summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHeikki Vatiainen <hvn@radiatorsoftware.com>2023-12-26 19:17:13 +0200
committerHeikki Vatiainen <hvn@radiatorsoftware.com>2023-12-26 19:17:13 +0200
commitf861ca528ed35e811570c6f5b5074a7da9d7759e (patch)
tree4a203e8373e0e85500b7c1c03cd33970dd385ba9
parent3e537556f10b7fd3356c047f1e30c03dc5318652 (diff)
GH-452 Add constants for OPENSSL_init_crypto and related functions.
-rw-r--r--Changes27
-rw-r--r--constants.c881
-rw-r--r--helper_script/constants.txt26
-rw-r--r--lib/Net/SSLeay.pm26
-rw-r--r--lib/Net/SSLeay.pod755
-rw-r--r--t/local/21_constants.t28
6 files changed, 1076 insertions, 667 deletions
diff --git a/Changes b/Changes
index 0aa47ea..6196d10 100644
--- a/Changes
+++ b/Changes
@@ -94,6 +94,33 @@ Revision history for Perl extension Net::SSLeay.
testing and providing detailed test reports. Tested with GCC
13 g++, Clang 17 clang++ and Visual Studio Community 2022
C++ compilers. Discussion in GH-425 and GH-438.
+ - Add constants for OPENSSL_init_crypto and related functions:
+ - CONF_MFLAGS_DEFAULT_SECTION
+ - CONF_MFLAGS_IGNORE_ERRORS
+ - CONF_MFLAGS_IGNORE_MISSING_FILE
+ - CONF_MFLAGS_IGNORE_RETURN_CODES
+ - CONF_MFLAGS_NO_DSO
+ - CONF_MFLAGS_SILENT
+ - OPENSSL_INIT_ADD_ALL_CIPHERS
+ - OPENSSL_INIT_ADD_ALL_DIGESTS
+ - OPENSSL_INIT_ASYNC
+ - OPENSSL_INIT_ATFORK
+ - OPENSSL_INIT_ENGINE_AFALG
+ - OPENSSL_INIT_ENGINE_CAPI
+ - OPENSSL_INIT_ENGINE_CRYPTODEV
+ - OPENSSL_INIT_ENGINE_DYNAMIC
+ - OPENSSL_INIT_ENGINE_OPENSSL
+ - OPENSSL_INIT_ENGINE_PADLOCK
+ - OPENSSL_INIT_ENGINE_RDRAND
+ - OPENSSL_INIT_LOAD_CONFIG
+ - OPENSSL_INIT_LOAD_CRYPTO_STRINGS
+ - OPENSSL_INIT_LOAD_SSL_STRINGS
+ - OPENSSL_INIT_NO_ADD_ALL_CIPHERS
+ - OPENSSL_INIT_NO_ADD_ALL_DIGESTS
+ - OPENSSL_INIT_NO_ATEXIT
+ - OPENSSL_INIT_NO_LOAD_CONFIG
+ - OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+ - OPENSSL_INIT_NO_LOAD_SSL_STRINGS
1.93_02 2023-02-22
- Update ppport.h to version 3.68. This eliminates thousands of
diff --git a/constants.c b/constants.c
index a05d095..74350dd 100644
--- a/constants.c
+++ b/constants.c
@@ -3630,122 +3630,147 @@ constant (const char *name, size_t len) {
case 18:
/* Names all of length 18. */
/* AD_BAD_CERTIFICATE AD_RECORD_OVERFLOW CB_HANDSHAKE_START
- CLIENT_HELLO_ERROR CLIENT_HELLO_RETRY ERROR_WANT_CONNECT
- F_GET_CLIENT_HELLO F_GET_SERVER_HELLO MODE_NO_AUTO_CHAIN
- NID_des_ede3_cfb64 NID_des_ede3_ofb64 NID_dhKeyAgreement
+ CLIENT_HELLO_ERROR CLIENT_HELLO_RETRY CONF_MFLAGS_NO_DSO
+ CONF_MFLAGS_SILENT ERROR_WANT_CONNECT F_GET_CLIENT_HELLO
+ F_GET_SERVER_HELLO MODE_NO_AUTO_CHAIN NID_des_ede3_cfb64
+ NID_des_ede3_ofb64 NID_dhKeyAgreement OPENSSL_INIT_ASYNC
OP_COOKIE_EXCHANGE OP_SINGLE_ECDH_USE R_BAD_SSL_FILETYPE
SSL3_MT_KEY_UPDATE SSL3_MT_NEXT_PROTO TLSEXT_TYPE_cookie
VERIFY_CLIENT_ONCE X509_CRL_VERSION_1 X509_CRL_VERSION_2
X509_FILETYPE_ASN1 X509_REQ_VERSION_1 X509_REQ_VERSION_2
X509_REQ_VERSION_3 X509_TRUST_DEFAULT */
- /* Offset 16 gives the best switch position. */
- switch (name[16]) {
- case '6':
- if (!memcmp(name, "NID_des_ede3_cfb64", 18)) {
- /* ^ */
+ /* Offset 6 gives the best switch position. */
+ switch (name[6]) {
+ case 'C':
+ if (!memcmp(name, "F_GET_CLIENT_HELLO", 18)) {
+ /* ^ */
-#ifdef NID_des_ede3_cfb64
- return NID_des_ede3_cfb64;
+#ifdef SSL_F_GET_CLIENT_HELLO
+ return SSL_F_GET_CLIENT_HELLO;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "NID_des_ede3_ofb64", 18)) {
- /* ^ */
+ break;
+ case 'D':
+ if (!memcmp(name, "CB_HANDSHAKE_START", 18)) {
+ /* ^ */
-#ifdef NID_des_ede3_ofb64
- return NID_des_ede3_ofb64;
+#ifdef SSL_CB_HANDSHAKE_START
+ return SSL_CB_HANDSHAKE_START;
#else
goto not_there;
#endif
}
break;
- case 'C':
- if (!memcmp(name, "ERROR_WANT_CONNECT", 18)) {
- /* ^ */
+ case 'E':
+ if (!memcmp(name, "X509_REQ_VERSION_1", 18)) {
+ /* ^ */
-#ifdef SSL_ERROR_WANT_CONNECT
- return SSL_ERROR_WANT_CONNECT;
+#ifdef X509_REQ_VERSION_1
+ return X509_REQ_VERSION_1;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "VERIFY_CLIENT_ONCE", 18)) {
- /* ^ */
+ if (!memcmp(name, "X509_REQ_VERSION_2", 18)) {
+ /* ^ */
-#ifdef SSL_VERIFY_CLIENT_ONCE
- return SSL_VERIFY_CLIENT_ONCE;
+#ifdef X509_REQ_VERSION_2
+ return X509_REQ_VERSION_2;
+#else
+ goto not_there;
+#endif
+
+ }
+ if (!memcmp(name, "X509_REQ_VERSION_3", 18)) {
+ /* ^ */
+
+#ifdef X509_REQ_VERSION_3
+ return X509_REQ_VERSION_3;
#else
goto not_there;
#endif
}
break;
- case 'G':
- if (!memcmp(name, "OP_COOKIE_EXCHANGE", 18)) {
- /* ^ */
+ case 'F':
+ if (!memcmp(name, "CONF_MFLAGS_NO_DSO", 18)) {
+ /* ^ */
-#ifdef SSL_OP_COOKIE_EXCHANGE
- return SSL_OP_COOKIE_EXCHANGE;
+#ifdef CONF_MFLAGS_NO_DSO
+ return CONF_MFLAGS_NO_DSO;
+#else
+ goto not_there;
+#endif
+
+ }
+ if (!memcmp(name, "CONF_MFLAGS_SILENT", 18)) {
+ /* ^ */
+
+#ifdef CONF_MFLAGS_SILENT
+ return CONF_MFLAGS_SILENT;
#else
