGINE_PADLOCK + - OPENSSL_INIT_ENGINE_RDRAND + - OPENSSL_INIT_LOAD_CONFIG + - OPENSSL_INIT_LOAD_CRYPTO_STRINGS + - OPENSSL_INIT_LOAD_SSL_STRINGS + - OPENSSL_INIT_NO_ADD_ALL_CIPHERS + - OPENSSL_INIT_NO_ADD_ALL_DIGESTS + - OPENSSL_INIT_NO_ATEXIT + - OPENSSL_INIT_NO_LOAD_CONFIG + - OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS + - OPENSSL_INIT_NO_LOAD_SSL_STRINGS 1.93_02 2023-02-22 - Update ppport.h to version 3.68. This eliminates thousands of diff --git a/constants.c b/constants.c index a05d095..74350dd 100644 --- a/constants.c +++ b/constants.c @@ -3630,122 +3630,147 @@ constant (const char *name, size_t len) { case 18: /* Names all of length 18. */ /* AD_BAD_CERTIFICATE AD_RECORD_OVERFLOW CB_HANDSHAKE_START - CLIENT_HELLO_ERROR CLIENT_HELLO_RETRY ERROR_WANT_CONNECT - F_GET_CLIENT_HELLO F_GET_SERVER_HELLO MODE_NO_AUTO_CHAIN - NID_des_ede3_cfb64 NID_des_ede3_ofb64 NID_dhKeyAgreement + CLIENT_HELLO_ERROR CLIENT_HELLO_RETRY CONF_MFLAGS_NO_DSO + CONF_MFLAGS_SILENT ERROR_WANT_CONNECT F_GET_CLIENT_HELLO + F_GET_SERVER_HELLO MODE_NO_AUTO_CHAIN NID_des_ede3_cfb64 + NID_des_ede3_ofb64 NID_dhKeyAgreement OPENSSL_INIT_ASYNC OP_COOKIE_EXCHANGE OP_SINGLE_ECDH_USE R_BAD_SSL_FILETYPE SSL3_MT_KEY_UPDATE SSL3_MT_NEXT_PROTO TLSEXT_TYPE_cookie VERIFY_CLIENT_ONCE X509_CRL_VERSION_1 X509_CRL_VERSION_2 X509_FILETYPE_ASN1 X509_REQ_VERSION_1 X509_REQ_VERSION_2 X509_REQ_VERSION_3 X509_TRUST_DEFAULT */ - /* Offset 16 gives the best switch position. */ - switch (name[16]) { - case '6': - if (!memcmp(name, "NID_des_ede3_cfb64", 18)) { - /* ^ */ + /* Offset 6 gives the best switch position. */ + switch (name[6]) { + case 'C': + if (!memcmp(name, "F_GET_CLIENT_HELLO", 18)) { + /* ^ */ -#ifdef NID_des_ede3_cfb64 - return NID_des_ede3_cfb64; +#ifdef SSL_F_GET_CLIENT_HELLO + return SSL_F_GET_CLIENT_HELLO; #else goto not_there; #endif } - if (!memcmp(name, "NID_des_ede3_ofb64", 18)) { - /* ^ */ + break; + case 'D': + if (!memcmp(name, "CB_HANDSHAKE_START", 18)) { + /* ^ */ -#ifdef NID_des_ede3_ofb64 - return NID_des_ede3_ofb64; +#ifdef SSL_CB_HANDSHAKE_START + return SSL_CB_HANDSHAKE_START; #else goto not_there; #endif } break; - case 'C': - if (!memcmp(name, "ERROR_WANT_CONNECT", 18)) { - /* ^ */ + case 'E': + if (!memcmp(name, "X509_REQ_VERSION_1", 18)) { + /* ^ */ -#ifdef SSL_ERROR_WANT_CONNECT - return SSL_ERROR_WANT_CONNECT; +#ifdef X509_REQ_VERSION_1 + return X509_REQ_VERSION_1; #else goto not_there; #endif } - if (!memcmp(name, "VERIFY_CLIENT_ONCE", 18)) { - /* ^ */ + if (!memcmp(name, "X509_REQ_VERSION_2", 18)) { + /* ^ */ -#ifdef SSL_VERIFY_CLIENT_ONCE - return SSL_VERIFY_CLIENT_ONCE; +#ifdef X509_REQ_VERSION_2 + return X509_REQ_VERSION_2; +#else + goto not_there; +#endif + + } + if (!memcmp(name, "X509_REQ_VERSION_3", 18)) { + /* ^ */ + +#ifdef X509_REQ_VERSION_3 + return X509_REQ_VERSION_3; #else goto not_there; #endif } break; - case 'G': - if (!memcmp(name, "OP_COOKIE_EXCHANGE", 18)) { - /* ^ */ + case 'F': + if (!memcmp(name, "CONF_MFLAGS_NO_DSO", 18)) { + /* ^ */ -#ifdef SSL_OP_COOKIE_EXCHANGE - return SSL_OP_COOKIE_EXCHANGE; +#ifdef CONF_MFLAGS_NO_DSO + return CONF_MFLAGS_NO_DSO; +#else + goto not_there; +#endif + + } + if (!memcmp(name, "CONF_MFLAGS_SILENT", 18)) { + /* ^ */ + +#ifdef CONF_MFLAGS_SILENT + return CONF_MFLAGS_SILENT; #else goto not_there; #endif } break; - case 'I': - if (!memcmp(name, "MODE_NO_AUTO_CHAIN", 18)) { - /* ^ */ + case 'G': + if (!memcmp(name, "OP_SINGLE_ECDH_USE", 18)) { + /* ^ */ -#ifdef SSL_MODE_NO_AUTO_CHAIN - return SSL_MODE_NO_AUTO_CHAIN; +#ifdef SSL_OP_SINGLE_ECDH_USE + return SSL_OP_SINGLE_ECDH_USE; #else goto not_there; #endif } break; - case 'L': - if (!memcmp(name, "F_GET_CLIENT_HELLO", 18)) { - /* ^ */ + case 'I': + if (!memcmp(name, "X509_FILETYPE_ASN1", 18)) { + /* ^ */ -#ifdef SSL_F_GET_CLIENT_HELLO - return SSL_F_GET_CLIENT_HELLO; +#ifdef X509_FILETYPE_ASN1 + return X509_FILETYPE_ASN1; #else goto not_there; #endif } - if (!memcmp(name, "F_GET_SERVER_HELLO", 18)) { - /* ^ */ + break; + case 'K': + if (!memcmp(name, "NID_dhKeyAgreement", 18)) { + /* ^ */ -#ifdef SSL_F_GET_SERVER_HELLO - return SSL_F_GET_SERVER_HELLO; +#ifdef NID_dhKeyAgreement + return NID_dhKeyAgreement; #else goto not_there; #endif } - if (!memcmp(name, "X509_TRUST_DEFAULT", 18)) { - /* ^ */ + if (!memcmp(name, "OP_COOKIE_EXCHANGE", 18)) { + /* ^ */ -#ifdef X509_TRUST_DEFAULT - return X509_TRUST_DEFAULT; +#ifdef SSL_OP_COOKIE_EXCHANGE + return SSL_OP_COOKIE_EXCHANGE; #else goto not_there; #endif } break; - case 'N': - if (!memcmp(name, "X509_FILETYPE_ASN1", 18)) { - /* ^ */ + case 'L': + if (!memcmp(name, "OPENSSL_INIT_ASYNC", 18)) { + /* ^ */ -#ifdef X509_FILETYPE_ASN1 - return X509_FILETYPE_ASN1; +#ifdef OPENSSL_INIT_ASYNC + return OPENSSL_INIT_ASYNC; #else goto not_there; #endif @@ -3754,7 +3779,7 @@ constant (const char *name, size_t len) { break; case 'O': if (!memcmp(name, "AD_RECORD_OVERFLOW", 18)) { - /* ^ */ + /* ^ */ #ifdef SSL_AD_RECORD_OVERFLOW return SSL_AD_RECORD_OVERFLOW; @@ -3763,45 +3788,43 @@ constant (const char *name, size_t len) { #endif } - if (!memcmp(name, "CLIENT_HELLO_ERROR", 18)) { - /* ^ */ + if (!memcmp(name, "MODE_NO_AUTO_CHAIN", 18)) { + /* ^ */ -#ifdef SSL_CLIENT_HELLO_ERROR - return SSL_CLIENT_HELLO_ERROR; +#ifdef SSL_MODE_NO_AUTO_CHAIN + return SSL_MODE_NO_AUTO_CHAIN; #else goto not_there; #endif } break; - case 'P': - if (!memcmp(name, "R_BAD_SSL_FILETYPE", 18)) { - /* ^ */ + case 'R': + if (!memcmp(name, "X509_CRL_VERSION_1", 18)) { + /* ^ */ -#ifdef SSL_R_BAD_SSL_FILETYPE - return SSL_R_BAD_SSL_FILETYPE; +#ifdef X509_CRL_VERSION_1 + return X509_CRL_VERSION_1; #else goto not_there; #endif } - break; - case 'R': - if (!memcmp(name, "CB_HANDSHAKE_START", 18)) { - /* ^ */ + if (!memcmp(name, "X509_CRL_VERSION_2", 18)) { + /* ^ */ -#ifdef SSL_CB_HANDSHAKE_START - return SSL_CB_HANDSHAKE_START; +#ifdef X509_CRL_VERSION_2 + return X509_CRL_VERSION_2; #else goto not_there; #endif } - if (!memcmp(name, "CLIENT_HELLO_RETRY", 18)) { - /* ^ */ + if (!memcmp(name, "X509_TRUST_DEFAULT", 18)) { + /* ^ */ -#ifdef SSL_CLIENT_HELLO_RETRY - return SSL_CLIENT_HELLO_RETRY; +#ifdef X509_TRUST_DEFAULT + return X509_TRUST_DEFAULT; #else goto not_there; #endif @@ -3809,30 +3832,30 @@ constant (const char *name, size_t len) { } break; case 'S': - if (!memcmp(name, "OP_SINGLE_ECDH_USE", 18)) { - /* ^ */ + if (!memcmp(name, "F_GET_SERVER_HELLO", 18)) { + /* ^ */ -#ifdef SSL_OP_SINGLE_ECDH_USE - return SSL_OP_SINGLE_ECDH_USE; +#ifdef SSL_F_GET_SERVER_HELLO + return SSL_F_GET_SERVER_HELLO; #else goto not_there; #endif } - break; - case 'T': - if (!memcmp(name, "AD_BAD_CERTIFICATE", 18)) { - /* ^ */ + if (!memcmp(name, "R_BAD_SSL_FILETYPE", 18)) { + /* ^ */ -#ifdef SSL_AD_BAD_CERTIFICATE - return SSL_AD_BAD_CERTIFICATE; +#ifdef SSL_R_BAD_SSL_FILETYPE + return SSL_R_BAD_SSL_FILETYPE; #else goto not_there; #endif } + break; + case 'T': if (!memcmp(name, "SSL3_MT_KEY_UPDATE", 18)) { - /* ^ */ + /* ^ */ #ifdef SSL3_MT_KEY_UPDATE return SSL3_MT_KEY_UPDATE; @@ -3842,7 +3865,7 @@ constant (const char *name, size_t len) { } if (!memcmp(name, "SSL3_MT_NEXT_PROTO", 18)) { - /* ^ */ + /* ^ */ #ifdef SSL3_MT_NEXT_PROTO return SSL3_MT_NEXT_PROTO; @@ -3852,76 +3875,86 @@ constant (const char *name, size_t len) { } break; + case 'W': + if (!memcmp(name, "ERROR_WANT_CONNECT", 18)) { + /* ^ */ + +#ifdef SSL_ERROR_WANT_CONNECT + return SSL_ERROR_WANT_CONNECT; +#else + goto not_there; +#endif + + } + break; case '_': - if (!memcmp(name, "X509_CRL_VERSION_1", 18)) { - /* ^ */ + if (!memcmp(name, "AD_BAD_CERTIFICATE", 18)) { + /* ^ */ -#ifdef X509_CRL_VERSION_1 - return X509_CRL_VERSION_1; +#ifdef SSL_AD_BAD_CERTIFICATE + return SSL_AD_BAD_CERTIFICATE; #else goto not_there; #endif } - if (!memcmp(name, "X509_CRL_VERSION_2", 18)) { - /* ^ */ + if (!memcmp(name, "CLIENT_HELLO_ERROR", 18)) { + /* ^ */ -#ifdef X509_CRL_VERSION_2 - return X509_CRL_VERSION_2; +#ifdef SSL_CLIENT_HELLO_ERROR + return SSL_CLIENT_HELLO_ERROR; #else goto not_there; #endif } - if (!memcmp(name, "X509_REQ_VERSION_1", 18)) { - /* ^ */ + if (!memcmp(name, "CLIENT_HELLO_RETRY", 18)) { + /* ^ */ -#ifdef X509_REQ_VERSION_1 - return X509_REQ_VERSION_1; +#ifdef SSL_CLIENT_HELLO_RETRY + return SSL_CLIENT_HELLO_RETRY; #else goto not_there; #endif } - if (!memcmp(name, "X509_REQ_VERSION_2", 18)) { - /* ^ */ + if (!memcmp(name, "TLSEXT_TYPE_cookie", 18)) { + /* ^ */ -#ifdef X509_REQ_VERSION_2 - return X509_REQ_VERSION_2; +#ifdef TLSEXT_TYPE_cookie + return TLSEXT_TYPE_cookie; #else goto not_there; #endif } - if (!memcmp(name, "X509_REQ_VERSION_3", 18)) { - /* ^ */ + if (!memcmp(name, "VERIFY_CLIENT_ONCE", 18)) { + /* ^ */ -#ifdef X509_REQ_VERSION_3 - return X509_REQ_VERSION_3; +#ifdef SSL_VERIFY_CLIENT_ONCE + return SSL_VERIFY_CLIENT_ONCE; #else goto not_there; #endif } break; - case 'i': - if (!memcmp(name, "TLSEXT_TYPE_cookie", 18)) { - /* ^ */ + case 's': + if (!memcmp(name, "NID_des_ede3_cfb64", 18)) { + /* ^ */ -#ifdef TLSEXT_TYPE_cookie - return TLSEXT_TYPE_cookie; +#ifdef NID_des_ede3_cfb64 + return NID_des_ede3_cfb64; #else goto not_there; #endif } - break; - case 'n': - if (!memcmp(name, "NID_dhKeyAgreement", 18)) { - /* ^ */ + if (!memcmp(name, "NID_des_ede3_ofb64", 18)) { + /* ^ */ -#ifdef NID_dhKeyAgreement - return NID_dhKeyAgreement; +#ifdef NID_des_ede3_ofb64 + return NID_des_ede3_ofb64; #else goto not_there; #endif @@ -3936,10 +3969,10 @@ constant (const char *name, size_t len) { F_GET_SERVER_VERIFY NID_invalidity_date NID_issuer_alt_name NID_pkcs7_encrypted NID_pkcs7_enveloped NID_rle_compression NID_safeContentsBag NID_sdsiCertificate NID_x509Certificate - OPENSSL_ENGINES_DIR OPENSSL_MODULES_DIR OP_ALLOW_NO_DHE_KEX - OP_CISCO_ANYCONNECT OP_NON_EXPORT_FIRST OP_NO_RENEGOTIATION - OP_TLS_ROLLBACK_BUG SSL3_MT_CERTIFICATE SSL3_MT_SERVER_DONE - TLSEXT_TYPE_padding */ + OPENSSL_ENGINES_DIR OPENSSL_INIT_ATFORK OPENSSL_MODULES_DIR + OP_ALLOW_NO_DHE_KEX OP_CISCO_ANYCONNECT OP_NON_EXPORT_FIRST + OP_NO_RENEGOTIATION OP_TLS_ROLLBACK_BUG SSL3_MT_CERTIFICATE + SSL3_MT_SERVER_DONE TLSEXT_TYPE_padding */ /* Offset 12 gives the best switch position. */ switch (name[12]) { case 'A': @@ -4091,6 +4124,16 @@ constant (const char *name, size_t len) { #endif } + if (!memcmp(name, "OPENSSL_INIT_ATFORK", 19)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ATFORK + return OPENSSL_INIT_ATFORK; +#else + goto not_there; +#endif + + } break; case 'c': if (!memcmp(name, "NID_pkcs7_encrypted", 19)) { @@ -4934,13 +4977,25 @@ constant (const char *name, size_t len) { /* AD_CERTIFICATE_EXPIRED AD_CERTIFICATE_REVOKED AD_CERTIFICATE_UNKNOWN ASN1_STRFLGS_ESC_QUOTE ERROR_WANT_X509_LOOKUP F_SSL_SESSION_PRINT_FP NID_netscape_cert_type NID_netscape_data_type NID_pkcs9_emailAddress - OPENSSL_VERSION_NUMBER OPENSSL_VERSION_STRING OP_NO_ENCRYPT_THEN_MAC - R_PEER_ERROR_NO_CIPHER SESS_CACHE_NO_INTERNAL SESS_CACHE_UPDATE_TIME - TLSEXT_STATUSTYPE_ocsp TLSEXT_TYPE_early_data V_OCSP_CERTSTATUS_GOOD - X509_TRUST_OBJECT_SIGN X509_V_ERR_UNSPECIFIED X509_V_FLAG_USE_DELTAS - XN_FLAG_SEP_COMMA_PLUS */ + OPENSSL_INIT_NO_ATEXIT OPENSSL_VERSION_NUMBER OPENSSL_VERSION_STRING + OP_NO_ENCRYPT_THEN_MAC R_PEER_ERROR_NO_CIPHER SESS_CACHE_NO_INTERNAL + SESS_CACHE_UPDATE_TIME TLSEXT_STATUSTYPE_ocsp TLSEXT_TYPE_early_data + V_OCSP_CERTSTATUS_GOOD X509_TRUST_OBJECT_SIGN X509_V_ERR_UNSPECIFIED + X509_V_FLAG_USE_DELTAS XN_FLAG_SEP_COMMA_PLUS */ /* Offset 18 gives the best switch position. */ switch (name[18]) { + case 'E': + if (!memcmp(name, "OPENSSL_INIT_NO_ATEXIT", 22)) { + /* ^ */ + +#ifdef OPENSSL_INIT_NO_ATEXIT + return OPENSSL_INIT_NO_ATEXIT; +#else + goto not_there; +#endif + + } + break; case 'F': if (!memcmp(name, "X509_V_ERR_UNSPECIFIED", 22)) { /* ^ */ @@ -5549,6 +5604,7 @@ constant (const char *name, size_t len) { NID_pbeWithMD5AndDES_CBC NID_pbeWithMD5AndRC2_CBC NID_shaWithRSAEncryption OPENSSL_INFO_ENGINES_DIR OPENSSL_INFO_MODULES_DIR OPENSSL_INFO_SEED_SOURCE + OPENSSL_INIT_ENGINE_CAPI OPENSSL_INIT_LOAD_CONFIG OP_IGNORE_UNEXPECTED_EOF OP_LEGACY_SERVER_CONNECT OP_MICROSOFT_SESS_ID_BUG OP_TLS_BLOCK_PADDING_BUG R_CHALLENGE_IS_DIFFERENT R_CIPHER_TABLE_SRC_ERROR @@ -5681,6 +5737,16 @@ constant (const char *name, size_t len) { #endif } + if (!memcmp(name, "OPENSSL_INIT_ENGINE_CAPI", 24)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_CAPI + return OPENSSL_INIT_ENGINE_CAPI; +#else + goto not_there; +#endif + + } if (!memcmp(name, "R_CIPHER_TABLE_SRC_ERROR", 24)) { /* ^ */ @@ -5715,6 +5781,16 @@ constant (const char *name, size_t len) { #endif } + if (!memcmp(name, "OPENSSL_INIT_LOAD_CONFIG", 24)) { + /* ^ */ + +#ifdef OPENSSL_INIT_LOAD_CONFIG + return OPENSSL_INIT_LOAD_CONFIG; +#else + goto not_there; +#endif + + } break; case 'M': if (!memcmp(name, "OPENSSL_INFO_MODULES_DIR", 24)) { @@ -5948,11 +6024,12 @@ constant (const char *name, size_t len) { break; case 25: /* Names all of length 25. */ - /* AD_INAPPROPRIATE_FALLBACK F_SSL_RSA_PRIVATE_DECRYPT - F_SSL_USE_PRIVATEKEY_ASN1 F_SSL_USE_PRIVATEKEY_FILE - MODE_ENABLE_PARTIAL_WRITE NID_pbeWithSHA1AndDES_CBC - NID_pbeWithSHA1AndRC2_CBC NID_sha1WithRSAEncryption - OPENSSL_INFO_CPU_SETTINGS OP_MSIE_SSLV2_RSA_PADDING + /* AD_INAPPROPRIATE_FALLBACK CONF_MFLAGS_IGNORE_ERRORS + F_SSL_RSA_PRIVATE_DECRYPT F_SSL_USE_PRIVATEKEY_ASN1 + F_SSL_USE_PRIVATEKEY_FILE MODE_ENABLE_PARTIAL_WRITE + NID_pbeWithSHA1AndDES_CBC NID_pbeWithSHA1AndRC2_CBC + NID_sha1WithRSAEncryption OPENSSL_INFO_CPU_SETTINGS + OPENSSL_INIT_ENGINE_AFALG OP_MSIE_SSLV2_RSA_PADDING OP_NETSCAPE_CHALLENGE_BUG OP_SAFARI_ECDHE_ECDSA_BUG R_BAD_AUTHENTICATION_TYPE SSL2_MT_CLIENT_MASTER_KEY SSL3_MT_END_OF_EARLY_DATA SSL3_MT_NEWSESSION_TICKET @@ -5979,6 +6056,16 @@ constant (const char *name, size_t len) { } break; case 'A': + if (!memcmp(name, "OPENSSL_INIT_ENGINE_AFALG", 25)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_AFALG + return OPENSSL_INIT_ENGINE_AFALG; +#else + goto not_there; +#endif + + } if (!memcmp(name, "OP_SAFARI_ECDHE_ECDSA_BUG", 25)) { /* ^ */ @@ -6161,6 +6248,16 @@ constant (const char *name, size_t len) { } break; case 'R': + if (!memcmp(name, "CONF_MFLAGS_IGNORE_ERRORS", 25)) { + /* ^ */ + +#ifdef CONF_MFLAGS_IGNORE_ERRORS + return CONF_MFLAGS_IGNORE_ERRORS; +#else + goto not_there; +#endif + + } if (!memcmp(name, "SSL2_MT_CLIENT_MASTER_KEY", 25)) { /* ^ */ @@ -6338,18 +6435,19 @@ constant (const char *name, size_t len) { NID_netscape_cert_sequence NID_organizationalUnitName NID_pbeWithMD5AndCast5_CBC NID_pkcs9_countersignature NID_pkcs9_unstructuredName NID_subject_key_identifier - OPENSSL_INFO_DSO_EXTENSION OP_DISABLE_TLSEXT_CA_NAMES - OP_ENABLE_MIDDLEBOX_COMPAT OP_NO_CLIENT_RENEGOTIATION - R_INVALID_CHALLENGE_LENGTH R_NO_CERTIFICATE_SPECIFIED - R_PUBLIC_KEY_ENCRYPT_ERROR SSL2_MT_CLIENT_CERTIFICATE - SSL3_MT_CERTIFICATE_STATUS SSL3_MT_CERTIFICATE_VERIFY - SSL3_MT_CHANGE_CIPHER_SPEC SSL3_RT_CHANGE_CIPHER_SPEC - SSL3_RT_INNER_CONTENT_TYPE TLSEXT_TYPE_next_proto_neg - TLSEXT_TYPE_session_ticket TLSEXT_TYPE_status_request - TLSEXT_TYPE_truncated_hmac X509_PURPOSE_NS_SSL_SERVER - X509_PURPOSE_SMIME_ENCRYPT X509_V_ERR_CRL_HAS_EXPIRED - X509_V_ERR_INVALID_PURPOSE X509_V_FLAG_SUITEB_128_LOS - X509_V_FLAG_SUITEB_192_LOS X509_V_FLAG_USE_CHECK_TIME */ + OPENSSL_INFO_DSO_EXTENSION OPENSSL_INIT_ENGINE_RDRAND + OP_DISABLE_TLSEXT_CA_NAMES OP_ENABLE_MIDDLEBOX_COMPAT + OP_NO_CLIENT_RENEGOTIATION R_INVALID_CHALLENGE_LENGTH + R_NO_CERTIFICATE_SPECIFIED R_PUBLIC_KEY_ENCRYPT_ERROR + SSL2_MT_CLIENT_CERTIFICATE SSL3_MT_CERTIFICATE_STATUS + SSL3_MT_CERTIFICATE_VERIFY SSL3_MT_CHANGE_CIPHER_SPEC + SSL3_RT_CHANGE_CIPHER_SPEC SSL3_RT_INNER_CONTENT_TYPE + TLSEXT_TYPE_next_proto_neg TLSEXT_TYPE_session_ticket + TLSEXT_TYPE_status_request TLSEXT_TYPE_truncated_hmac + X509_PURPOSE_NS_SSL_SERVER X509_PURPOSE_SMIME_ENCRYPT + X509_V_ERR_CRL_HAS_EXPIRED X509_V_ERR_INVALID_PURPOSE + X509_V_FLAG_SUITEB_128_LOS X509_V_FLAG_SUITEB_192_LOS + X509_V_FLAG_USE_CHECK_TIME */ /* Offset 20 gives the best switch position. */ switch (name[20]) { case '2': @@ -6523,6 +6621,16 @@ constant (const char *name, size_t len) { } break; case 'R': + if (!memcmp(name, "OPENSSL_INIT_ENGINE_RDRAND", 26)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_RDRAND + return OPENSSL_INIT_ENGINE_RDRAND; +#else + goto not_there; +#endif + + } if (!memcmp(name, "SSL3_MT_CHANGE_CIPHER_SPEC", 26)) { /* ^ */ @@ -6764,22 +6872,25 @@ constant (const char *name, size_t len) { break; case 27: /* Names all of length 27. */ - /* AD_CERTIFICATE_UNOBTAINABLE NID_crl_distribution_points - NID_netscape_cert_extension NID_netscape_revocation_url - NID_pbe_WithSHA1And40BitRC4 NID_pkcs9_challengePassword - NID_pkcs9_extCertAttributes NID_sha224WithRSAEncryption - NID_sha256WithRSAEncryption NID_sha384WithRSAEncryption - NID_sha512WithRSAEncryption OPENSSL_FULL_VERSION_STRING - OPENSSL_INFO_LIST_SEPARATOR OP_CIPHER_SERVER_PREFERENCE - OP_SSLEAY_080_CLIENT_DH_BUG R_BAD_SSL_SESSION_ID_LENGTH - R_UNKNOWN_REMOTE_ERROR_TYPE SSL2_MT_REQUEST_CERTIFICATE - SSL3_MT_CERTIFICATE_REQUEST SSL3_MT_CLIENT_KEY_EXCHANGE - SSL3_MT_SERVER_KEY_EXCHANGE TLSEXT_TYPE_elliptic_curves - TLSEXT_TYPE_trusted_ca_keys VERIFY_FAIL_IF_NO_PEER_CERT - X509_PURPOSE_TIMESTAMP_SIGN X509_V_ERR_CA_KEY_TOO_SMALL - X509_V_ERR_CERT_HAS_EXPIRED X509_V_ERR_EE_KEY_TOO_SMALL - X509_V_FLAG_CB_ISSUER_CHECK X509_V_FLAG_EXPLICIT_POLICY - X509_V_FLAG_IGNORE_CRITICAL XN_FLAG_DUMP_UNKNOWN_FIELDS */ + /* AD_CERTIFICATE_UNOBTAINABLE CONF_MFLAGS_DEFAULT_SECTION + NID_crl_distribution_points NID_netscape_cert_extension + NID_netscape_revocation_url NID_pbe_WithSHA1And40BitRC4 + NID_pkcs9_challengePassword NID_pkcs9_extCertAttributes + NID_sha224WithRSAEncryption NID_sha256WithRSAEncryption + NID_sha384WithRSAEncryption NID_sha512WithRSAEncryption + OPENSSL_FULL_VERSION_STRING OPENSSL_INFO_LIST_SEPARATOR + OPENSSL_INIT_ENGINE_DYNAMIC OPENSSL_INIT_ENGINE_OPENSSL + OPENSSL_INIT_ENGINE_PADLOCK OPENSSL_INIT_NO_LOAD_CONFIG + OP_CIPHER_SERVER_PREFERENCE OP_SSLEAY_080_CLIENT_DH_BUG + R_BAD_SSL_SESSION_ID_LENGTH R_UNKNOWN_REMOTE_ERROR_TYPE + SSL2_MT_REQUEST_CERTIFICATE SSL3_MT_CERTIFICATE_REQUEST + SSL3_MT_CLIENT_KEY_EXCHANGE SSL3_MT_SERVER_KEY_EXCHANGE + TLSEXT_TYPE_elliptic_curves TLSEXT_TYPE_trusted_ca_keys + VERIFY_FAIL_IF_NO_PEER_CERT X509_PURPOSE_TIMESTAMP_SIGN + X509_V_ERR_CA_KEY_TOO_SMALL X509_V_ERR_CERT_HAS_EXPIRED + X509_V_ERR_EE_KEY_TOO_SMALL X509_V_FLAG_CB_ISSUER_CHECK + X509_V_FLAG_EXPLICIT_POLICY X509_V_FLAG_IGNORE_CRITICAL + XN_FLAG_DUMP_UNKNOWN_FIELDS */ /* Offset 21 gives the best switch position. */ switch (name[21]) { case 'A': @@ -6793,6 +6904,16 @@ constant (const char *name, size_t len) { #endif } + if (!memcmp(name, "OPENSSL_INIT_ENGINE_PADLOCK", 27)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_PADLOCK + return OPENSSL_INIT_ENGINE_PADLOCK; +#else + goto not_there; +#endif + + } break; case 'B': if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC4", 27)) { @@ -6807,6 +6928,16 @@ constant (const char *name, size_t len) { } break; case 'C': + if (!memcmp(name, "OPENSSL_INIT_NO_LOAD_CONFIG", 27)) { + /* ^ */ + +#ifdef OPENSSL_INIT_NO_LOAD_CONFIG + return OPENSSL_INIT_NO_LOAD_CONFIG; +#else + goto not_there; +#endif + + } if (!memcmp(name, "SSL3_MT_CLIENT_KEY_EXCHANGE", 27)) { /* ^ */ @@ -6841,6 +6972,16 @@ constant (const char *name, size_t len) { } break; case 'E': + if (!memcmp(name, "CONF_MFLAGS_DEFAULT_SECTION", 27)) { + /* ^ */ + +#ifdef CONF_MFLAGS_DEFAULT_SECTION + return CONF_MFLAGS_DEFAULT_SECTION; +#else + goto not_there; +#endif + + } if (!memcmp(name, "OP_CIPHER_SERVER_PREFERENCE", 