goto not_there;
#endif
}
break;
- case 'I':
- if (!memcmp(name, "MODE_NO_AUTO_CHAIN", 18)) {
- /* ^ */
+ case 'G':
+ if (!memcmp(name, "OP_SINGLE_ECDH_USE", 18)) {
+ /* ^ */
-#ifdef SSL_MODE_NO_AUTO_CHAIN
- return SSL_MODE_NO_AUTO_CHAIN;
+#ifdef SSL_OP_SINGLE_ECDH_USE
+ return SSL_OP_SINGLE_ECDH_USE;
#else
goto not_there;
#endif
}
break;
- case 'L':
- if (!memcmp(name, "F_GET_CLIENT_HELLO", 18)) {
- /* ^ */
+ case 'I':
+ if (!memcmp(name, "X509_FILETYPE_ASN1", 18)) {
+ /* ^ */
-#ifdef SSL_F_GET_CLIENT_HELLO
- return SSL_F_GET_CLIENT_HELLO;
+#ifdef X509_FILETYPE_ASN1
+ return X509_FILETYPE_ASN1;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "F_GET_SERVER_HELLO", 18)) {
- /* ^ */
+ break;
+ case 'K':
+ if (!memcmp(name, "NID_dhKeyAgreement", 18)) {
+ /* ^ */
-#ifdef SSL_F_GET_SERVER_HELLO
- return SSL_F_GET_SERVER_HELLO;
+#ifdef NID_dhKeyAgreement
+ return NID_dhKeyAgreement;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "X509_TRUST_DEFAULT", 18)) {
- /* ^ */
+ if (!memcmp(name, "OP_COOKIE_EXCHANGE", 18)) {
+ /* ^ */
-#ifdef X509_TRUST_DEFAULT
- return X509_TRUST_DEFAULT;
+#ifdef SSL_OP_COOKIE_EXCHANGE
+ return SSL_OP_COOKIE_EXCHANGE;
#else
goto not_there;
#endif
}
break;
- case 'N':
- if (!memcmp(name, "X509_FILETYPE_ASN1", 18)) {
- /* ^ */
+ case 'L':
+ if (!memcmp(name, "OPENSSL_INIT_ASYNC", 18)) {
+ /* ^ */
-#ifdef X509_FILETYPE_ASN1
- return X509_FILETYPE_ASN1;
+#ifdef OPENSSL_INIT_ASYNC
+ return OPENSSL_INIT_ASYNC;
#else
goto not_there;
#endif
@@ -3754,7 +3779,7 @@ constant (const char *name, size_t len) {
break;
case 'O':
if (!memcmp(name, "AD_RECORD_OVERFLOW", 18)) {
- /* ^ */
+ /* ^ */
#ifdef SSL_AD_RECORD_OVERFLOW
return SSL_AD_RECORD_OVERFLOW;
@@ -3763,45 +3788,43 @@ constant (const char *name, size_t len) {
#endif
}
- if (!memcmp(name, "CLIENT_HELLO_ERROR", 18)) {
- /* ^ */
+ if (!memcmp(name, "MODE_NO_AUTO_CHAIN", 18)) {
+ /* ^ */
-#ifdef SSL_CLIENT_HELLO_ERROR
- return SSL_CLIENT_HELLO_ERROR;
+#ifdef SSL_MODE_NO_AUTO_CHAIN
+ return SSL_MODE_NO_AUTO_CHAIN;
#else
goto not_there;
#endif
}
break;
- case 'P':
- if (!memcmp(name, "R_BAD_SSL_FILETYPE", 18)) {
- /* ^ */
+ case 'R':
+ if (!memcmp(name, "X509_CRL_VERSION_1", 18)) {
+ /* ^ */
-#ifdef SSL_R_BAD_SSL_FILETYPE
- return SSL_R_BAD_SSL_FILETYPE;
+#ifdef X509_CRL_VERSION_1
+ return X509_CRL_VERSION_1;
#else
goto not_there;
#endif
}
- break;
- case 'R':
- if (!memcmp(name, "CB_HANDSHAKE_START", 18)) {
- /* ^ */
+ if (!memcmp(name, "X509_CRL_VERSION_2", 18)) {
+ /* ^ */
-#ifdef SSL_CB_HANDSHAKE_START
- return SSL_CB_HANDSHAKE_START;
+#ifdef X509_CRL_VERSION_2
+ return X509_CRL_VERSION_2;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "CLIENT_HELLO_RETRY", 18)) {
- /* ^ */
+ if (!memcmp(name, "X509_TRUST_DEFAULT", 18)) {
+ /* ^ */
-#ifdef SSL_CLIENT_HELLO_RETRY
- return SSL_CLIENT_HELLO_RETRY;
+#ifdef X509_TRUST_DEFAULT
+ return X509_TRUST_DEFAULT;
#else
goto not_there;
#endif
@@ -3809,30 +3832,30 @@ constant (const char *name, size_t len) {
}
break;
case 'S':
- if (!memcmp(name, "OP_SINGLE_ECDH_USE", 18)) {
- /* ^ */
+ if (!memcmp(name, "F_GET_SERVER_HELLO", 18)) {
+ /* ^ */
-#ifdef SSL_OP_SINGLE_ECDH_USE
- return SSL_OP_SINGLE_ECDH_USE;
+#ifdef SSL_F_GET_SERVER_HELLO
+ return SSL_F_GET_SERVER_HELLO;
#else
goto not_there;
#endif
}
- break;
- case 'T':
- if (!memcmp(name, "AD_BAD_CERTIFICATE", 18)) {
- /* ^ */
+ if (!memcmp(name, "R_BAD_SSL_FILETYPE", 18)) {
+ /* ^ */
-#ifdef SSL_AD_BAD_CERTIFICATE
- return SSL_AD_BAD_CERTIFICATE;
+#ifdef SSL_R_BAD_SSL_FILETYPE
+ return SSL_R_BAD_SSL_FILETYPE;
#else
goto not_there;
#endif
}
+ break;
+ case 'T':
if (!memcmp(name, "SSL3_MT_KEY_UPDATE", 18)) {
- /* ^ */
+ /* ^ */
#ifdef SSL3_MT_KEY_UPDATE
return SSL3_MT_KEY_UPDATE;
@@ -3842,7 +3865,7 @@ constant (const char *name, size_t len) {
}
if (!memcmp(name, "SSL3_MT_NEXT_PROTO", 18)) {
- /* ^ */
+ /* ^ */
#ifdef SSL3_MT_NEXT_PROTO
return SSL3_MT_NEXT_PROTO;
@@ -3852,76 +3875,86 @@ constant (const char *name, size_t len) {
}
break;
+ case 'W':
+ if (!memcmp(name, "ERROR_WANT_CONNECT", 18)) {
+ /* ^ */
+
+#ifdef SSL_ERROR_WANT_CONNECT
+ return SSL_ERROR_WANT_CONNECT;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
case '_':
- if (!memcmp(name, "X509_CRL_VERSION_1", 18)) {
- /* ^ */
+ if (!memcmp(name, "AD_BAD_CERTIFICATE", 18)) {
+ /* ^ */
-#ifdef X509_CRL_VERSION_1
- return X509_CRL_VERSION_1;
+#ifdef SSL_AD_BAD_CERTIFICATE
+ return SSL_AD_BAD_CERTIFICATE;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "X509_CRL_VERSION_2", 18)) {
- /* ^ */
+ if (!memcmp(name, "CLIENT_HELLO_ERROR", 18)) {
+ /* ^ */
-#ifdef X509_CRL_VERSION_2
- return X509_CRL_VERSION_2;
+#ifdef SSL_CLIENT_HELLO_ERROR
+ return SSL_CLIENT_HELLO_ERROR;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "X509_REQ_VERSION_1", 18)) {
- /* ^ */
+ if (!memcmp(name, "CLIENT_HELLO_RETRY", 18)) {
+ /* ^ */
-#ifdef X509_REQ_VERSION_1
- return X509_REQ_VERSION_1;
+#ifdef SSL_CLIENT_HELLO_RETRY
+ return SSL_CLIENT_HELLO_RETRY;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "X509_REQ_VERSION_2", 18)) {
- /* ^ */
+ if (!memcmp(name, "TLSEXT_TYPE_cookie", 18)) {
+ /* ^ */
-#ifdef X509_REQ_VERSION_2
- return X509_REQ_VERSION_2;
+#ifdef TLSEXT_TYPE_cookie
+ return TLSEXT_TYPE_cookie;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "X509_REQ_VERSION_3", 18)) {
- /* ^ */
+ if (!memcmp(name, "VERIFY_CLIENT_ONCE", 18)) {
+ /* ^ */
-#ifdef X509_REQ_VERSION_3
- return X509_REQ_VERSION_3;
+#ifdef SSL_VERIFY_CLIENT_ONCE
+ return SSL_VERIFY_CLIENT_ONCE;
#else
goto not_there;
#endif
}
break;
- case 'i':
- if (!memcmp(name, "TLSEXT_TYPE_cookie", 18)) {
- /* ^ */
+ case 's':
+ if (!memcmp(name, "NID_des_ede3_cfb64", 18)) {
+ /* ^ */
-#ifdef TLSEXT_TYPE_cookie
- return TLSEXT_TYPE_cookie;
+#ifdef NID_des_ede3_cfb64
+ return NID_des_ede3_cfb64;
#else
goto not_there;
#endif
}
- break;
- case 'n':
- if (!memcmp(name, "NID_dhKeyAgreement", 18)) {
- /* ^ */
+ if (!memcmp(name, "NID_des_ede3_ofb64", 18)) {
+ /* ^ */
-#ifdef NID_dhKeyAgreement
- return NID_dhKeyAgreement;
+#ifdef NID_des_ede3_ofb64
+ return NID_des_ede3_ofb64;
#else
goto not_there;
#endif
@@ -3936,10 +3969,10 @@ constant (const char *name, size_t len) {
F_GET_SERVER_VERIFY NID_invalidity_date NID_issuer_alt_name
NID_pkcs7_encrypted NID_pkcs7_enveloped NID_rle_compression
NID_safeContentsBag NID_sdsiCertificate NID_x509Certificate
- OPENSSL_ENGINES_DIR OPENSSL_MODULES_DIR OP_ALLOW_NO_DHE_KEX
- OP_CISCO_ANYCONNECT OP_NON_EXPORT_FIRST OP_NO_RENEGOTIATION
- OP_TLS_ROLLBACK_BUG SSL3_MT_CERTIFICATE SSL3_MT_SERVER_DONE
- TLSEXT_TYPE_padding */
+ OPENSSL_ENGINES_DIR OPENSSL_INIT_ATFORK OPENSSL_MODULES_DIR
+ OP_ALLOW_NO_DHE_KEX OP_CISCO_ANYCONNECT OP_NON_EXPORT_FIRST
+ OP_NO_RENEGOTIATION OP_TLS_ROLLBACK_BUG SSL3_MT_CERTIFICATE
+ SSL3_MT_SERVER_DONE TLSEXT_TYPE_padding */
/* Offset 12 gives the best switch position. */
switch (name[12]) {
case 'A':
@@ -4091,6 +4124,16 @@ constant (const char *name, size_t len) {
#endif
}
+ if (!memcmp(name, "OPENSSL_INIT_ATFORK", 19)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ATFORK
+ return OPENSSL_INIT_ATFORK;
+#else
+ goto not_there;
+#endif
+
+ }
break;
case 'c':
if (!memcmp(name, "NID_pkcs7_encrypted", 19)) {
@@ -4934,13 +4977,25 @@ constant (const char *name, size_t len) {
/* AD_CERTIFICATE_EXPIRED AD_CERTIFICATE_REVOKED AD_CERTIFICATE_UNKNOWN
ASN1_STRFLGS_ESC_QUOTE ERROR_WANT_X509_LOOKUP F_SSL_SESSION_PRINT_FP
NID_netscape_cert_type NID_netscape_data_type NID_pkcs9_emailAddress
- OPENSSL_VERSION_NUMBER OPENSSL_VERSION_STRING OP_NO_ENCRYPT_THEN_MAC
- R_PEER_ERROR_NO_CIPHER SESS_CACHE_NO_INTERNAL SESS_CACHE_UPDATE_TIME
- TLSEXT_STATUSTYPE_ocsp TLSEXT_TYPE_early_data V_OCSP_CERTSTATUS_GOOD
- X509_TRUST_OBJECT_SIGN X509_V_ERR_UNSPECIFIED X509_V_FLAG_USE_DELTAS
- XN_FLAG_SEP_COMMA_PLUS */
+ OPENSSL_INIT_NO_ATEXIT OPENSSL_VERSION_NUMBER OPENSSL_VERSION_STRING
+ OP_NO_ENCRYPT_THEN_MAC R_PEER_ERROR_NO_CIPHER SESS_CACHE_NO_INTERNAL
+ SESS_CACHE_UPDATE_TIME TLSEXT_STATUSTYPE_ocsp TLSEXT_TYPE_early_data
+ V_OCSP_CERTSTATUS_GOOD X509_TRUST_OBJECT_SIGN X509_V_ERR_UNSPECIFIED
+ X509_V_FLAG_USE_DELTAS XN_FLAG_SEP_COMMA_PLUS */
/* Offset 18 gives the best switch position. */
switch (name[18]) {
+ case 'E':
+ if (!memcmp(name, "OPENSSL_INIT_NO_ATEXIT", 22)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_NO_ATEXIT
+ return OPENSSL_INIT_NO_ATEXIT;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
case 'F':
if (!memcmp(name, "X509_V_ERR_UNSPECIFIED", 22)) {
/* ^ */
@@ -5549,6 +5604,7 @@ constant (const char *name, size_t len) {
NID_pbeWithMD5AndDES_CBC NID_pbeWithMD5AndRC2_CBC
NID_shaWithRSAEncryption OPENSSL_INFO_ENGINES_DIR
OPENSSL_INFO_MODULES_DIR OPENSSL_INFO_SEED_SOURCE
+ OPENSSL_INIT_ENGINE_CAPI OPENSSL_INIT_LOAD_CONFIG
OP_IGNORE_UNEXPECTED_EOF OP_LEGACY_SERVER_CONNECT
OP_MICROSOFT_SESS_ID_BUG OP_TLS_BLOCK_PADDING_BUG
R_CHALLENGE_IS_DIFFERENT R_CIPHER_TABLE_SRC_ERROR
@@ -5681,6 +5737,16 @@ constant (const char *name, size_t len) {
#endif
}
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_CAPI", 24)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_CAPI
+ return OPENSSL_INIT_ENGINE_CAPI;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "R_CIPHER_TABLE_SRC_ERROR", 24)) {
/* ^ */
@@ -5715,6 +5781,16 @@ constant (const char *name, size_t len) {
#endif
}
+ if (!memcmp(name, "OPENSSL_INIT_LOAD_CONFIG", 24)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_LOAD_CONFIG
+ return OPENSSL_INIT_LOAD_CONFIG;
+#else
+ goto not_there;
+#endif
+
+ }
break;
case 'M':
if (!memcmp(name, "OPENSSL_INFO_MODULES_DIR", 24)) {
@@ -5948,11 +6024,12 @@ constant (const char *name, size_t len) {
break;
case 25:
/* Names all of length 25. */