27)) { /* ^ */ @@ -6919,6 +7060,16 @@ constant (const char *name, size_t len) { } break; case 'P': + if (!memcmp(name, "OPENSSL_INIT_ENGINE_OPENSSL", 27)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_OPENSSL + return OPENSSL_INIT_ENGINE_OPENSSL; +#else + goto not_there; +#endif + + } if (!memcmp(name, "X509_PURPOSE_TIMESTAMP_SIGN", 27)) { /* ^ */ @@ -6986,6 +7137,18 @@ constant (const char *name, size_t len) { } break; + case 'Y': + if (!memcmp(name, "OPENSSL_INIT_ENGINE_DYNAMIC", 27)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_DYNAMIC + return OPENSSL_INIT_ENGINE_DYNAMIC; +#else + goto not_there; +#endif + + } + break; case '_': if (!memcmp(name, "X509_V_ERR_CA_KEY_TOO_SMALL", 27)) { /* ^ */ @@ -7151,7 +7314,8 @@ constant (const char *name, size_t len) { /* F_SSL_USE_RSAPRIVATEKEY_ASN1 F_SSL_USE_RSAPRIVATEKEY_FILE NID_authority_key_identifier NID_netscape_ssl_server_name NID_pbe_WithSHA1And128BitRC4 NID_pkcs7_signedAndEnveloped - NID_private_key_usage_period OP_NO_EXTENDED_MASTER_SECRET + NID_private_key_usage_period OPENSSL_INIT_ADD_ALL_CIPHERS + OPENSSL_INIT_ADD_ALL_DIGESTS OP_NO_EXTENDED_MASTER_SECRET SESS_CACHE_NO_INTERNAL_STORE SSL3_MT_ENCRYPTED_EXTENSIONS TLSEXT_TYPE_client_cert_type TLSEXT_TYPE_ec_point_formats TLSEXT_TYPE_encrypt_then_mac TLSEXT_TYPE_server_cert_type @@ -7196,6 +7360,28 @@ constant (const char *name, size_t len) { } break; + case 'D': + if (!memcmp(name, "OPENSSL_INIT_ADD_ALL_CIPHERS", 28)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ADD_ALL_CIPHERS + return OPENSSL_INIT_ADD_ALL_CIPHERS; +#else + goto not_there; +#endif + + } + if (!memcmp(name, "OPENSSL_INIT_ADD_ALL_DIGESTS", 28)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ADD_ALL_DIGESTS + return OPENSSL_INIT_ADD_ALL_DIGESTS; +#else + goto not_there; +#endif + + } + break; case 'E': if (!memcmp(name, "X509_V_ERR_UNNESTED_RESOURCE", 28)) { /* ^ */ @@ -7433,7 +7619,8 @@ constant (const char *name, size_t len) { case 29: /* Names all of length 29. */ /* AD_BAD_CERTIFICATE_HASH_VALUE NID_pkcs9_unstructuredAddress - OCSP_RESPONSE_STATUS_TRYLATER OP_ALLOW_CLIENT_RENEGOTIATION + OCSP_RESPONSE_STATUS_TRYLATER OPENSSL_INIT_ENGINE_CRYPTODEV + OPENSSL_INIT_LOAD_SSL_STRINGS OP_ALLOW_CLIENT_RENEGOTIATION OP_MICROSOFT_BIG_SSLV3_BUFFER R_SSL_SESSION_ID_IS_DIFFERENT SESS_CACHE_NO_INTERNAL_LOOKUP X509_V_ERR_AKID_SKID_MISMATCH X509_V_ERR_CERT_NOT_YET_VALID X509_V_ERR_EXCLUDED_VIOLATION @@ -7467,6 +7654,16 @@ constant (const char *name, size_t len) { } break; case 'D': + if (!memcmp(name, "OPENSSL_INIT_LOAD_SSL_STRINGS", 29)) { + /* ^ */ + +#ifdef OPENSSL_INIT_LOAD_SSL_STRINGS + return OPENSSL_INIT_LOAD_SSL_STRINGS; +#else + goto not_there; +#endif + + } if (!memcmp(name, "X509_V_ERR_EXCLUDED_VIOLATION", 29)) { /* ^ */ @@ -7478,6 +7675,18 @@ constant (const char *name, size_t len) { } break; + case 'I': + if (!memcmp(name, "OPENSSL_INIT_ENGINE_CRYPTODEV", 29)) { + /* ^ */ + +#ifdef OPENSSL_INIT_ENGINE_CRYPTODEV + return OPENSSL_INIT_ENGINE_CRYPTODEV; +#else + goto not_there; +#endif + + } + break; case 'N': if (!memcmp(name, "X509_V_ERR_CERT_NOT_YET_VALID", 29)) { /* ^ */ @@ -7751,30 +7960,66 @@ constant (const char *name, size_t len) { break; case 31: /* Names all of length 31. */ - /* MIN_RSA_MODULUS_LENGTH_IN_BYTES MODE_ACCEPT_MOVING_WRITE_BUFFER + /* CONF_MFLAGS_IGNORE_MISSING_FILE CONF_MFLAGS_IGNORE_RETURN_CODES + MIN_RSA_MODULUS_LENGTH_IN_BYTES MODE_ACCEPT_MOVING_WRITE_BUFFER NID_pbe_WithSHA1And40BitRC2_CBC NID_sha512_224WithRSAEncryption NID_sha512_256WithRSAEncryption OCSP_RESPONSE_STATUS_SUCCESSFUL + OPENSSL_INIT_NO_ADD_ALL_CIPHERS OPENSSL_INIT_NO_ADD_ALL_DIGESTS TLSEXT_TYPE_max_fragment_length TLSEXT_TYPE_post_handshake_auth X509_V_ERR_KEYUSAGE_NO_CERTSIGN X509_V_ERR_KEYUSAGE_NO_CRL_SIGN X509_V_ERR_NO_ISSUER_PUBLIC_KEY X509_V_ERR_PATH_LENGTH_EXCEEDED X509_V_FLAG_SUITEB_128_LOS_ONLY */ - /* Offset 25 gives the best switch position. */ - switch (name[25]) { - case 'B': - if (!memcmp(name, "MODE_ACCEPT_MOVING_WRITE_BUFFER", 31)) { - /* ^ */ + /* Offset 13 gives the best switch position. */ + switch (name[13]) { + case '4': + if (!memcmp(name, "NID_sha512_224WithRSAEncryption", 31)) { + /* ^ */ -#ifdef SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER - return SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER; +#ifdef NID_sha512_224WithRSAEncryption + return NID_sha512_224WithRSAEncryption; #else goto not_there; #endif } break; - case 'C': + case '6': + if (!memcmp(name, "NID_sha512_256WithRSAEncryption", 31)) { + /* ^ */ + +#ifdef NID_sha512_256WithRSAEncryption + return NID_sha512_256WithRSAEncryption; +#else + goto not_there; +#endif + + } + break; + case 'G': + if (!memcmp(name, "CONF_MFLAGS_IGNORE_MISSING_FILE", 31)) { + /* ^ */ + +#ifdef CONF_MFLAGS_IGNORE_MISSING_FILE + return CONF_MFLAGS_IGNORE_MISSING_FILE; +#else + goto not_there; +#endif + + } + if (!memcmp(name, "CONF_MFLAGS_IGNORE_RETURN_CODES", 31)) { + /* ^ */ + +#ifdef CONF_MFLAGS_IGNORE_RETURN_CODES + return CONF_MFLAGS_IGNORE_RETURN_CODES; +#else + goto not_there; +#endif + + } + break; + case 'H': if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC2_CBC", 31)) { - /* ^ */ + /* ^ */ #ifdef NID_pbe_WithSHA1And40BitRC2_CBC return NID_pbe_WithSHA1And40BitRC2_CBC; @@ -7783,68 +8028,66 @@ constant (const char *name, size_t len) { #endif } - if (!memcmp(name, "X509_V_ERR_PATH_LENGTH_EXCEEDED", 31)) { - /* ^ */ + break; + case 'N': + if (!memcmp(name, "OPENSSL_INIT_NO_ADD_ALL_CIPHERS", 31)) { + /* ^ */ -#ifdef X509_V_ERR_PATH_LENGTH_EXCEEDED - return X509_V_ERR_PATH_LENGTH_EXCEEDED; +#ifdef OPENSSL_INIT_NO_ADD_ALL_CIPHERS + return OPENSSL_INIT_NO_ADD_ALL_CIPHERS; #else goto not_there; #endif } - break; - case 'E': - if (!memcmp(name, "OCSP_RESPONSE_STATUS_SUCCESSFUL", 31)) { - /* ^ */ + if (!memcmp(name, "OPENSSL_INIT_NO_ADD_ALL_DIGESTS", 31)) { + /* ^ */ -#ifdef OCSP_RESPONSE_STATUS_SUCCESSFUL - return OCSP_RESPONSE_STATUS_SUCCESSFUL; +#ifdef OPENSSL_INIT_NO_ADD_ALL_DIGESTS + return OPENSSL_INIT_NO_ADD_ALL_DIGESTS; #else goto not_there; #endif } break; - case 'I': - if (!memcmp(name, "X509_V_ERR_NO_ISSUER_PUBLIC_KEY", 31)) { - /* ^ */ + case 'O': + if (!memcmp(name, "MODE_ACCEPT_MOVING_WRITE_BUFFER", 31)) { + /* ^ */ -#ifdef X509_V_ERR_NO_ISSUER_PUBLIC_KEY - return X509_V_ERR_NO_ISSUER_PUBLIC_KEY; +#ifdef SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER + return SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER; #else goto not_there; #endif } break; - case 'L': - if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CRL_SIGN", 31)) { - /* ^ */ + case 'T': + if (!memcmp(name, "X509_V_ERR_PATH_LENGTH_EXCEEDED", 31)) { + /* ^ */ -#ifdef X509_V_ERR_KEYUSAGE_NO_CRL_SIGN - return X509_V_ERR_KEYUSAGE_NO_CRL_SIGN; +#ifdef X509_V_ERR_PATH_LENGTH_EXCEEDED + return X509_V_ERR_PATH_LENGTH_EXCEEDED; #else goto not_there; #endif } break; - case 'R': - if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CERTSIGN", 31)) { - /* ^ */ + case 'U': + if (!memcmp(name, "MIN_RSA_MODULUS_LENGTH_IN_BYTES", 31)) { + /* ^ */ -#ifdef X509_V_ERR_KEYUSAGE_NO_CERTSIGN - return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; +#ifdef SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES + return SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES; #else goto not_there; #endif } - break; - case 'S': if (!memcmp(name, "X509_V_FLAG_SUITEB_128_LOS_ONLY", 31)) { - /* ^ */ + /* ^ */ #ifdef X509_V_FLAG_SUITEB_128_LOS_ONLY return X509_V_FLAG_SUITEB_128_LOS_ONLY; @@ -7854,58 +8097,68 @@ constant (const char *name, size_t len) { } break; - case '_': - if (!memcmp(name, "MIN_RSA_MODULUS_LENGTH_IN_BYTES", 31)) { - /* ^ */ + case 'Y': + if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CERTSIGN", 31)) { + /* ^ */ -#ifdef SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES - return SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES; +#ifdef X509_V_ERR_KEYUSAGE_NO_CERTSIGN + return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; #else goto not_there; #endif } - break; - case 'e': - if (!memcmp(name, "TLSEXT_TYPE_post_handshake_auth", 31)) { - /* ^ */ + if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CRL_SIGN", 31)) { + /* ^ */ -#ifdef TLSEXT_TYPE_post_handshake_auth - return TLSEXT_TYPE_post_handshake_auth; +#ifdef X509_V_ERR_KEYUSAGE_NO_CRL_SIGN + return X509_V_ERR_KEYUSAGE_NO_CRL_SIGN; #else goto not_there; #endif } break; - case 'l': - if (!memcmp(name, "TLSEXT_TYPE_max_fragment_length", 31)) { - /* ^ */ + case '_': + if (!memcmp(name, "OCSP_RESPONSE_STATUS_SUCCESSFUL", 31)) { + /* ^ */ -#ifdef TLSEXT_TYPE_max_fragment_length - return TLSEXT_TYPE_max_fragment_length; +#ifdef OCSP_RESPONSE_STATUS_SUCCESSFUL + return OCSP_RESPONSE_STATUS_SUCCESSFUL; +#else + goto not_there; +#endif + + } + if (!memcmp(name, "X509_V_ERR_NO_ISSUER_PUBLIC_KEY", 31)) { + /* ^ */ + +#ifdef X509_V_ERR_NO_ISSUER_PUBLIC_KEY + return X509_V_ERR_NO_ISSUER_PUBLIC_KEY; #else goto not_there; #endif } break; - case 'y': - if (!memcmp(name, "NID_sha512_224WithRSAEncryption", 31)) { - /* ^ */ + case 'a': + if (!memcmp(name, "TLSEXT_TYPE_max_fragment_length", 31)) { + /* ^ */ -#ifdef NID_sha512_224WithRSAEncryption - return NID_sha512_224WithRSAEncryption; +#ifdef TLSEXT_TYPE_max_fragment_length + return TLSEXT_TYPE_max_fragment_length; #else goto not_there; #endif } - if (!memcmp(name, "NID_sha512_256WithRSAEncryption", 31)) { - /* ^ */ + break; + case 'o': + if (!memcmp(name, "TLSEXT_TYPE_post_handshake_auth", 31)) { + /* ^ */ -#ifdef NID_sha512_256WithRSAEncryption - return NID_sha512_256WithRSAEncryption; +#ifdef TLSEXT_TYPE_post_handshake_auth + return TLSEXT_TYPE_post_handshake_auth; #else goto not_there; #endif @@ -7917,26 +8170,27 @@ constant (const char *name, size_t