- /* AD_INAPPROPRIATE_FALLBACK F_SSL_RSA_PRIVATE_DECRYPT
- F_SSL_USE_PRIVATEKEY_ASN1 F_SSL_USE_PRIVATEKEY_FILE
- MODE_ENABLE_PARTIAL_WRITE NID_pbeWithSHA1AndDES_CBC
- NID_pbeWithSHA1AndRC2_CBC NID_sha1WithRSAEncryption
- OPENSSL_INFO_CPU_SETTINGS OP_MSIE_SSLV2_RSA_PADDING
+ /* AD_INAPPROPRIATE_FALLBACK CONF_MFLAGS_IGNORE_ERRORS
+ F_SSL_RSA_PRIVATE_DECRYPT F_SSL_USE_PRIVATEKEY_ASN1
+ F_SSL_USE_PRIVATEKEY_FILE MODE_ENABLE_PARTIAL_WRITE
+ NID_pbeWithSHA1AndDES_CBC NID_pbeWithSHA1AndRC2_CBC
+ NID_sha1WithRSAEncryption OPENSSL_INFO_CPU_SETTINGS
+ OPENSSL_INIT_ENGINE_AFALG OP_MSIE_SSLV2_RSA_PADDING
OP_NETSCAPE_CHALLENGE_BUG OP_SAFARI_ECDHE_ECDSA_BUG
R_BAD_AUTHENTICATION_TYPE SSL2_MT_CLIENT_MASTER_KEY
SSL3_MT_END_OF_EARLY_DATA SSL3_MT_NEWSESSION_TICKET
@@ -5979,6 +6056,16 @@ constant (const char *name, size_t len) {
}
break;
case 'A':
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_AFALG", 25)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_AFALG
+ return OPENSSL_INIT_ENGINE_AFALG;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "OP_SAFARI_ECDHE_ECDSA_BUG", 25)) {
/* ^ */
@@ -6161,6 +6248,16 @@ constant (const char *name, size_t len) {
}
break;
case 'R':
+ if (!memcmp(name, "CONF_MFLAGS_IGNORE_ERRORS", 25)) {
+ /* ^ */
+
+#ifdef CONF_MFLAGS_IGNORE_ERRORS
+ return CONF_MFLAGS_IGNORE_ERRORS;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "SSL2_MT_CLIENT_MASTER_KEY", 25)) {
/* ^ */
@@ -6338,18 +6435,19 @@ constant (const char *name, size_t len) {
NID_netscape_cert_sequence NID_organizationalUnitName
NID_pbeWithMD5AndCast5_CBC NID_pkcs9_countersignature
NID_pkcs9_unstructuredName NID_subject_key_identifier
- OPENSSL_INFO_DSO_EXTENSION OP_DISABLE_TLSEXT_CA_NAMES
- OP_ENABLE_MIDDLEBOX_COMPAT OP_NO_CLIENT_RENEGOTIATION
- R_INVALID_CHALLENGE_LENGTH R_NO_CERTIFICATE_SPECIFIED
- R_PUBLIC_KEY_ENCRYPT_ERROR SSL2_MT_CLIENT_CERTIFICATE
- SSL3_MT_CERTIFICATE_STATUS SSL3_MT_CERTIFICATE_VERIFY
- SSL3_MT_CHANGE_CIPHER_SPEC SSL3_RT_CHANGE_CIPHER_SPEC
- SSL3_RT_INNER_CONTENT_TYPE TLSEXT_TYPE_next_proto_neg
- TLSEXT_TYPE_session_ticket TLSEXT_TYPE_status_request
- TLSEXT_TYPE_truncated_hmac X509_PURPOSE_NS_SSL_SERVER
- X509_PURPOSE_SMIME_ENCRYPT X509_V_ERR_CRL_HAS_EXPIRED
- X509_V_ERR_INVALID_PURPOSE X509_V_FLAG_SUITEB_128_LOS
- X509_V_FLAG_SUITEB_192_LOS X509_V_FLAG_USE_CHECK_TIME */
+ OPENSSL_INFO_DSO_EXTENSION OPENSSL_INIT_ENGINE_RDRAND
+ OP_DISABLE_TLSEXT_CA_NAMES OP_ENABLE_MIDDLEBOX_COMPAT
+ OP_NO_CLIENT_RENEGOTIATION R_INVALID_CHALLENGE_LENGTH
+ R_NO_CERTIFICATE_SPECIFIED R_PUBLIC_KEY_ENCRYPT_ERROR
+ SSL2_MT_CLIENT_CERTIFICATE SSL3_MT_CERTIFICATE_STATUS
+ SSL3_MT_CERTIFICATE_VERIFY SSL3_MT_CHANGE_CIPHER_SPEC
+ SSL3_RT_CHANGE_CIPHER_SPEC SSL3_RT_INNER_CONTENT_TYPE
+ TLSEXT_TYPE_next_proto_neg TLSEXT_TYPE_session_ticket
+ TLSEXT_TYPE_status_request TLSEXT_TYPE_truncated_hmac
+ X509_PURPOSE_NS_SSL_SERVER X509_PURPOSE_SMIME_ENCRYPT
+ X509_V_ERR_CRL_HAS_EXPIRED X509_V_ERR_INVALID_PURPOSE
+ X509_V_FLAG_SUITEB_128_LOS X509_V_FLAG_SUITEB_192_LOS
+ X509_V_FLAG_USE_CHECK_TIME */
/* Offset 20 gives the best switch position. */
switch (name[20]) {
case '2':
@@ -6523,6 +6621,16 @@ constant (const char *name, size_t len) {
}
break;
case 'R':
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_RDRAND", 26)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_RDRAND
+ return OPENSSL_INIT_ENGINE_RDRAND;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "SSL3_MT_CHANGE_CIPHER_SPEC", 26)) {
/* ^ */
@@ -6764,22 +6872,25 @@ constant (const char *name, size_t len) {
break;
case 27:
/* Names all of length 27. */
- /* AD_CERTIFICATE_UNOBTAINABLE NID_crl_distribution_points
- NID_netscape_cert_extension NID_netscape_revocation_url
- NID_pbe_WithSHA1And40BitRC4 NID_pkcs9_challengePassword
- NID_pkcs9_extCertAttributes NID_sha224WithRSAEncryption
- NID_sha256WithRSAEncryption NID_sha384WithRSAEncryption
- NID_sha512WithRSAEncryption OPENSSL_FULL_VERSION_STRING
- OPENSSL_INFO_LIST_SEPARATOR OP_CIPHER_SERVER_PREFERENCE
- OP_SSLEAY_080_CLIENT_DH_BUG R_BAD_SSL_SESSION_ID_LENGTH
- R_UNKNOWN_REMOTE_ERROR_TYPE SSL2_MT_REQUEST_CERTIFICATE
- SSL3_MT_CERTIFICATE_REQUEST SSL3_MT_CLIENT_KEY_EXCHANGE
- SSL3_MT_SERVER_KEY_EXCHANGE TLSEXT_TYPE_elliptic_curves
- TLSEXT_TYPE_trusted_ca_keys VERIFY_FAIL_IF_NO_PEER_CERT
- X509_PURPOSE_TIMESTAMP_SIGN X509_V_ERR_CA_KEY_TOO_SMALL
- X509_V_ERR_CERT_HAS_EXPIRED X509_V_ERR_EE_KEY_TOO_SMALL
- X509_V_FLAG_CB_ISSUER_CHECK X509_V_FLAG_EXPLICIT_POLICY
- X509_V_FLAG_IGNORE_CRITICAL XN_FLAG_DUMP_UNKNOWN_FIELDS */
+ /* AD_CERTIFICATE_UNOBTAINABLE CONF_MFLAGS_DEFAULT_SECTION
+ NID_crl_distribution_points NID_netscape_cert_extension
+ NID_netscape_revocation_url NID_pbe_WithSHA1And40BitRC4
+ NID_pkcs9_challengePassword NID_pkcs9_extCertAttributes
+ NID_sha224WithRSAEncryption NID_sha256WithRSAEncryption
+ NID_sha384WithRSAEncryption NID_sha512WithRSAEncryption
+ OPENSSL_FULL_VERSION_STRING OPENSSL_INFO_LIST_SEPARATOR
+ OPENSSL_INIT_ENGINE_DYNAMIC OPENSSL_INIT_ENGINE_OPENSSL
+ OPENSSL_INIT_ENGINE_PADLOCK OPENSSL_INIT_NO_LOAD_CONFIG
+ OP_CIPHER_SERVER_PREFERENCE OP_SSLEAY_080_CLIENT_DH_BUG
+ R_BAD_SSL_SESSION_ID_LENGTH R_UNKNOWN_REMOTE_ERROR_TYPE
+ SSL2_MT_REQUEST_CERTIFICATE SSL3_MT_CERTIFICATE_REQUEST
+ SSL3_MT_CLIENT_KEY_EXCHANGE SSL3_MT_SERVER_KEY_EXCHANGE
+ TLSEXT_TYPE_elliptic_curves TLSEXT_TYPE_trusted_ca_keys
+ VERIFY_FAIL_IF_NO_PEER_CERT X509_PURPOSE_TIMESTAMP_SIGN
+ X509_V_ERR_CA_KEY_TOO_SMALL X509_V_ERR_CERT_HAS_EXPIRED
+ X509_V_ERR_EE_KEY_TOO_SMALL X509_V_FLAG_CB_ISSUER_CHECK
+ X509_V_FLAG_EXPLICIT_POLICY X509_V_FLAG_IGNORE_CRITICAL
+ XN_FLAG_DUMP_UNKNOWN_FIELDS */
/* Offset 21 gives the best switch position. */
switch (name[21]) {
case 'A':
@@ -6793,6 +6904,16 @@ constant (const char *name, size_t len) {
#endif
}
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_PADLOCK", 27)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_PADLOCK
+ return OPENSSL_INIT_ENGINE_PADLOCK;
+#else
+ goto not_there;
+#endif
+
+ }
break;
case 'B':
if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC4", 27)) {
@@ -6807,6 +6928,16 @@ constant (const char *name, size_t len) {
}
break;
case 'C':
+ if (!memcmp(name, "OPENSSL_INIT_NO_LOAD_CONFIG", 27)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_NO_LOAD_CONFIG
+ return OPENSSL_INIT_NO_LOAD_CONFIG;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "SSL3_MT_CLIENT_KEY_EXCHANGE", 27)) {
/* ^ */
@@ -6841,6 +6972,16 @@ constant (const char *name, size_t len) {
}
break;
case 'E':
+ if (!memcmp(name, "CONF_MFLAGS_DEFAULT_SECTION", 27)) {
+ /* ^ */
+
+#ifdef CONF_MFLAGS_DEFAULT_SECTION
+ return CONF_MFLAGS_DEFAULT_SECTION;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "OP_CIPHER_SERVER_PREFERENCE", 27)) {
/* ^ */
@@ -6919,6 +7060,16 @@ constant (const char *name, size_t len) {
}
break;
case 'P':
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_OPENSSL", 27)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_OPENSSL
+ return OPENSSL_INIT_ENGINE_OPENSSL;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "X509_PURPOSE_TIMESTAMP_SIGN", 27)) {
/* ^ */
@@ -6986,6 +7137,18 @@ constant (const char *name, size_t len) {
}
break;
+ case 'Y':
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_DYNAMIC", 27)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_DYNAMIC
+ return OPENSSL_INIT_ENGINE_DYNAMIC;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
case '_':
if (!memcmp(name, "X509_V_ERR_CA_KEY_TOO_SMALL", 27)) {
/* ^ */
@@ -7151,7 +7314,8 @@ constant (const char *name, size_t len) {
/* F_SSL_USE_RSAPRIVATEKEY_ASN1 F_SSL_USE_RSAPRIVATEKEY_FILE
NID_authority_key_identifier NID_netscape_ssl_server_name
NID_pbe_WithSHA1And128BitRC4 NID_pkcs7_signedAndEnveloped
- NID_private_key_usage_period OP_NO_EXTENDED_MASTER_SECRET
+ NID_private_key_usage_period OPENSSL_INIT_ADD_ALL_CIPHERS
+ OPENSSL_INIT_ADD_ALL_DIGESTS OP_NO_EXTENDED_MASTER_SECRET
SESS_CACHE_NO_INTERNAL_STORE SSL3_MT_ENCRYPTED_EXTENSIONS
TLSEXT_TYPE_client_cert_type TLSEXT_TYPE_ec_point_formats
TLSEXT_TYPE_encrypt_then_mac TLSEXT_TYPE_server_cert_type
@@ -7196,6 +7360,28 @@ constant (const char *name, size_t len) {
}
break;
+ case 'D':
+ if (!memcmp(name, "OPENSSL_INIT_ADD_ALL_CIPHERS", 28)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ADD_ALL_CIPHERS
+ return OPENSSL_INIT_ADD_ALL_CIPHERS;
+#else
+ goto not_there;
+#endif
+
+ }
+ if (!memcmp(name, "OPENSSL_INIT_ADD_ALL_DIGESTS", 28)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ADD_ALL_DIGESTS
+ return OPENSSL_INIT_ADD_ALL_DIGESTS;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
case 'E':
if (!memcmp(name, "X509_V_ERR_UNNESTED_RESOURCE", 28)) {
/* ^ */
@@ -7433,7 +7619,8 @@ constant (const char *name, size_t len) {
case 29:
/* Names all of length 29. */
/* AD_BAD_CERTIFICATE_HASH_VALUE NID_pkcs9_unstructuredAddress
- OCSP_RESPONSE_STATUS_TRYLATER OP_ALLOW_CLIENT_RENEGOTIATION
+ OCSP_RESPONSE_STATUS_TRYLATER OPENSSL_INIT_ENGINE_CRYPTODEV
+ OPENSSL_INIT_LOAD_SSL_STRINGS OP_ALLOW_CLIENT_RENEGOTIATION
OP_MICROSOFT_BIG_SSLV3_BUFFER R_SSL_SESSION_ID_IS_DIFFERENT
SESS_CACHE_NO_INTERNAL_LOOKUP X509_V_ERR_AKID_SKID_MISMATCH
X509_V_ERR_CERT_NOT_YET_VALID X509_V_ERR_EXCLUDED_VIOLATION
@@ -7467,6 +7654,16 @@ constant (const char *name, size_t len) {
}
break;
case 'D':
+ if (!memcmp(name, "OPENSSL_INIT_LOAD_SSL_STRINGS", 29)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_LOAD_SSL_STRINGS
+ return OPENSSL_INIT_LOAD_SSL_STRINGS;
+#else
+ goto not_there;
+#endif
+
+ }
if (!memcmp(name, "X509_V_ERR_EXCLUDED_VIOLATION", 29)) {
/* ^ */
@@ -7478,6 +7675,18 @@ constant (const char *name, size_t len) {
}
break;
+ case 'I':