len) { case 32: /* Names all of length 32. */ /* NID_pbe_WithSHA1And128BitRC2_CBC OCSP_RESPONSE_STATUS_SIGREQUIRED + OPENSSL_INIT_LOAD_CRYPTO_STRINGS OPENSSL_INIT_NO_LOAD_SSL_STRINGS TLSEXT_TYPE_compress_certificate TLSEXT_TYPE_signature_algorithms X509_V_ERR_CA_BCONS_NOT_CRITICAL X509_V_ERR_CRL_SIGNATURE_FAILURE X509_V_ERR_SUITE_B_INVALID_CURVE X509_V_FLAG_EXTENDED_CRL_SUPPORT */ - /* Offset 21 gives the best switch position. */ - switch (name[21]) { - case '8': - if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC2_CBC", 32)) { - /* ^ */ + /* Offset 17 gives the best switch position. */ + switch (name[17]) { + case 'B': + if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_CURVE", 32)) { + /* ^ */ -#ifdef NID_pbe_WithSHA1And128BitRC2_CBC - return NID_pbe_WithSHA1And128BitRC2_CBC; +#ifdef X509_V_ERR_SUITE_B_INVALID_CURVE + return X509_V_ERR_SUITE_B_INVALID_CURVE; #else goto not_there; #endif } break; - case 'C': + case 'D': if (!memcmp(name, "X509_V_FLAG_EXTENDED_CRL_SUPPORT", 32)) { - /* ^ */ + /* ^ */ #ifdef X509_V_FLAG_EXTENDED_CRL_SUPPORT return X509_V_FLAG_EXTENDED_CRL_SUPPORT; @@ -7946,9 +8200,21 @@ constant (const char *name, size_t len) { } break; - case 'O': + case 'G': + if (!memcmp(name, "X509_V_ERR_CRL_SIGNATURE_FAILURE", 32)) { + /* ^ */ + +#ifdef X509_V_ERR_CRL_SIGNATURE_FAILURE + return X509_V_ERR_CRL_SIGNATURE_FAILURE; +#else + goto not_there; +#endif + + } + break; + case 'N': if (!memcmp(name, "X509_V_ERR_CA_BCONS_NOT_CRITICAL", 32)) { - /* ^ */ + /* ^ */ #ifdef X509_V_ERR_CA_BCONS_NOT_CRITICAL return X509_V_ERR_CA_BCONS_NOT_CRITICAL; @@ -7958,9 +8224,21 @@ constant (const char *name, size_t len) { } break; - case 'S': + case 'O': + if (!memcmp(name, "OPENSSL_INIT_NO_LOAD_SSL_STRINGS", 32)) { + /* ^ */ + +#ifdef OPENSSL_INIT_NO_LOAD_SSL_STRINGS + return OPENSSL_INIT_NO_LOAD_SSL_STRINGS; +#else + goto not_there; +#endif + + } + break; + case 'T': if (!memcmp(name, "OCSP_RESPONSE_STATUS_SIGREQUIRED", 32)) { - /* ^ */ + /* ^ */ #ifdef OCSP_RESPONSE_STATUS_SIGREQUIRED return OCSP_RESPONSE_STATUS_SIGREQUIRED; @@ -7970,48 +8248,48 @@ constant (const char *name, size_t len) { } break; - case 'U': - if (!memcmp(name, "X509_V_ERR_CRL_SIGNATURE_FAILURE", 32)) { - /* ^ */ + case '_': + if (!memcmp(name, "OPENSSL_INIT_LOAD_CRYPTO_STRINGS", 32)) { + /* ^ */ -#ifdef X509_V_ERR_CRL_SIGNATURE_FAILURE - return X509_V_ERR_CRL_SIGNATURE_FAILURE; +#ifdef OPENSSL_INIT_LOAD_CRYPTO_STRINGS + return OPENSSL_INIT_LOAD_CRYPTO_STRINGS; #else goto not_there; #endif } break; - case 'V': - if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_CURVE", 32)) { - /* ^ */ + case 'e': + if (!memcmp(name, "TLSEXT_TYPE_compress_certificate", 32)) { + /* ^ */ -#ifdef X509_V_ERR_SUITE_B_INVALID_CURVE - return X509_V_ERR_SUITE_B_INVALID_CURVE; +#ifdef TLSEXT_TYPE_compress_certificate + return TLSEXT_TYPE_compress_certificate; #else goto not_there; #endif } break; - case '_': - if (!memcmp(name, "TLSEXT_TYPE_signature_algorithms", 32)) { - /* ^ */ + case 'n': + if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC2_CBC", 32)) { + /* ^ */ -#ifdef TLSEXT_TYPE_signature_algorithms - return TLSEXT_TYPE_signature_algorithms; +#ifdef NID_pbe_WithSHA1And128BitRC2_CBC + return NID_pbe_WithSHA1And128BitRC2_CBC; #else goto not_there; #endif } break; - case 'c': - if (!memcmp(name, "TLSEXT_TYPE_compress_certificate", 32)) { - /* ^ */ + case 't': + if (!memcmp(name, "TLSEXT_TYPE_signature_algorithms", 32)) { + /* ^ */ -#ifdef TLSEXT_TYPE_compress_certificate - return TLSEXT_TYPE_compress_certificate; +#ifdef TLSEXT_TYPE_signature_algorithms + return TLSEXT_TYPE_signature_algorithms; #else goto not_there; #endif @@ -8197,40 +8475,53 @@ constant (const char *name, size_t len) { break; case 35: /* Names all of length 35. */ - /* OPENSSL_INFO_DIR_FILENAME_SEPARATOR OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - R_PEER_DID_NOT_RETURN_A_CERTIFICATE TLSEXT_TYPE_certificate_authorities - X509_CHECK_FLAG_NEVER_CHECK_SUBJECT X509_V_ERR_APPLICATION_VERIFICATION - X509_V_ERR_INVALID_POLICY_EXTENSION X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER - _NET_SSLEAY_TEST_UNDEFINED_CONSTANT */ - /* Offset 27 gives the best switch position. */ - switch (name[27]) { + /* OPENSSL_INFO_DIR_FILENAME_SEPARATOR OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS + OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG R_PEER_DID_NOT_RETURN_A_CERTIFICATE + TLSEXT_TYPE_certificate_authorities X509_CHECK_FLAG_NEVER_CHECK_SUBJECT + X509_V_ERR_APPLICATION_VERIFICATION X509_V_ERR_INVALID_POLICY_EXTENSION + X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER _NET_SSLEAY_TEST_UNDEFINED_CONSTANT + */ + /* Offset 14 gives the best switch position. */ + switch (name[14]) { case 'A': - if (!memcmp(name, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", 35)) { - /* ^ */ + if (!memcmp(name, "X509_V_ERR_INVALID_POLICY_EXTENSION", 35)) { + /* ^ */ -#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - return SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG; +#ifdef X509_V_ERR_INVALID_POLICY_EXTENSION + return X509_V_ERR_INVALID_POLICY_EXTENSION; #else goto not_there; #endif } break; - case 'C': - if (!memcmp(name, "_NET_SSLEAY_TEST_UNDEFINED_CONSTANT", 35)) { - /* ^ */ + case 'B': + if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER", 35)) { + /* ^ */ -#ifdef _NET_SSLEAY_TEST_UNDEFINED_CONSTANT - return _NET_SSLEAY_TEST_UNDEFINED_CONSTANT; +#ifdef X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER + return X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER; #else goto not_there; #endif } break; - case 'E': + case 'G': + if (!memcmp(name, "X509_CHECK_FLAG_NEVER_CHECK_SUBJECT", 35)) { + /* ^ */ + +#ifdef X509_CHECK_FLAG_NEVER_CHECK_SUBJECT + return X509_CHECK_FLAG_NEVER_CHECK_SUBJECT; +#else + goto not_there; +#endif + + } + break; + case 'I': if (!memcmp(name, "OPENSSL_INFO_DIR_FILENAME_SEPARATOR", 35)) { - /* ^ */ + /* ^ */ #ifdef OPENSSL_INFO_DIR_FILENAME_SEPARATOR return OPENSSL_INFO_DIR_FILENAME_SEPARATOR; @@ -8240,9 +8531,9 @@ constant (const char *name, size_t len) { } break; - case 'F': + case 'L': if (!memcmp(name, "X509_V_ERR_APPLICATION_VERIFICATION", 35)) { - /* ^ */ + /* ^ */ #ifdef X509_V_ERR_APPLICATION_VERIFICATION return X509_V_ERR_APPLICATION_VERIFICATION; @@ -8252,36 +8543,36 @@ constant (const char *name, size_t len) { } break; - case 'L': - if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER", 35)) { - /* ^ */ + case 'O': + if (!memcmp(name, "OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS", 35)) { + /* ^ */ -#ifdef X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER - return X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER; +#ifdef OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS + return OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS; #else goto not_there; #endif } break; - case 'T': - if (!memcmp(name, "R_PEER_DID_NOT_RETURN_A_CERTIFICATE", 35)) { - /* ^ */ + case 'S': + if (!memcmp(name, "_NET_SSLEAY_TEST_UNDEFINED_CONSTANT", 35)) { + /* ^ */ -#ifdef SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE - return SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE; +#ifdef _NET_SSLEAY_TEST_UNDEFINED_CONSTANT + return _NET_SSLEAY_TEST_UNDEFINED_CONSTANT; #else goto not_there; #endif } break; - case 'X': - if (!memcmp(name, "X509_V_ERR_INVALID_POLICY_EXTENSION", 35)) { - /* ^ */ + case 'U': + if (!memcmp(name, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", 35)) { + /* ^ */ -#ifdef X509_V_ERR_INVALID_POLICY_EXTENSION - return X509_V_ERR_INVALID_POLICY_EXTENSION; +#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG + return SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG; #else goto not_there; #endif @@ -8289,20 +8580,20 @@ constant (const char *name, size_t len) { } break; case '_': - if (!memcmp(name, "X509_CHECK_FLAG_NEVER_CHECK_SUBJECT", 35)) { - /* ^ */ + if (!memcmp(name, "R_PEER_DID_NOT_RETURN_A_CERTIFICATE", 35)) { + /* ^ */ -#ifdef X509_CHECK_FLAG_NEVER_CHECK_SUBJECT - return X509_CHECK_FLAG_NEVER_CHECK_SUBJECT; +#ifdef SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE + return SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE; #else goto not_there; #endif } break; - case 'h': + case 'r': if (!memcmp(name, "TLSEXT_TYPE_certificate_authorities", 35)) { - /* ^ */ + /* ^ */ #ifdef TLSEXT_TYPE_certificate_authorities return TLSEXT_TYPE_certificate_authorities; diff --git a/helper_script/constants.txt b/helper_script/constants.txt index 8a03bf3..dfbee0b 100644 --- a/helper_script/constants.txt +++ b/helper_script/constants.txt @@ -15,6 +15,12 @@ ASN1_STRFLGS_ESC_CTRL ASN1_STRFLGS_ESC_MSB ASN1_STRFLGS_ESC_QUOTE ASN1_STRFLGS_RFC2253 +CONF_MFLAGS_DEFAULT_SECTION +CONF_MFLAGS_IGNORE_ERRORS +CONF_MFLAGS_IGNORE_MISSING_FILE +CONF_MFLAGS_IGNORE_RETURN_CODES +CONF_MFLAGS_NO_DSO +CONF_MFLAGS_SILENT EVP_PKS_DSA EVP_PKS_EC EVP_PKS_RSA @@ -260,6 +266,26 @@ OPENSSL_INFO_ENGINES_DIR OPENSSL_INFO_LIST_SEPARATOR OPENSSL_INFO_MODULES_DIR OPENSSL_INFO_SEED_SOURCE +OPENSSL_INIT_ADD_ALL_CIPHERS +OPENSSL_INIT_ADD_ALL_DIGESTS +OPENSSL_INIT_ASYNC +OPENSSL_INIT_ATFORK +OPENSSL_INIT_ENGINE_AFALG +OPENSSL_INIT_ENGINE_CAPI +OPENSSL_INIT_ENGINE_CRYPTODEV +OPENSSL_INIT_ENGINE_DYNAMIC +OPENSSL_INIT_ENGINE_OPENSSL +OPENSSL_INIT_ENGINE_PADLOCK +OPENSSL_INIT_ENGINE_RDRAND +OPENSSL_INIT_LOAD_CONFIG +OPENSSL_INIT_LOAD_CRYPTO_STRINGS +OPENSSL_INIT_LOAD_SSL_STRINGS +OPENSSL_INIT_NO_ADD_ALL_CIPHERS +OPENSSL_INIT_NO_ADD_ALL_DIGESTS +OPENSSL_INIT_NO_ATEXIT +OPENSSL_INIT_NO_LOAD_CONFIG +OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS +OPENSSL_INIT_NO_LOAD_SSL_STRINGS OPENSSL_MODULES_DIR OPENSSL_PLATFORM OPENSSL_VERSION diff --git a/lib/Net/SSLeay.pm b/lib/Net/SSLeay.pm index