+ if (!memcmp(name, "OPENSSL_INIT_ENGINE_CRYPTODEV", 29)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_ENGINE_CRYPTODEV
+ return OPENSSL_INIT_ENGINE_CRYPTODEV;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
case 'N':
if (!memcmp(name, "X509_V_ERR_CERT_NOT_YET_VALID", 29)) {
/* ^ */
@@ -7751,30 +7960,66 @@ constant (const char *name, size_t len) {
break;
case 31:
/* Names all of length 31. */
- /* MIN_RSA_MODULUS_LENGTH_IN_BYTES MODE_ACCEPT_MOVING_WRITE_BUFFER
+ /* CONF_MFLAGS_IGNORE_MISSING_FILE CONF_MFLAGS_IGNORE_RETURN_CODES
+ MIN_RSA_MODULUS_LENGTH_IN_BYTES MODE_ACCEPT_MOVING_WRITE_BUFFER
NID_pbe_WithSHA1And40BitRC2_CBC NID_sha512_224WithRSAEncryption
NID_sha512_256WithRSAEncryption OCSP_RESPONSE_STATUS_SUCCESSFUL
+ OPENSSL_INIT_NO_ADD_ALL_CIPHERS OPENSSL_INIT_NO_ADD_ALL_DIGESTS
TLSEXT_TYPE_max_fragment_length TLSEXT_TYPE_post_handshake_auth
X509_V_ERR_KEYUSAGE_NO_CERTSIGN X509_V_ERR_KEYUSAGE_NO_CRL_SIGN
X509_V_ERR_NO_ISSUER_PUBLIC_KEY X509_V_ERR_PATH_LENGTH_EXCEEDED
X509_V_FLAG_SUITEB_128_LOS_ONLY */
- /* Offset 25 gives the best switch position. */
- switch (name[25]) {
- case 'B':
- if (!memcmp(name, "MODE_ACCEPT_MOVING_WRITE_BUFFER", 31)) {
- /* ^ */
+ /* Offset 13 gives the best switch position. */
+ switch (name[13]) {
+ case '4':
+ if (!memcmp(name, "NID_sha512_224WithRSAEncryption", 31)) {
+ /* ^ */
-#ifdef SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER
- return SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER;
+#ifdef NID_sha512_224WithRSAEncryption
+ return NID_sha512_224WithRSAEncryption;
#else
goto not_there;
#endif
}
break;
- case 'C':
+ case '6':
+ if (!memcmp(name, "NID_sha512_256WithRSAEncryption", 31)) {
+ /* ^ */
+
+#ifdef NID_sha512_256WithRSAEncryption
+ return NID_sha512_256WithRSAEncryption;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
+ case 'G':
+ if (!memcmp(name, "CONF_MFLAGS_IGNORE_MISSING_FILE", 31)) {
+ /* ^ */
+
+#ifdef CONF_MFLAGS_IGNORE_MISSING_FILE
+ return CONF_MFLAGS_IGNORE_MISSING_FILE;
+#else
+ goto not_there;
+#endif
+
+ }
+ if (!memcmp(name, "CONF_MFLAGS_IGNORE_RETURN_CODES", 31)) {
+ /* ^ */
+
+#ifdef CONF_MFLAGS_IGNORE_RETURN_CODES
+ return CONF_MFLAGS_IGNORE_RETURN_CODES;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
+ case 'H':
if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC2_CBC", 31)) {
- /* ^ */
+ /* ^ */
#ifdef NID_pbe_WithSHA1And40BitRC2_CBC
return NID_pbe_WithSHA1And40BitRC2_CBC;
@@ -7783,68 +8028,66 @@ constant (const char *name, size_t len) {
#endif
}
- if (!memcmp(name, "X509_V_ERR_PATH_LENGTH_EXCEEDED", 31)) {
- /* ^ */
+ break;
+ case 'N':
+ if (!memcmp(name, "OPENSSL_INIT_NO_ADD_ALL_CIPHERS", 31)) {
+ /* ^ */
-#ifdef X509_V_ERR_PATH_LENGTH_EXCEEDED
- return X509_V_ERR_PATH_LENGTH_EXCEEDED;
+#ifdef OPENSSL_INIT_NO_ADD_ALL_CIPHERS
+ return OPENSSL_INIT_NO_ADD_ALL_CIPHERS;
#else
goto not_there;
#endif
}
- break;
- case 'E':
- if (!memcmp(name, "OCSP_RESPONSE_STATUS_SUCCESSFUL", 31)) {
- /* ^ */
+ if (!memcmp(name, "OPENSSL_INIT_NO_ADD_ALL_DIGESTS", 31)) {
+ /* ^ */
-#ifdef OCSP_RESPONSE_STATUS_SUCCESSFUL
- return OCSP_RESPONSE_STATUS_SUCCESSFUL;
+#ifdef OPENSSL_INIT_NO_ADD_ALL_DIGESTS
+ return OPENSSL_INIT_NO_ADD_ALL_DIGESTS;
#else
goto not_there;
#endif
}
break;
- case 'I':
- if (!memcmp(name, "X509_V_ERR_NO_ISSUER_PUBLIC_KEY", 31)) {
- /* ^ */
+ case 'O':
+ if (!memcmp(name, "MODE_ACCEPT_MOVING_WRITE_BUFFER", 31)) {
+ /* ^ */
-#ifdef X509_V_ERR_NO_ISSUER_PUBLIC_KEY
- return X509_V_ERR_NO_ISSUER_PUBLIC_KEY;
+#ifdef SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER
+ return SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER;
#else
goto not_there;
#endif
}
break;
- case 'L':
- if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CRL_SIGN", 31)) {
- /* ^ */
+ case 'T':
+ if (!memcmp(name, "X509_V_ERR_PATH_LENGTH_EXCEEDED", 31)) {
+ /* ^ */
-#ifdef X509_V_ERR_KEYUSAGE_NO_CRL_SIGN
- return X509_V_ERR_KEYUSAGE_NO_CRL_SIGN;
+#ifdef X509_V_ERR_PATH_LENGTH_EXCEEDED
+ return X509_V_ERR_PATH_LENGTH_EXCEEDED;
#else
goto not_there;
#endif
}
break;
- case 'R':
- if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CERTSIGN", 31)) {
- /* ^ */
+ case 'U':
+ if (!memcmp(name, "MIN_RSA_MODULUS_LENGTH_IN_BYTES", 31)) {
+ /* ^ */
-#ifdef X509_V_ERR_KEYUSAGE_NO_CERTSIGN
- return X509_V_ERR_KEYUSAGE_NO_CERTSIGN;
+#ifdef SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES
+ return SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES;
#else
goto not_there;
#endif
}
- break;
- case 'S':
if (!memcmp(name, "X509_V_FLAG_SUITEB_128_LOS_ONLY", 31)) {
- /* ^ */
+ /* ^ */
#ifdef X509_V_FLAG_SUITEB_128_LOS_ONLY
return X509_V_FLAG_SUITEB_128_LOS_ONLY;
@@ -7854,58 +8097,68 @@ constant (const char *name, size_t len) {
}
break;
- case '_':
- if (!memcmp(name, "MIN_RSA_MODULUS_LENGTH_IN_BYTES", 31)) {
- /* ^ */
+ case 'Y':
+ if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CERTSIGN", 31)) {
+ /* ^ */
-#ifdef SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES
- return SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES;
+#ifdef X509_V_ERR_KEYUSAGE_NO_CERTSIGN
+ return X509_V_ERR_KEYUSAGE_NO_CERTSIGN;
#else
goto not_there;
#endif
}
- break;
- case 'e':
- if (!memcmp(name, "TLSEXT_TYPE_post_handshake_auth", 31)) {
- /* ^ */
+ if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CRL_SIGN", 31)) {
+ /* ^ */
-#ifdef TLSEXT_TYPE_post_handshake_auth
- return TLSEXT_TYPE_post_handshake_auth;
+#ifdef X509_V_ERR_KEYUSAGE_NO_CRL_SIGN
+ return X509_V_ERR_KEYUSAGE_NO_CRL_SIGN;
#else
goto not_there;
#endif
}
break;
- case 'l':
- if (!memcmp(name, "TLSEXT_TYPE_max_fragment_length", 31)) {
- /* ^ */
+ case '_':
+ if (!memcmp(name, "OCSP_RESPONSE_STATUS_SUCCESSFUL", 31)) {
+ /* ^ */
-#ifdef TLSEXT_TYPE_max_fragment_length
- return TLSEXT_TYPE_max_fragment_length;
+#ifdef OCSP_RESPONSE_STATUS_SUCCESSFUL
+ return OCSP_RESPONSE_STATUS_SUCCESSFUL;
+#else
+ goto not_there;
+#endif
+
+ }
+ if (!memcmp(name, "X509_V_ERR_NO_ISSUER_PUBLIC_KEY", 31)) {
+ /* ^ */
+
+#ifdef X509_V_ERR_NO_ISSUER_PUBLIC_KEY
+ return X509_V_ERR_NO_ISSUER_PUBLIC_KEY;
#else
goto not_there;
#endif
}
break;
- case 'y':
- if (!memcmp(name, "NID_sha512_224WithRSAEncryption", 31)) {
- /* ^ */
+ case 'a':
+ if (!memcmp(name, "TLSEXT_TYPE_max_fragment_length", 31)) {
+ /* ^ */
-#ifdef NID_sha512_224WithRSAEncryption
- return NID_sha512_224WithRSAEncryption;
+#ifdef TLSEXT_TYPE_max_fragment_length
+ return TLSEXT_TYPE_max_fragment_length;
#else
goto not_there;
#endif
}
- if (!memcmp(name, "NID_sha512_256WithRSAEncryption", 31)) {
- /* ^ */
+ break;
+ case 'o':
+ if (!memcmp(name, "TLSEXT_TYPE_post_handshake_auth", 31)) {
+ /* ^ */
-#ifdef NID_sha512_256WithRSAEncryption
- return NID_sha512_256WithRSAEncryption;
+#ifdef TLSEXT_TYPE_post_handshake_auth
+ return TLSEXT_TYPE_post_handshake_auth;
#else
goto not_there;
#endif
@@ -7917,26 +8170,27 @@ constant (const char *name, size_t len) {
case 32:
/* Names all of length 32. */
/* NID_pbe_WithSHA1And128BitRC2_CBC OCSP_RESPONSE_STATUS_SIGREQUIRED
+ OPENSSL_INIT_LOAD_CRYPTO_STRINGS OPENSSL_INIT_NO_LOAD_SSL_STRINGS
TLSEXT_TYPE_compress_certificate TLSEXT_TYPE_signature_algorithms
X509_V_ERR_CA_BCONS_NOT_CRITICAL X509_V_ERR_CRL_SIGNATURE_FAILURE
X509_V_ERR_SUITE_B_INVALID_CURVE X509_V_FLAG_EXTENDED_CRL_SUPPORT */
- /* Offset 21 gives the best switch position. */
- switch (name[21]) {
- case '8':
- if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC2_CBC", 32)) {
- /* ^ */
+ /* Offset 17 gives the best switch position. */
+ switch (name[17]) {
+ case 'B':
+ if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_CURVE", 32)) {
+ /* ^ */
-#ifdef NID_pbe_WithSHA1And128BitRC2_CBC
- return NID_pbe_WithSHA1And128BitRC2_CBC;
+#ifdef X509_V_ERR_SUITE_B_INVALID_CURVE
+ return X509_V_ERR_SUITE_B_INVALID_CURVE;
#else
goto not_there;
#endif
}
break;
- case 'C':
+ case 'D':
if (!memcmp(name, "X509_V_FLAG_EXTENDED_CRL_SUPPORT", 32)) {
- /* ^ */
+ /* ^ */
#ifdef X509_V_FLAG_EXTENDED_CRL_SUPPORT
return X509_V_FLAG_EXTENDED_CRL_SUPPORT;
@@ -7946,9 +8200,21 @@ constant (const char *name, size_t len) {
}
break;
- case 'O':
+ case 'G':
+ if (!memcmp(name, "X509_V_ERR_CRL_SIGNATURE_FAILURE", 32)) {
+ /* ^ */
+
+#ifdef X509_V_ERR_CRL_SIGNATURE_FAILURE
+ return X509_V_ERR_CRL_SIGNATURE_FAILURE;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
+ case 'N':
if (!memcmp(name, "X509_V_ERR_CA_BCONS_NOT_CRITICAL", 32)) {
- /* ^ */
+ /* ^ */
#ifdef X509_V_ERR_CA_BCONS_NOT_CRITICAL
return X509_V_ERR_CA_BCONS_NOT_CRITICAL;
@@ -7958,9 +8224,21 @@ constant (const char *name, size_t len) {
}
break;
- case 'S':
+ case 'O':
+ if (!memcmp(name, "OPENSSL_INIT_NO_LOAD_SSL_STRINGS", 32)) {
+ /* ^ */
+
+#ifdef OPENSSL_INIT_NO_LOAD_SSL_STRINGS
+ return OPENSSL_INIT_NO_LOAD_SSL_STRINGS;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
+ case 'T':
if (!memcmp(name, "OCSP_RESPONSE_STATUS_SIGREQUIRED", 32)) {
- /* ^ */
+ /* ^ */
#ifdef OCSP_RESPONSE_STATUS_SIGREQUIRED
return OCSP_RESPONSE_STATUS_SIGREQUIRED;
@@ -7970,48 +8248,48 @@ constant (const char *name, size_t len) {
}
break;
- case 'U':
- if (!memcmp(name, "X509_V_ERR_CRL_SIGNATURE_FAILURE", 32)) {
- /* ^ */
+ case '_':
+ if (!memcmp(name, "OPENSSL_INIT_LOAD_CRYPTO_STRINGS", 32)) {
+ /* ^ */
-#ifdef X509_V_ERR_CRL_SIGNATURE_FAILURE
- return X509_V_ERR_CRL_SIGNATURE_FAILURE;
+#ifdef OPENSSL_INIT_LOAD_CRYPTO_STRINGS
+ return OPENSSL_INIT_LOAD_CRYPTO_STRINGS;
#else
goto not_there;
#endif
}
break;
- case 'V':
- if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_CURVE", 32)) {
- /* ^ */
+ case 'e':
+ if (!memcmp(name, "TLSEXT_TYPE_compress_certificate", 32)) {
+ /* ^ */
-#ifdef X509_V_ERR_SUITE_B_INVALID_CURVE
- return X509_V_ERR_SUITE_B_INVALID_CURVE;