ca12167..af2315b 100644 --- a/lib/Net/SSLeay.pm +++ b/lib/Net/SSLeay.pm @@ -135,6 +135,12 @@ my @constants = qw( CLIENT_HELLO_ERROR CLIENT_HELLO_RETRY CLIENT_HELLO_SUCCESS + CONF_MFLAGS_DEFAULT_SECTION + CONF_MFLAGS_IGNORE_ERRORS + CONF_MFLAGS_IGNORE_MISSING_FILE + CONF_MFLAGS_IGNORE_RETURN_CODES + CONF_MFLAGS_NO_DSO + CONF_MFLAGS_SILENT ERROR_NONE ERROR_SSL ERROR_SYSCALL @@ -438,6 +444,26 @@ my @constants = qw( OPENSSL_INFO_LIST_SEPARATOR OPENSSL_INFO_MODULES_DIR OPENSSL_INFO_SEED_SOURCE + OPENSSL_INIT_ADD_ALL_CIPHERS + OPENSSL_INIT_ADD_ALL_DIGESTS + OPENSSL_INIT_ASYNC + OPENSSL_INIT_ATFORK + OPENSSL_INIT_ENGINE_AFALG + OPENSSL_INIT_ENGINE_CAPI + OPENSSL_INIT_ENGINE_CRYPTODEV + OPENSSL_INIT_ENGINE_DYNAMIC + OPENSSL_INIT_ENGINE_OPENSSL + OPENSSL_INIT_ENGINE_PADLOCK + OPENSSL_INIT_ENGINE_RDRAND + OPENSSL_INIT_LOAD_CONFIG + OPENSSL_INIT_LOAD_CRYPTO_STRINGS + OPENSSL_INIT_LOAD_SSL_STRINGS + OPENSSL_INIT_NO_ADD_ALL_CIPHERS + OPENSSL_INIT_NO_ADD_ALL_DIGESTS + OPENSSL_INIT_NO_ATEXIT + OPENSSL_INIT_NO_LOAD_CONFIG + OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS + OPENSSL_INIT_NO_LOAD_SSL_STRINGS OPENSSL_MODULES_DIR OPENSSL_PLATFORM OPENSSL_VERSION diff --git a/lib/Net/SSLeay.pod b/lib/Net/SSLeay.pod index e96133d..926883b 100644 --- a/lib/Net/SSLeay.pod +++ b/lib/Net/SSLeay.pod @@ -10221,377 +10221,390 @@ helper_script/update-exported-constants. =for start_constants - AD_ACCESS_DENIED OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION - AD_BAD_CERTIFICATE OP_CIPHER_SERVER_PREFERENCE - AD_BAD_CERTIFICATE_HASH_VALUE OP_CISCO_ANYCONNECT - AD_BAD_CERTIFICATE_STATUS_RESPONSE OP_CLEANSE_PLAINTEXT - AD_BAD_RECORD_MAC OP_COOKIE_EXCHANGE - AD_CERTIFICATE_EXPIRED OP_CRYPTOPRO_TLSEXT_BUG - AD_CERTIFICATE_REQUIRED OP_DISABLE_TLSEXT_CA_NAMES - AD_CERTIFICATE_REVOKED OP_DONT_INSERT_EMPTY_FRAGMENTS - AD_CERTIFICATE_UNKNOWN OP_ENABLE_KTLS - AD_CERTIFICATE_UNOBTAINABLE OP_ENABLE_MIDDLEBOX_COMPAT - AD_CLOSE_NOTIFY OP_EPHEMERAL_RSA - AD_DECODE_ERROR OP_IGNORE_UNEXPECTED_EOF - AD_DECOMPRESSION_FAILURE OP_LEGACY_SERVER_CONNECT - AD_DECRYPTION_FAILED OP_MICROSOFT_BIG_SSLV3_BUFFER - AD_DECRYPT_ERROR OP_MICROSOFT_SESS_ID_BUG - AD_EXPORT_RESTRICTION OP_MSIE_SSLV2_RSA_PADDING - AD_HANDSHAKE_FAILURE OP_NETSCAPE_CA_DN_BUG - AD_ILLEGAL_PARAMETER OP_NETSCAPE_CHALLENGE_BUG - AD_INAPPROPRIATE_FALLBACK OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG - AD_INSUFFICIENT_SECURITY OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - AD_INTERNAL_ERROR OP_NON_EXPORT_FIRST - AD_MISSING_EXTENSION OP_NO_ANTI_REPLAY - AD_NO_APPLICATION_PROTOCOL OP_NO_CLIENT_RENEGOTIATION - AD_NO_CERTIFICATE OP_NO_COMPRESSION - AD_NO_RENEGOTIATION OP_NO_ENCRYPT_THEN_MAC - AD_PROTOCOL_VERSION OP_NO_EXTENDED_MASTER_SECRET - AD_RECORD_OVERFLOW OP_NO_QUERY_MTU - AD_UNEXPECTED_MESSAGE OP_NO_RENEGOTIATION - AD_UNKNOWN_CA OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION - AD_UNKNOWN_PSK_IDENTITY OP_NO_SSL_MASK - AD_UNRECOGNIZED_NAME OP_NO_SSLv2 - AD_UNSUPPORTED_CERTIFICATE OP_NO_SSLv3 - AD_UNSUPPORTED_EXTENSION OP_NO_TICKET - AD_USER_CANCELLED OP_NO_TLSv1 - ASN1_STRFLGS_ESC_CTRL OP_NO_TLSv1_1 - ASN1_STRFLGS_ESC_MSB OP_NO_TLSv1_2 - ASN1_STRFLGS_ESC_QUOTE OP_NO_TLSv1_3 - ASN1_STRFLGS_RFC2253 OP_PKCS1_CHECK_1 - ASYNC_NO_JOBS OP_PKCS1_CHECK_2 - ASYNC_PAUSED OP_PRIORITIZE_CHACHA - CB_ACCEPT_EXIT OP_SAFARI_ECDHE_ECDSA_BUG - CB_ACCEPT_LOOP OP_SINGLE_DH_USE - CB_ALERT OP_SINGLE_ECDH_USE - CB_CONNECT_EXIT OP_SSLEAY_080_CLIENT_DH_BUG - CB_CONNECT_LOOP OP_SSLREF2_REUSE_CERT_TYPE_BUG - CB_EXIT OP_TLSEXT_PADDING - CB_HANDSHAKE_DONE OP_TLS_BLOCK_PADDING_BUG - CB_HANDSHAKE_START OP_TLS_D5_BUG - CB_LOOP OP_TLS_ROLLBACK_BUG - CB_READ READING - CB_READ_ALERT RECEIVED_SHUTDOWN - CB_WRITE RETRY_VERIFY - CB_WRITE_ALERT RSA_3 - CLIENT_HELLO_CB RSA_F4 - CLIENT_HELLO_ERROR R_BAD_AUTHENTICATION_TYPE - CLIENT_HELLO_RETRY R_BAD_CHECKSUM - CLIENT_HELLO_SUCCESS R_BAD_MAC_DECODE - ERROR_NONE R_BAD_RESPONSE_ARGUMENT - ERROR_SSL R_BAD_SSL_FILETYPE - ERROR_SYSCALL R_BAD_SSL_SESSION_ID_LENGTH - ERROR_WANT_ACCEPT R_BAD_STATE - ERROR_WANT_ASYNC R_BAD_WRITE_RETRY - ERROR_WANT_ASYNC_JOB R_CHALLENGE_IS_DIFFERENT - ERROR_WANT_CLIENT_HELLO_CB R_CIPHER_TABLE_SRC_ERROR - ERROR_WANT_CONNECT R_INVALID_CHALLENGE_LENGTH - ERROR_WANT_READ R_NO_CERTIFICATE_SET - ERROR_WANT_RETRY_VERIFY R_NO_CERTIFICATE_SPECIFIED - ERROR_WANT_WRITE R_NO_CIPHER_LIST - ERROR_WANT_X509_LOOKUP R_NO_CIPHER_MATCH - ERROR_ZERO_RETURN R_NO_PRIVATEKEY - EVP_PKS_DSA R_NO_PUBLICKEY - EVP_PKS_EC R_NULL_SSL_CTX - EVP_PKS_RSA R_PEER_DID_NOT_RETURN_A_CERTIFICATE - EVP_PKT_ENC R_PEER_ERROR - EVP_PKT_EXCH R_PEER_ERROR_CERTIFICATE - EVP_PKT_EXP R_PEER_ERROR_NO_CIPHER - EVP_PKT_SIGN R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE - EVP_PK_DH R_PUBLIC_KEY_ENCRYPT_ERROR - EVP_PK_DSA R_PUBLIC_KEY_IS_NOT_RSA - EVP_PK_EC R_READ_WRONG_PACKET_TYPE - EVP_PK_RSA R_SHORT_READ - FILETYPE_ASN1 R_SSL_SESSION_ID_IS_DIFFERENT - FILETYPE_PEM R_UNABLE_TO_EXTRACT_PUBLIC_KEY - F_CLIENT_CERTIFICATE R_UNKNOWN_REMOTE_ERROR_TYPE - F_CLIENT_HELLO R_UNKNOWN_STATE - F_CLIENT_MASTER_KEY R_X509_LIB - F_D2I_SSL_SESSION SENT_SHUTDOWN - F_GET_CLIENT_FINISHED SESSION_ASN1_VERSION - F_GET_CLIENT_HELLO SESS_CACHE_BOTH - F_GET_CLIENT_MASTER_KEY SESS_CACHE_CLIENT - F_GET_SERVER_FINISHED SESS_CACHE_NO_AUTO_CLEAR - F_GET_SERVER_HELLO SESS_CACHE_NO_INTERNAL - F_GET_SERVER_VERIFY SESS_CACHE_NO_INTERNAL_LOOKUP - F_I2D_SSL_SESSION SESS_CACHE_NO_INTERNAL_STORE - F_READ_N SESS_CACHE_OFF - F_REQUEST_CERTIFICATE SESS_CACHE_SERVER - F_SERVER_HELLO SESS_CACHE_UPDATE_TIME - F_SSL_CERT_NEW SSL2_MT_CLIENT_CERTIFICATE - F_SSL_GET_NEW_SESSION SSL2_MT_CLIENT_FINISHED - F_SSL_NEW SSL2_MT_CLIENT_HELLO - F_SSL_READ SSL2_MT_CLIENT_MASTER_KEY - F_SSL_RSA_PRIVATE_DECRYPT SSL2_MT_ERROR - F_SSL_RSA_PUBLIC_ENCRYPT SSL2_MT_REQUEST_CERTIFICATE - F_SSL_SESSION_NEW SSL2_MT_SERVER_FINISHED - F_SSL_SESSION_PRINT_FP SSL2_MT_SERVER_HELLO - F_SSL_SET_FD SSL2_MT_SERVER_VERIFY - F_SSL_SET_RFD SSL2_VERSION - F_SSL_SET_WFD SSL3_MT_CCS - F_SSL_USE_CERTIFICATE SSL3_MT_CERTIFICATE - F_SSL_USE_CERTIFICATE_ASN1 SSL3_MT_CERTIFICATE_REQUEST - F_SSL_USE_CERTIFICATE_FILE SSL3_MT_CERTIFICATE_STATUS - F_SSL_USE_PRIVATEKEY SSL3_MT_CERTIFICATE_URL - F_SSL_USE_PRIVATEKEY_ASN1 SSL3_MT_CERTIFICATE_VERIFY - F_SSL_USE_PRIVATEKEY_FILE SSL3_MT_CHANGE_CIPHER_SPEC - F_SSL_USE_RSAPRIVATEKEY SSL3_MT_CLIENT_HELLO - F_SSL_USE_RSAPRIVATEKEY_ASN1 SSL3_MT_CLIENT_KEY_EXCHANGE - F_SSL_USE_RSAPRIVATEKEY_FILE SSL3_MT_ENCRYPTED_EXTENSIONS - F_WRITE_PENDING SSL3_MT_END_OF_EARLY_DATA - GEN_DIRNAME SSL3_MT_FINISHED - GEN_DNS SSL3_MT_HELLO_REQUEST - GEN_EDIPARTY SSL3_MT_KEY_UPDATE - GEN_EMAIL SSL3_MT_MESSAGE_HASH - GEN_IPADD SSL3_MT_NEWSESSION_TICKET - GEN_OTHERNAME SSL3_MT_NEXT_PROTO - GEN_RID SSL3_MT_SERVER_DONE - GEN_URI SSL3_MT_SERVER_HELLO - GEN_X400 SSL3_MT_SERVER_KEY_EXCHANGE - LIBRESSL_VERSION_NUMBER SSL3_MT_SUPPLEMENTAL_DATA - MBSTRING_ASC SSL3_RT_ALERT - MBSTRING_BMP SSL3_RT_APPLICATION_DATA - MBSTRING_FLAG SSL3_RT_CHANGE_CIPHER_SPEC - MBSTRING_UNIV SSL3_RT_HANDSHAKE - MBSTRING_UTF8 SSL3_RT_HEADER - MIN_RSA_MODULUS_LENGTH_IN_BYTES SSL3_RT_INNER_CONTENT_TYPE - MODE_ACCEPT_MOVING_WRITE_BUFFER SSL3_VERSION - MODE_ASYNC SSLEAY_BUILT_ON - MODE_AUTO_RETRY SSLEAY_CFLAGS - MODE_ENABLE_PARTIAL_WRITE SSLEAY_DIR - MODE_NO_AUTO_CHAIN SSLEAY_PLATFORM - MODE_RELEASE_BUFFERS SSLEAY_VERSION - NID_OCSP_sign ST_ACCEPT - NID_SMIMECapabilities ST_BEFORE - NID_X500 ST_CONNECT - NID_X509 ST_INIT - NID_ad_OCSP ST_OK - NID_ad_ca_issuers ST_READ_BODY - NID_algorithm ST_READ_HEADER - NID_authority_key_identifier TLS1_1_VERSION - NID_basic_constraints TLS1_2_VERSION - NID_bf_cbc TLS1_3_VERSION - NID_bf_cfb64 TLS1_VERSION - NID_bf_ecb TLSEXT_STATUSTYPE_ocsp - NID_bf_ofb64 TLSEXT_TYPE_application_layer_protocol_negotiation - NID_cast5_cbc TLSEXT_TYPE_cert_type - NID_cast5_cfb64 TLSEXT_TYPE_certificate_authorities - NID_cast5_ecb TLSEXT_TYPE_client_authz - NID_cast5_ofb64 TLSEXT_TYPE_client_cert_type - NID_certBag TLSEXT_TYPE_client_certificate_url - NID_certificate_policies TLSEXT_TYPE_compress_certificate - NID_client_auth TLSEXT_TYPE_cookie - NID_code_sign TLSEXT_TYPE_early_data - NID_commonName TLSEXT_TYPE_ec_point_formats - NID_countryName TLSEXT_TYPE_elliptic_curves - NID_crlBag TLSEXT_TYPE_encrypt_then_mac - NID_crl_distribution_points TLSEXT_TYPE_extended_master_secret - NID_crl_number TLSEXT_TYPE_key_share - NID_crl_reason TLSEXT_TYPE_max_fragment_length - NID_delta_crl TLSEXT_TYPE_next_proto_neg - NID_des_cbc TLSEXT_TYPE_padding - NID_des_cfb64 TLSEXT_TYPE_post_handshake_auth - NID_des_ecb TLSEXT_TYPE_psk - NID_des_ede TLSEXT_TYPE_psk_kex_modes - NID_des_ede3 TLSEXT_TYPE_quic_transport_parameters - NID_des_ede3_cbc TLSEXT_TYPE_renegotiate - NID_des_ede3_cfb64 TLSEXT_TYPE_server_authz - NID_des_ede3_ofb64 TLSEXT_TYPE_server_cert_type - NID_des_ede_cbc TLSEXT_TYPE_server_name - NID_des_ede_cfb64 TLSEXT_TYPE_session_ticket - NID_des_ede_ofb64 TLSEXT_TYPE_signature_algorithms - NID_des_ofb64 TLSEXT_TYPE_signature_algorithms_cert - NID_description TLSEXT_TYPE_signed_certificate_timestamp - NID_desx_cbc TLSEXT_TYPE_srp - NID_dhKeyAgreement TLSEXT_TYPE_status_request - NID_dnQualifier TLSEXT_TYPE_supported_groups - NID_dsa TLSEXT_TYPE_supported_versions - NID_dsaWithSHA TLSEXT_TYPE_truncated_hmac - NID_dsaWithSHA1 TLSEXT_TYPE_trusted_ca_keys - NID_dsaWithSHA1_2 TLSEXT_TYPE_use_srtp - NID_dsa_2 TLSEXT_TYPE_user_mapping - NID_email_protect VERIFY_CLIENT_ONCE - NID_ext_key_usage VERIFY_FAIL_IF_NO_PEER_CERT - NID_ext_req VERIFY_NONE - NID_friendlyName VERIFY_PEER - NID_givenName VERIFY_POST_HANDSHAKE - NID_hmacWithSHA1 V_OCSP_CERTSTATUS_GOOD - NID_id_ad V_OCSP_CERTSTATUS_REVOKED - NID_id_ce V_OCSP_CERTSTATUS_UNKNOWN - NID_id_kp WRITING - NID_id_pbkdf2 X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT - NID_id_pe X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS - NID_id_pkix X509_CHECK_FLAG_NEVER_CHECK_SUBJECT - NID_id_qt_cps X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS - NID_id_qt_unotice X509_CHECK_FLAG_NO_WILDCARDS - NID_idea_cbc X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS - NID_idea_cfb64 X509_CRL_VERSION_1 - NID_idea_ecb X509_CRL_VERSION_2 - NID_idea_ofb64 X509_FILETYPE_ASN1 - NID_info_access X509_FILETYPE_DEFAULT - NID_initials X509_FILETYPE_PEM - NID_invalidity_date X509_LOOKUP - NID_issuer_alt_name X509_PURPOSE_ANY - NID_keyBag X509_PURPOSE_CRL_SIGN - NID_key_usage X509_PURPOSE_NS_SSL_SERVER - NID_localKeyID X509_PURPOSE_OCSP_HELPER - NID_localityName X509_PURPOSE_SMIME_ENCRYPT - NID_md2 X509_PURPOSE_SMIME_SIGN - NID_md2WithRSAEncryption X509_PURPOSE_SSL_CLIENT - NID_md5 X509_PURPOSE_SSL_SERVER - NID_md5WithRSA X509_PURPOSE_TIMESTAMP_SIGN - NID_md5WithRSAEncryption X509_REQ_VERSION_1 - NID_md5_sha1 X509_REQ_VERSION_2 - NID_mdc2 X509_REQ_VERSION_3 - NID_mdc2WithRSA X509_TRUST_COMPAT - NID_ms_code_com X509_TRUST_DEFAULT - NID_ms_code_ind X509_TRUST_EMAIL - NID_ms_ctl_sign X509_TRUST_OBJECT_SIGN - NID_ms_efs X509_TRUST_OCSP_REQUEST - NID_ms_ext_req X509_TRUST_OCSP_SIGN - NID_ms_sgc X509_TRUST_SSL_CLIENT - NID_name X509_TRUST_SSL_SERVER - NID_netscape X509_TRUST_TSA - NID_netscape_base_url X509_VERSION_1 - NID_netscape_ca_policy_url X509_VERSION_2 - NID_netscape_ca_revocation_url X509_VERSION_3 - NID_netscape_cert_extension X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH - NID_netscape_cert_sequence X509_V_ERR_AKID_SKID_MISMATCH - NID_netscape_cert_type X509_V_ERR_APPLICATION_VERIFICATION - NID_netscape_comment X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL - NID_netscape_data_type X509_V_ERR_CA_BCONS_NOT_CRITICAL - NID_netscape_renewal_url X509_V_ERR_CA_CERT_MISSING_KEY_USAGE - NID_netscape_revocation_url X509_V_ERR_CA_KEY_TOO_SMALL - NID_netscape_ssl_server_name X509_V_ERR_CA_MD_TOO_WEAK - NID_ns_sgc X509_V_ERR_CERT_CHAIN_TOO_LONG - NID_organizationName X509_V_ERR_CERT_HAS_EXPIRED - NID_organizationalUnitName X509_V_ERR_CERT_NOT_YET_VALID - NID_pbeWithMD2AndDES_CBC X509_V_ERR_CERT_REJECTED - NID_pbeWithMD2AndRC2_CBC X509_V_ERR_CERT_REVOKED - NID_pbeWithMD5AndCast5_CBC X509_V_ERR_CERT_SIGNATURE_FAILURE - NID_pbeWithMD5AndDES_CBC X509_V_ERR_CERT_UNTRUSTED - NID_pbeWithMD5AndRC2_CBC X509_V_ERR_CRL_HAS_EXPIRED - NID_pbeWithSHA1AndDES_CBC X509_V_ERR_CRL_NOT_YET_VALID - NID_pbeWithSHA1AndRC2_CBC X509_V_ERR_CRL_PATH_VALIDATION_ERROR - NID_pbe_WithSHA1And128BitRC2_CBC X509_V_ERR_CRL_SIGNATURE_FAILURE - NID_pbe_WithSHA1And128BitRC4 X509_V_ERR_DANE_NO_MATCH - NID_pbe_WithSHA1And2_Key_TripleDES_CBC X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT - NID_pbe_WithSHA1And3_Key_TripleDES_CBC X509_V_ERR_DIFFERENT_CRL_SCOPE - NID_pbe_WithSHA1And40BitRC2_CBC X509_V_ERR_EC_KEY_EXPLICIT_PARAMS - NID_pbe_WithSHA1And40BitRC4 X509_V_ERR_EE_KEY_TOO_SMALL - NID_pbes2 X509_V_ERR_EMAIL_MISMATCH - NID_pbmac1 X509_V_ERR_EMPTY_SUBJECT_ALT_NAME - NID_pkcs X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL - NID_pkcs3 X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD - NID_pkcs7 X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD - NID_pkcs7_data X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD - NID_pkcs7_digest X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD - NID_pkcs7_encrypted X509_V_ERR_EXCLUDED_VIOLATION - NID_pkcs7_enveloped X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3 - NID_pkcs7_signed X509_V_ERR_HOSTNAME_MISMATCH - NID_pkcs7_signedAndEnveloped X509_V_ERR_INVALID_CA - NID_pkcs8ShroudedKeyBag X509_V_ERR_INVALID_CALL - NID_pkcs9 X509_V_ERR_INVALID_EXTENSION - NID_pkcs9_challengePassword X509_V_ERR_INVALID_NON_CA - NID_pkcs9_contentType X509_V_ERR_INVALID_POLICY_EXTENSION - NID_pkcs9_countersignature X509_V_ERR_INVALID_PURPOSE - NID_pkcs9_emailAddress X509_V_ERR_IP_ADDRESS_MISMATCH - NID_pkcs9_extCertAttributes X509_V_ERR_ISSUER_NAME_EMPTY - NID_pkcs9_messageDigest X509_V_ERR_KEYUSAGE_NO_CERTSIGN - NID_pkcs9_signingTime X509_V_ERR_KEYUSAGE_NO_CRL_SIGN - NID_pkcs9_unstructuredAddress X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE - NID_pkcs9_unstructuredName X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA - NID_private_key_usage_period X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER - NID_rc2_40_cbc X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER - NID_rc2_64_cbc X509_V_ERR_NO_EXPLICIT_POLICY - NID_rc2_cbc X509_V_ERR_NO_ISSUER_PUBLIC_KEY - NID_rc2_cfb64 X509_V_ERR_NO_VALID_SCTS - NID_rc2_ecb X509_V_ERR_OCSP_CERT_UNKNOWN - NID_rc2_ofb64 X509_V_ERR_OCSP_VERIFY_FAILED - NID_rc4 X509_V_ERR_OCSP_VERIFY_NEEDED - NID_rc4_40 X509_V_ERR_OUT_OF_MEM - NID_rc5_cbc X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA - NID_rc5_cfb64 X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN - NID_rc5_ecb X509_V_ERR_PATH_LENGTH_EXCEEDED - NID_rc5_ofb64 X509_V_ERR_PATH_LOOP - NID_ripemd160 X509_V_ERR_PERMITTED_VIOLATION - NID_ripemd160WithRSA X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED - NID_rle_compression X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED - NID_rsa X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION - NID_rsaEncryption X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN - NID_rsadsi X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY - NID_safeContentsBag X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH - NID_sdsiCertificate X509_V_ERR_STORE_LOOKUP - NID_secretBag X509_V_ERR_SUBJECT_ISSUER_MISMATCH - NID_serialNumber X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL - NID_server_auth X509_V_ERR_SUBJECT_NAME_EMPTY - NID_sha X509_V_ERR_SUBTREE_MINMAX - NID_sha1 X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 - NID_sha1WithRSA X509_V_ERR_SUITE_B_INVALID_ALGORITHM - NID_sha1WithRSAEncryption X509_V_ERR_SUITE_B_INVALID_CURVE - NID_sha224 X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM - NID_sha224WithRSAEncryption X509_V_ERR_SUITE_B_INVALID_VERSION - NID_sha256 X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED - NID_sha256WithRSAEncryption X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY - NID_sha384 X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE - NID_sha384WithRSAEncryption X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE - NID_sha3_224 X509_V_ERR_UNABLE_TO_GET_CRL - NID_sha3_256 X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER - NID_sha3_384 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT - NID_sha3_512 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY - NID_sha512 X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE - NID_sha512WithRSAEncryption X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION - NID_sha512_224 X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION - NID_sha512_224WithRSAEncryption X509_V_ERR_UNNESTED_RESOURCE - NID_sha512_256 X509_V_ERR_UNSPECIFIED - NID_sha512_256WithRSAEncryption X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX - NID_shaWithRSAEncryption X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE - NID_shake128 X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE - NID_shake256 X509_V_ERR_UNSUPPORTED_NAME_SYNTAX - NID_stateOrProvinceName X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM - NID_subject_alt_name X509_V_FLAG_ALLOW_PROXY_CERTS - NID_subject_key_identifier X509_V_FLAG_CB_ISSUER_CHECK - NID_surname X509_V_FLAG_CHECK_SS_SIGNATURE - NID_sxnet X509_V_FLAG_CRL_CHECK - NID_time_stamp X509_V_FLAG_CRL_CHECK_ALL - NID_title X509_V_FLAG_EXPLICIT_POLICY - NID_undef X509_V_FLAG_EXTENDED_CRL_SUPPORT - NID_uniqueIdentifier X509_V_FLAG_IGNORE_CRITICAL - NID_x509Certificate X509_V_FLAG_INHIBIT_ANY - NID_x509Crl X509_V_FLAG_INHIBIT_MAP - NID_zlib_compression X509_V_FLAG_LEGACY_VERIFY - NOTHING X509_V_FLAG_NOTIFY_POLICY - OCSP_RESPONSE_STATUS_INTERNALERROR X509_V_FLAG_NO_ALT_CHAINS - OCSP_RESPONSE_STATUS_MALFORMEDREQUEST X509_V_FLAG_NO_CHECK_TIME - OCSP_RESPONSE_STATUS_SIGREQUIRED X509_V_FLAG_PARTIAL_CHAIN - OCSP_RESPONSE_STATUS_SUCCESSFUL X509_V_FLAG_POLICY_CHECK - OCSP_RESPONSE_STATUS_TRYLATER X509_V_FLAG_POLICY_MASK - OCSP_RESPONSE_STATUS_UNAUTHORIZED X509_V_FLAG_SUITEB_128_LOS - OPENSSL_BUILT_ON X509_V_FLAG_SUITEB_128_LOS_ONLY - OPENSSL_CFLAGS X509_V_FLAG_SUITEB_192_LOS - OPENSSL_CPU_INFO X509_V_FLAG_TRUSTED_FIRST - OPENSSL_DIR X509_V_FLAG_USE_CHECK_TIME - OPENSSL_ENGINES_DIR X509_V_FLAG_USE_DELTAS - OPENSSL_FULL_VERSION_STRING X509_V_FLAG_X509_STRICT - OPENSSL_INFO_CONFIG_DIR X509_V_OK - OPENSSL_INFO_CPU_SETTINGS XN_FLAG_COMPAT - OPENSSL_INFO_DIR_FILENAME_SEPARATOR XN_FLAG_DN_REV - OPENSSL_INFO_DSO_EXTENSION XN_FLAG_DUMP_UNKNOWN_FIELDS - OPENSSL_INFO_ENGINES_DIR XN_FLAG_FN_ALIGN - OPENSSL_INFO_LIST_SEPARATOR XN_FLAG_FN_LN - OPENSSL_INFO_MODULES_DIR XN_FLAG_FN_MASK - OPENSSL_INFO_SEED_SOURCE XN_FLAG_FN_NONE - OPENSSL_MODULES_DIR XN_FLAG_FN_OID - OPENSSL_PLATFORM XN_FLAG_FN_SN - OPENSSL_VERSION XN_FLAG_MULTILINE - OPENSSL_VERSION_MAJOR XN_FLAG_ONELINE - OPENSSL_VERSION_MINOR XN_FLAG_RFC2253 - OPENSSL_VERSION_NUMBER XN_FLAG_SEP_COMMA_PLUS - OPENSSL_VERSION_PATCH XN_FLAG_SEP_CPLUS_SPC - OPENSSL_VERSION_STRING XN_FLAG_SEP_MASK - OP_ALL XN_FLAG_SEP_MULTILINE - OP_ALLOW_CLIENT_RENEGOTIATION XN_FLAG_SEP_SPLUS_SPC - OP_ALLOW_NO_DHE_KEX XN_FLAG_SPC_EQ + AD_ACCESS_DENIED OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS + AD_BAD_CERTIFICATE OPENSSL_INIT_NO_LOAD_SSL_STRINGS + AD_BAD_CERTIFICATE_HASH_VALUE OPENSSL_MODULES_DIR + AD_BAD_CERTIFICATE_STATUS_RESPONSE OPENSSL_PLATFORM + AD_BAD_RECORD_MAC OPENSSL_VERSION + AD_CERTIFICATE_EXPIRED OPENSSL_VERSION_MAJOR + AD_CERTIFICATE_REQUIRED OPENSSL_VERSION_MINOR + AD_CERTIFICATE_REVOKED OPENSSL_VERSION_NUMBER + AD_CERTIFICATE_UNKNOWN OPENSSL_VERSION_PATCH + AD_CERTIFICATE_UNOBTAINABLE OPENSSL_VERSION_STRING + AD_CLOSE_NOTIFY OP_ALL + AD_DECODE_ERROR OP_ALLOW_CLIENT_RENEGOTIATION + AD_DECOMPRESSION_FAILURE OP_ALLOW_NO_DHE_KEX + AD_DECRYPTION_FAILED OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION + AD_DECRYPT_ERROR OP_CIPHER_SERVER_PREFERENCE + AD_EXPORT_RESTRICTION OP_CISCO_ANYCONNECT + AD_HANDSHAKE_FAILURE OP_CLEANSE_PLAINTEXT + AD_ILLEGAL_PARAMETER OP_COOKIE_EXCHANGE + AD_INAPPROPRIATE_FALLBACK OP_CRYPTOPRO_TLSEXT_BUG + AD_INSUFFICIENT_SECURITY OP_DISABLE_TLSEXT_CA_NAMES + AD_INTERNAL_ERROR OP_DONT_INSERT_EMPTY_FRAGMENTS + AD_MISSING_EXTENSION OP_ENABLE_KTLS + AD_NO_APPLICATION_PROTOCOL OP_ENABLE_MIDDLEBOX_COMPAT + AD_NO_CERTIFICATE OP_EPHEMERAL_RSA + AD_NO_RENEGOTIATION OP_IGNORE_UNEXPECTED_EOF + AD_PROTOCOL_VERSION OP_LEGACY_SERVER_CONNECT + AD_RECORD_OVERFLOW OP_MICROSOFT_BIG_SSLV3_BUFFER + AD_UNEXPECTED_MESSAGE OP_MICROSOFT_SESS_ID_BUG + AD_UNKNOWN_CA OP_MSIE_SSLV2_RSA_PADDING + AD_UNKNOWN_PSK_IDENTITY OP_NETSCAPE_CA_DN_BUG + AD_UNRECOGNIZED_NAME OP_NETSCAPE_CHALLENGE_BUG + AD_UNSUPPORTED_CERTIFICATE OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG + AD_UNSUPPORTED_EXTENSION OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG + AD_USER_CANCELLED OP_NON_EXPORT_FIRST + ASN1_STRFLGS_ESC_CTRL OP_NO_ANTI_REPLAY + ASN1_STRFLGS_ESC_MSB OP_NO_CLIENT_RENEGOTIATION + ASN1_STRFLGS_ESC_QUOTE OP_NO_COMPRESSION + ASN1_STRFLGS_RFC2253 OP_NO_ENCRYPT_THEN_MAC + ASYNC_NO_JOBS OP_NO_EXTENDED_MASTER_SECRET + ASYNC_PAUSED OP_NO_QUERY_MTU + CB_ACCEPT_EXIT OP_NO_RENEGOTIATION + CB_ACCEPT_LOOP OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION + CB_ALERT OP_NO_SSL_MASK + CB_CONNECT_EXIT OP_NO_SSLv2 + CB_CONNECT_LOOP OP_NO_SSLv3 + CB_EXIT OP_NO_TICKET + CB_HANDSHAKE_DONE OP_NO_TLSv1 + CB_HANDSHAKE_START OP_NO_TLSv1_1 + CB_LOOP OP_NO_TLSv1_2 + CB_READ OP_NO_TLSv1_3 + CB_READ_ALERT OP_PKCS1_CHECK_1 + CB_WRITE OP_PKCS1_CHECK_2 + CB_WRITE_ALERT OP_PRIORITIZE_CHACHA + CLIENT_HELLO_CB OP_SAFARI_ECDHE_ECDSA_BUG + CLIENT_HELLO_ERROR OP_SINGLE_DH_USE + CLIENT_HELLO_RETRY OP_SINGLE_ECDH_USE + CLIENT_HELLO_SUCCESS OP_SSLEAY_080_CLIENT_DH_BUG + CONF_MFLAGS_DEFAULT_SECTION OP_SSLREF2_REUSE_CERT_TYPE_BUG + CONF_MFLAGS_IGNORE_ERRORS OP_TLSEXT_PADDING + CONF_MFLAGS_IGNORE_MISSING_FILE OP_TLS_BLOCK_PADDING_BUG + CONF_MFLAGS_IGNORE_RETURN_CODES OP_TLS_D5_BUG + CONF_MFLAGS_NO_DSO OP_TLS_ROLLBACK_BUG + CONF_MFLAGS_SILENT READING + ERROR_NONE RECEIVED_SHUTDOWN + ERROR_SSL RETRY_VERIFY + ERROR_SYSCALL RSA_3 + ERROR_WANT_ACCEPT RSA_F4 + ERROR_WANT_ASYNC R_BAD_AUTHENTICATION_TYPE + ERROR_WANT_ASYNC_JOB R_BAD_CHECKSUM + ERROR_WANT_CLIENT_HELLO_CB R_BAD_MAC_DECODE + ERROR_WANT_CONNECT R_BAD_RESPONSE_ARGUMENT + ERROR_WANT_READ R_BAD_SSL_FILETYPE + ERROR_WANT_RETRY_VERIFY R_BAD_SSL_SESSION_ID_LENGTH + ERROR_WANT_WRITE R_BAD_STATE + ERROR_WANT_X509_LOOKUP R_BAD_WRITE_RETRY + ERROR_ZERO_RETURN R_CHALLENGE_IS_DIFFERENT + EVP_PKS_DSA R_CIPHER_TABLE_SRC_ERROR + EVP_PKS_EC R_INVALID_CHALLENGE_LENGTH + EVP_PKS_RSA R_NO_CERTIFICATE_SET + EVP_PKT_ENC R_NO_CERTIFICATE_SPECIFIED + EVP_PKT_EXCH R_NO_CIPHER_LIST + EVP_PKT_EXP R_NO_CIPHER_MATCH + EVP_PKT_SIGN R_NO_PRIVATEKEY + EVP_PK_DH R_NO_PUBLICKEY + EVP_PK_DSA R_NULL_SSL_CTX + EVP_PK_EC R_PEER_DID_NOT_RETURN_A_CERTIFICATE + EVP_PK_RSA R_PEER_ERROR + FILETYPE_ASN1 R_PEER_ERROR_CERTIFICATE + FILETYPE_PEM R_PEER_ERROR_NO_CIPHER + F_CLIENT_CERTIFICATE R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE + F_CLIENT_HELLO R_PUBLIC_KEY_ENCRYPT_ERROR + F_CLIENT_MASTER_KEY R_PUBLIC_KEY_IS_NOT_RSA + F_D2I_SSL_SESSION R_READ_WRONG_PACKET_TYPE + F_GET_CLIENT_FINISHED R_SHORT_READ + F_GET_CLIENT_HELLO R_SSL_SESSION_ID_IS_DIFFERENT + F_GET_CLIENT_MASTER_KEY R_UNABLE_TO_EXTRACT_PUBLIC_KEY + F_GET_SERVER_FINISHED R_UNKNOWN_REMOTE_ERROR_TYPE + F_GET_SERVER_HELLO R_UNKNOWN_STATE + F_GET_SERVER_VERIFY R_X509_LIB + F_I2D_SSL_SESSION SENT_SHUTDOWN + F_READ_N SESSION_ASN1_VERSION + F_REQUEST_CERTIFICATE SESS_CACHE_BOTH + F_SERVER_HELLO SESS_CACHE_CLIENT + F_SSL_CERT_NEW SESS_CACHE_NO_AUTO_CLEAR + F_SSL_GET_NEW_SESSION SESS_CACHE_NO_INTERNAL + F_SSL_NEW SESS_CACHE_NO_INTERNAL_LOOKUP + F_SSL_READ SESS_CACHE_NO_INTERNAL_STORE + F_SSL_RSA_PRIVATE_DECRYPT SESS_CACHE_OFF + F_SSL_RSA_PUBLIC_ENCRYPT SESS_CACHE_SERVER + F_SSL_SESSION_NEW SESS_CACHE_UPDATE_TIME + F_SSL_SESSION_PRINT_FP SSL2_MT_CLIENT_CERTIFICATE + F_SSL_SET_FD SSL2_MT_CLIENT_FINISHED + F_SSL_SET_RFD SSL2_MT_CLIENT_HELLO + F_SSL_SET_WFD SSL2_MT_CLIENT_MASTER_KEY + F_SSL_USE_CERTIFICATE SSL2_MT_ERROR + F_SSL_USE_CERTIFICATE_ASN1 SSL2_MT_REQUEST_CERTIFICATE + F_SSL_USE_CERTIFICATE_FILE SSL2_MT_SERVER_FINISHED + F_SSL_USE_PRIVATEKEY SSL2_MT_SERVER_HELLO + F_SSL_USE_PRIVATEKEY_ASN1 SSL2_MT_SERVER_VERIFY + F_SSL_USE_PRIVATEKEY_FILE SSL2_VERSION + F_SSL_USE_RSAPRIVATEKEY SSL3_MT_CCS + F_SSL_USE_RSAPRIVATEKEY_ASN1 SSL3_MT_CERTIFICATE + F_SSL_USE_RSAPRIVATEKEY_FILE SSL3_MT_CERTIFICATE_REQUEST + F_WRITE_PENDING SSL3_MT_CERTIFICATE_STATUS + GEN_DIRNAME SSL3_MT_CERTIFICATE_URL + GEN_DNS SSL3_MT_CERTIFICATE_VERIFY + GEN_EDIPARTY SSL3_MT_CHANGE_CIPHER_SPEC + GEN_EMAIL SSL3_MT_CLIENT_HELLO + GEN_IPADD SSL3_MT_CLIENT_KEY_EXCHANGE + GEN_OTHERNAME SSL3_MT_ENCRYPTED_EXTENSIONS + GEN_RID SSL3_MT_END_OF_EARLY_DATA + GEN_URI SSL3_MT_FINISHED + GEN_X400 SSL3_MT_HELLO_REQUEST + LIBRESSL_VERSION_NUMBER SSL3_MT_KEY_UPDATE + MBSTRING_ASC SSL3_MT_MESSAGE_HASH + MBSTRING_BMP SSL3_MT_NEWSESSION_TICKET + MBSTRING_FLAG SSL3_MT_NEXT_PROTO + MBSTRING_UNIV SSL3_MT_SERVER_DONE + MBSTRING_UTF8 SSL3_MT_SERVER_HELLO + MIN_RSA_MODULUS_LENGTH_IN_BYTES SSL3_MT_SERVER_KEY_EXCHANGE + MODE_ACCEPT_MOVING_WRITE_BUFFER SSL3_MT_SUPPLEMENTAL_DATA + MODE_ASYNC SSL3_RT_ALERT + MODE_AUTO_RETRY SSL3_RT_APPLICATION_DATA + MODE_ENABLE_PARTIAL_WRITE SSL3_RT_CHANGE_CIPHER_SPEC + MODE_NO_AUTO_CHAIN SSL3_RT_HANDSHAKE + MODE_RELEASE_BUFFERS SSL3_RT_HEADER + NID_OCSP_sign SSL3_RT_INNER_CONTENT_TYPE + NID_SMIMECapabilities SSL3_VERSION + NID_X500 SSLEAY_BUILT_ON + NID_X509 SSLEAY_CFLAGS + NID_ad_OCSP SSLEAY_DIR + NID_ad_ca_issuers SSLEAY_PLATFORM + NID_algorithm SSLEAY_VERSION + NID_authority_key_identifier ST_ACCEPT + NID_basic_constraints ST_BEFORE + NID_bf_cbc ST_CONNECT + NID_bf_cfb64 ST_INIT + NID_bf_ecb ST_OK + NID_bf_ofb64 ST_READ_BODY + NID_cast5_cbc ST_READ_HEADER + NID_cast5_cfb64 TLS1_1_VERSION + NID_cast5_ecb TLS1_2_VERSION + NID_cast5_ofb64 TLS1_3_VERSION + NID_certBag TLS1_VERSION + NID_certificate_policies TLSEXT_STATUSTYPE_ocsp + NID_client_auth TLSEXT_TYPE_application_layer_protocol_negotiation + NID_code_sign TLSEXT_TYPE_cert_type + NID_commonName TLSEXT_TYPE_certificate_authorities + NID_countryName TLSEXT_TYPE_client_authz + NID_crlBag TLSEXT_TYPE_client_cert_type + NID_crl_distribution_points TLSEXT_TYPE_client_certificate_url + NID_crl_number TLSEXT_TYPE_compress_certificate + NID_crl_reason TLSEXT_TYPE_cookie + NID_delta_crl TLSEXT_TYPE_early_data + NID_des_cbc TLSEXT_TYPE_ec_point_formats + NID_des_cfb64 TLSEXT_TYPE_elliptic_curves + NID_des_ecb TLSEXT_TYPE_encrypt_then_mac + NID_des_ede TLSEXT_TYPE_extended_master_secret + NID_des_ede3 TLSEXT_TYPE_key_share + NID_des_ede3_cbc TLSEXT_TYPE_max_fragment_length + NID_des_ede3_cfb64 TLSEXT_TYPE_next_proto_neg + NID_des_ede3_ofb64 TLSEXT_TYPE_padding + NID_des_ede_cbc TLSEXT_TYPE_post_handshake_auth + NID_des_ede_cfb64 TLSEXT_TYPE_psk + NID_des_ede_ofb64 TLSEXT_TYPE_psk_kex_modes + NID_des_ofb64 TLSEXT_TYPE_quic_transport_parameters + NID_description TLSEXT_TYPE_renegotiate + NID_desx_cbc TLSEXT_TYPE_server_authz + NID_dhKeyAgreement TLSEXT_TYPE_server_cert_type + NID_dnQualifier TLSEXT_TYPE_server_name + NID_dsa TLSEXT_TYPE_session_ticket + NID_dsaWithSHA TLSEXT_TYPE_signature_algorithms + NID_dsaWithSHA1 TLSEXT_TYPE_signature_algorithms_cert + NID_dsaWithSHA1_2 TLSEXT_TYPE_signed_certificate_timestamp + NID_dsa_2 TLSEXT_TYPE_srp + NID_email_protect TLSEXT_TYPE_status_request + NID_ext_key_usage TLSEXT_TYPE_supported_groups + NID_ext_req TLSEXT_TYPE_supported_versions + NID_friendlyName TLSEXT_TYPE_truncated_hmac + NID_givenName TLSEXT_TYPE_trusted_ca_keys + NID_hmacWithSHA1 TLSEXT_TYPE_use_srtp + NID_id_ad TLSEXT_TYPE_user_mapping + NID_id_ce VERIFY_CLIENT_ONCE + NID_id_kp VERIFY_FAIL_IF_NO_PEER_CERT + NID_id_pbkdf2 VERIFY_NONE + NID_id_pe VERIFY_PEER + NID_id_pkix VERIFY_POST_HANDSHAKE + NID_id_qt_cps V_OCSP_CERTSTATUS_GOOD + NID_id_qt_unotice V_OCSP_CERTSTATUS_REVOKED + NID_idea_cbc V_OCSP_CERTSTATUS_UNKNOWN + NID_idea_cfb64 WRITING + NID_idea_ecb X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT + NID_idea_ofb64 X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS + NID_info_access X509_CHECK_FLAG_NEVER_CHECK_SUBJECT + NID_initials X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS + NID_invalidity_date X509_CHECK_FLAG_NO_WILDCARDS + NID_issuer_alt_name X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS + NID_keyBag X509_CRL_VERSION_1 + NID_key_usage X509_CRL_VERSION_2 + NID_localKeyID X509_FILETYPE_ASN1 + NID_localityName X509_FILETYPE_DEFAULT + NID_md2 X509_FILETYPE_PEM + NID_md2WithRSAEncryption X509_LOOKUP + NID_md5 X509_PURPOSE_ANY + NID_md5WithRSA X509_PURPOSE_CRL_SIGN + NID_md5WithRSAEncryption X509_PURPOSE_NS_SSL_SERVER + NID_md5_sha1 X509_PURPOSE_OCSP_HELPER + NID_mdc2 X509_PURPOSE_SMIME_ENCRYPT + NID_mdc2WithRSA X509_PURPOSE_SMIME_SIGN + NID_ms_code_com X509_PURPOSE_SSL_CLIENT + NID_ms_code_ind X509_PURPOSE_SSL_SERVER + NID_ms_ctl_sign X509_PURPOSE_TIMESTAMP_SIGN + NID_ms_efs X509_REQ_VERSION_1 + NID_ms_ext_req X509_REQ_VERSION_2 + NID_ms_sgc X509_REQ_VERSION_3 + NID_name X509_TRUST_COMPAT + NID_netscape X509_TRUST_DEFAULT + NID_netscape_base_url X509_TRUST_EMAIL + NID_netscape_ca_policy_url X509_TRUST_OBJECT_SIGN + NID_netscape_ca_revocation_url X509_TRUST_OCSP_REQUEST + NID_netscape_cert_extension X509_TRUST_OCSP_SIGN + NID_netscape_cert_sequence X509_TRUST_SSL_CLIENT + NID_netscape_cert_type X509_TRUST_SSL_SERVER + NID_netscape_comment X509_TRUST_TSA + NID_netscape_data_type X509_VERSION_1 + NID_netscape_renewal_url X509_VERSION_2 + NID_netscape_revocation_url X509_VERSION_3 + NID_netscape_ssl_server_name X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH + NID_ns_sgc X509_V_ERR_AKID_SKID_MISMATCH + NID_organizationName X509_V_ERR_APPLICATION_VERIFICATION + NID_organizationalUnitName X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL + NID_pbeWithMD2AndDES_CBC X509_V_ERR_CA_BCONS_NOT_CRITICAL + NID_pbeWithMD2AndRC2_CBC X509_V_ERR_CA_CERT_MISSING_KEY_USAGE + NID_pbeWithMD5AndCast5_CBC X509_V_ERR_CA_KEY_TOO_SMALL + NID_pbeWithMD5AndDES_CBC X509_V_ERR_CA_MD_TOO_WEAK + NID_pbeWithMD5AndRC2_CBC X509_V_ERR_CERT_CHAIN_TOO_LONG + NID_pbeWithSHA1AndDES_CBC X509_V_ERR_CERT_HAS_EXPIRED + NID_pbeWithSHA1AndRC2_CBC X509_V_ERR_CERT_NOT_YET_VALID + NID_pbe_WithSHA1And128BitRC2_CBC X509_V_ERR_CERT_REJECTED + NID_pbe_WithSHA1And128BitRC4 X509_V_ERR_CERT_REVOKED + NID_pbe_WithSHA1And2_Key_TripleDES_CBC X509_V_ERR_CERT_SIGNATURE_FAILURE + NID_pbe_WithSHA1And3_Key_TripleDES_CBC X509_V_ERR_CERT_UNTRUSTED + NID_pbe_WithSHA1And40BitRC2_CBC X509_V_ERR_CRL_HAS_EXPIRED + NID_pbe_WithSHA1And40BitRC4 X509_V_ERR_CRL_NOT_YET_VALID + NID_pbes2 X509_V_ERR_CRL_PATH_VALIDATION_ERROR + NID_pbmac1 X509_V_ERR_CRL_SIGNATURE_FAILURE + NID_pkcs X509_V_ERR_DANE_NO_MATCH + NID_pkcs3 X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT + NID_pkcs7 X509_V_ERR_DIFFERENT_CRL_SCOPE + NID_pkcs7_data X509_V_ERR_EC_KEY_EXPLICIT_PARAMS + NID_pkcs7_digest X509_V_ERR_EE_KEY_TOO_SMALL + NID_pkcs7_encrypted X509_V_ERR_EMAIL_MISMATCH + NID_pkcs7_enveloped X509_V_ERR_EMPTY_SUBJECT_ALT_NAME + NID_pkcs7_signed X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL + NID_pkcs7_signedAndEnveloped X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD + NID_pkcs8ShroudedKeyBag X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD + NID_pkcs9 X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD + NID_pkcs9_challengePassword X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD + NID_pkcs9_contentType X509_V_ERR_EXCLUDED_VIOLATION + NID_pkcs9_countersignature X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3 + NID_pkcs9_emailAddress X509_V_ERR_HOSTNAME_MISMATCH + NID_pkcs9_extCertAttributes X509_V_ERR_INVALID_CA + NID_pkcs9_messageDigest X509_V_ERR_INVALID_CALL + NID_pkcs9_signingTime X509_V_ERR_INVALID_EXTENSION + NID_pkcs9_unstructuredAddress X509_V_ERR_INVALID_NON_CA + NID_pkcs9_unstructuredName X509_V_ERR_INVALID_POLICY_EXTENSION + NID_private_key_usage_period X509_V_ERR_INVALID_PURPOSE + NID_rc2_40_cbc X509_V_ERR_IP_ADDRESS_MISMATCH + NID_rc2_64_cbc X509_V_ERR_ISSUER_NAME_EMPTY + NID_rc2_cbc X509_V_ERR_KEYUSAGE_NO_CERTSIGN + NID_rc2_cfb64 X509_V_ERR_KEYUSAGE_NO_CRL_SIGN + NID_rc2_ecb X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE + NID_rc2_ofb64 X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA + NID_rc4 X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER + NID_rc4_40 X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER + NID_rc5_cbc X509_V_ERR_NO_EXPLICIT_POLICY + NID_rc5_cfb64 X509_V_ERR_NO_ISSUER_PUBLIC_KEY + NID_rc5_ecb X509_V_ERR_NO_VALID_SCTS + NID_rc5_ofb64 X509_V_ERR_OCSP_CERT_UNKNOWN + NID_ripemd160 X509_V_ERR_OCSP_VERIFY_FAILED + NID_ripemd160WithRSA X509_V_ERR_OCSP_VERIFY_NEEDED + NID_rle_compression X509_V_ERR_OUT_OF_MEM + NID_rsa X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA + NID_rsaEncryption X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN + NID_rsadsi X509_V_ERR_PATH_LENGTH_EXCEEDED + NID_safeContentsBag X509_V_ERR_PATH_LOOP + NID_sdsiCertificate X509_V_ERR_PERMITTED_VIOLATION + NID_secretBag X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED + NID_serialNumber X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED + NID_server_auth X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION + NID_sha X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN + NID_sha1 X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY + NID_sha1WithRSA X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH + NID_sha1WithRSAEncryption X509_V_ERR_STORE_LOOKUP + NID_sha224 X509_V_ERR_SUBJECT_ISSUER_MISMATCH + NID_sha224WithRSAEncryption X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL + NID_sha256 X509_V_ERR_SUBJECT_NAME_EMPTY + NID_sha256WithRSAEncryption X509_V_ERR_SUBTREE_MINMAX + NID_sha384 X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 + NID_sha384WithRSAEncryption X509_V_ERR_SUITE_B_INVALID_ALGORITHM + NID_sha3_224 X509_V_ERR_SUITE_B_INVALID_CURVE + NID_sha3_256 X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM + NID_sha3_384 X509_V_ERR_SUITE_B_INVALID_VERSION + NID_sha3_512 X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED + NID_sha512 X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY + NID_sha512WithRSAEncryption X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE + NID_sha512_224 X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE + NID_sha512_224WithRSAEncryption X509_V_ERR_UNABLE_TO_GET_CRL + NID_sha512_256 X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER + NID_sha512_256WithRSAEncryption X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT + NID_shaWithRSAEncryption X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY + NID_shake128 X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE + NID_shake256 X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION + NID_stateOrProvinceName X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION + NID_subject_alt_name X509_V_ERR_UNNESTED_RESOURCE + NID_subject_key_identifier X509_V_ERR_UNSPECIFIED + NID_surname X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX + NID_sxnet X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE + NID_time_stamp X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE + NID_title X509_V_ERR_UNSUPPORTED_NAME_SYNTAX + NID_undef X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM + NID_uniqueIdentifier X509_V_FLAG_ALLOW_PROXY_CERTS + NID_x509Certificate X509_V_FLAG_CB_ISSUER_CHECK + NID_x509Crl X509_V_FLAG_CHECK_SS_SIGNATURE + NID_zlib_compression X509_V_FLAG_CRL_CHECK + NOTHING X509_V_FLAG_CRL_CHECK_ALL + OCSP_RESPONSE_STATUS_INTERNALERROR X509_V_FLAG_EXPLICIT_POLICY + OCSP_RESPONSE_STATUS_MALFORMEDREQUEST X509_V_FLAG_EXTENDED_CRL_SUPPORT + OCSP_RESPONSE_STATUS_SIGREQUIRED X509_V_FLAG_IGNORE_CRITICAL + OCSP_RESPONSE_STATUS_SUCCESSFUL X509_V_FLAG_INHIBIT_ANY + OCSP_RESPONSE_STATUS_TRYLATER X509_V_FLAG_INHIBIT_MAP + OCSP_RESPONSE_STATUS_UNAUTHORIZED X509_V_FLAG_LEGACY_VERIFY + OPENSSL_BUILT_ON X509_V_FLAG_NOTIFY_POLICY + OPENSSL_CFLAGS X509_V_FLAG_NO_ALT_CHAINS + OPENSSL_CPU_INFO X509_V_FLAG_NO_CHECK_TIME + OPENSSL_DIR X509_V_FLAG_PARTIAL_CHAIN + OPENSSL_ENGINES_DIR X509_V_FLAG_POLICY_CHECK + OPENSSL_FULL_VERSION_STRING X509_V_FLAG_POLICY_MASK + OPENSSL_INFO_CONFIG_DIR X509_V_FLAG_SUITEB_128_LOS + OPENSSL_INFO_CPU_SETTINGS X509_V_FLAG_SUITEB_128_LOS_ONLY + OPENSSL_INFO_DIR_FILENAME_SEPARATOR X509_V_FLAG_SUITEB_192_LOS + OPENSSL_INFO_DSO_EXTENSION X509_V_FLAG_TRUSTED_FIRST + OPENSSL_INFO_ENGINES_DIR X509_V_FLAG_USE_CHECK_TIME + OPENSSL_INFO_LIST_SEPARATOR X509_V_FLAG_USE_DELTAS + OPENSSL_INFO_MODULES_DIR X509_V_FLAG_X509_STRICT + OPENSSL_INFO_SEED_SOURCE X509_V_OK + OPENSSL_INIT_ADD_ALL_CIPHERS XN_FLAG_COMPAT + OPENSSL_INIT_ADD_ALL_DIGESTS XN_FLAG_DN_REV + OPENSSL_INIT_ASYNC XN_FLAG_DUMP_UNKNOWN_FIELDS + OPENSSL_INIT_ATFORK XN_FLAG_FN_ALIGN + OPENSSL_INIT_ENGINE_AFALG XN_FLAG_FN_LN + OPENSSL_INIT_ENGINE_CAPI XN_FLAG_FN_MASK + OPENSSL_INIT_ENGINE_CRYPTODEV XN_FLAG_FN_NONE + OPENSSL_INIT_ENGINE_DYNAMIC XN_FLAG_FN_OID + OPENSSL_INIT_ENGINE_OPENSSL XN_FLAG_FN_SN + OPENSSL_INIT_ENGINE_PADLOCK XN_FLAG_MULTILINE + OPENSSL_INIT_ENGINE_RDRAND XN_FLAG_ONELINE + OPENSSL_INIT_LOAD_CONFIG XN_FLAG_RFC2253 + OPENSSL_INIT_LOAD_CRYPTO_STRINGS XN_FLAG_SEP_COMMA_PLUS + OPENSSL_INIT_LOAD_SSL_STRINGS XN_FLAG_SEP_CPLUS_SPC + OPENSSL_INIT_NO_ADD_ALL_CIPHERS XN_FLAG_SEP_MASK + OPENSSL_INIT_NO_ADD_ALL_DIGESTS XN_FLAG_SEP_MULTILINE + OPENSSL_INIT_NO_ATEXIT XN_FLAG_SEP_SPLUS_SPC + OPENSSL_INIT_NO_LOAD_CONFIG XN_FLAG_SPC_EQ =for end_constants diff --git a/t/local/21_constants.t b/t/local/21_constants.t index 8eb1a8a..01bb81e 100644 --- a/t/local/21_constants.t +++ b/t/local/21_constants.t @@ -11,7 +11,7 @@ use Test::Net::SSLeay qw(dies_like); # We rely on symbolic references in the dies_like() tests: no strict 'refs'; -plan tests => 744; +plan tests => 770; my @constants = qw( AD_ACCESS_DENIED @@ -71,6 +71,12 @@ my @constants = qw( CLIENT_HELLO_ERROR CLIENT_HELLO_RETRY CLIENT_HELLO_SUCCESS + CONF_MFLAGS_DEFAULT_SECTION + CONF_MFLAGS_IGNORE_ERRORS + CONF_MFLAGS_IGNORE_MISSING_FILE + CONF_MFLAGS_IGNORE_RETURN_CODES + CONF_MFLAGS_NO_DSO + CONF_MFLAGS_SILENT ERROR_NONE ERROR_SSL ERROR_SYSCALL @@ -374,6 +380,26 @@ my @constants = qw( OPENSSL_INFO_LIST_SEPARATOR OPENSSL_INFO_MODULES_DIR OPENSSL_INFO_SEED_SOURCE + OPENSSL_INIT_ADD_ALL_CIPHERS + OPENSSL_INIT_ADD_ALL_DIGESTS + OPENSSL_INIT_ASYNC + OPENSSL_INIT_ATFORK + OPENSSL_INIT_ENGINE_AFALG + OPENSSL_INIT_ENGINE_CAPI + OPENSSL_INIT_ENGINE_CRYPTODEV + OPENSSL_INIT_ENGINE_DYNAMIC + OPENSSL_INIT_ENGINE_OPENSSL + OPENSSL_INIT_ENGINE_PADLOCK + OPENSSL_INIT_ENGINE_RDRAND + OPENSSL_INIT_LOAD_CONFIG + OPENSSL_INIT_LOAD_CRYPTO_STRINGS + OPENSSL_INIT_LOAD_SSL_STRINGS + OPENSSL_INIT_NO_ADD_ALL_CIPHERS + OPENSSL_INIT_NO_ADD_ALL_DIGESTS + OPENSSL_INIT_NO_ATEXIT + OPENSSL_INIT_NO_LOAD_CONFIG + OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS + OPENSSL_INIT_NO_LOAD_SSL_STRINGS OPENSSL_MODULES_DIR OPENSSL_PLATFORM OPENSSL_VERSION |