+#ifdef TLSEXT_TYPE_compress_certificate
+ return TLSEXT_TYPE_compress_certificate;
#else
goto not_there;
#endif
}
break;
- case '_':
- if (!memcmp(name, "TLSEXT_TYPE_signature_algorithms", 32)) {
- /* ^ */
+ case 'n':
+ if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC2_CBC", 32)) {
+ /* ^ */
-#ifdef TLSEXT_TYPE_signature_algorithms
- return TLSEXT_TYPE_signature_algorithms;
+#ifdef NID_pbe_WithSHA1And128BitRC2_CBC
+ return NID_pbe_WithSHA1And128BitRC2_CBC;
#else
goto not_there;
#endif
}
break;
- case 'c':
- if (!memcmp(name, "TLSEXT_TYPE_compress_certificate", 32)) {
- /* ^ */
+ case 't':
+ if (!memcmp(name, "TLSEXT_TYPE_signature_algorithms", 32)) {
+ /* ^ */
-#ifdef TLSEXT_TYPE_compress_certificate
- return TLSEXT_TYPE_compress_certificate;
+#ifdef TLSEXT_TYPE_signature_algorithms
+ return TLSEXT_TYPE_signature_algorithms;
#else
goto not_there;
#endif
@@ -8197,40 +8475,53 @@ constant (const char *name, size_t len) {
break;
case 35:
/* Names all of length 35. */
- /* OPENSSL_INFO_DIR_FILENAME_SEPARATOR OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
- R_PEER_DID_NOT_RETURN_A_CERTIFICATE TLSEXT_TYPE_certificate_authorities
- X509_CHECK_FLAG_NEVER_CHECK_SUBJECT X509_V_ERR_APPLICATION_VERIFICATION
- X509_V_ERR_INVALID_POLICY_EXTENSION X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER
- _NET_SSLEAY_TEST_UNDEFINED_CONSTANT */
- /* Offset 27 gives the best switch position. */
- switch (name[27]) {
+ /* OPENSSL_INFO_DIR_FILENAME_SEPARATOR OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+ OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG R_PEER_DID_NOT_RETURN_A_CERTIFICATE
+ TLSEXT_TYPE_certificate_authorities X509_CHECK_FLAG_NEVER_CHECK_SUBJECT
+ X509_V_ERR_APPLICATION_VERIFICATION X509_V_ERR_INVALID_POLICY_EXTENSION
+ X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER _NET_SSLEAY_TEST_UNDEFINED_CONSTANT
+ */
+ /* Offset 14 gives the best switch position. */
+ switch (name[14]) {
case 'A':
- if (!memcmp(name, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", 35)) {
- /* ^ */
+ if (!memcmp(name, "X509_V_ERR_INVALID_POLICY_EXTENSION", 35)) {
+ /* ^ */
-#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
- return SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG;
+#ifdef X509_V_ERR_INVALID_POLICY_EXTENSION
+ return X509_V_ERR_INVALID_POLICY_EXTENSION;
#else
goto not_there;
#endif
}
break;
- case 'C':
- if (!memcmp(name, "_NET_SSLEAY_TEST_UNDEFINED_CONSTANT", 35)) {
- /* ^ */
+ case 'B':
+ if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER", 35)) {
+ /* ^ */
-#ifdef _NET_SSLEAY_TEST_UNDEFINED_CONSTANT
- return _NET_SSLEAY_TEST_UNDEFINED_CONSTANT;
+#ifdef X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER
+ return X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER;
#else
goto not_there;
#endif
}
break;
- case 'E':
+ case 'G':
+ if (!memcmp(name, "X509_CHECK_FLAG_NEVER_CHECK_SUBJECT", 35)) {
+ /* ^ */
+
+#ifdef X509_CHECK_FLAG_NEVER_CHECK_SUBJECT
+ return X509_CHECK_FLAG_NEVER_CHECK_SUBJECT;
+#else
+ goto not_there;
+#endif
+
+ }
+ break;
+ case 'I':
if (!memcmp(name, "OPENSSL_INFO_DIR_FILENAME_SEPARATOR", 35)) {
- /* ^ */
+ /* ^ */
#ifdef OPENSSL_INFO_DIR_FILENAME_SEPARATOR
return OPENSSL_INFO_DIR_FILENAME_SEPARATOR;
@@ -8240,9 +8531,9 @@ constant (const char *name, size_t len) {
}
break;
- case 'F':
+ case 'L':
if (!memcmp(name, "X509_V_ERR_APPLICATION_VERIFICATION", 35)) {
- /* ^ */
+ /* ^ */
#ifdef X509_V_ERR_APPLICATION_VERIFICATION
return X509_V_ERR_APPLICATION_VERIFICATION;
@@ -8252,36 +8543,36 @@ constant (const char *name, size_t len) {
}
break;
- case 'L':
- if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER", 35)) {
- /* ^ */
+ case 'O':
+ if (!memcmp(name, "OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS", 35)) {
+ /* ^ */
-#ifdef X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER
- return X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER;
+#ifdef OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+ return OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS;
#else
goto not_there;
#endif
}
break;
- case 'T':
- if (!memcmp(name, "R_PEER_DID_NOT_RETURN_A_CERTIFICATE", 35)) {
- /* ^ */
+ case 'S':
+ if (!memcmp(name, "_NET_SSLEAY_TEST_UNDEFINED_CONSTANT", 35)) {
+ /* ^ */
-#ifdef SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE
- return SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE;
+#ifdef _NET_SSLEAY_TEST_UNDEFINED_CONSTANT
+ return _NET_SSLEAY_TEST_UNDEFINED_CONSTANT;
#else
goto not_there;
#endif
}
break;
- case 'X':
- if (!memcmp(name, "X509_V_ERR_INVALID_POLICY_EXTENSION", 35)) {
- /* ^ */
+ case 'U':
+ if (!memcmp(name, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", 35)) {
+ /* ^ */
-#ifdef X509_V_ERR_INVALID_POLICY_EXTENSION
- return X509_V_ERR_INVALID_POLICY_EXTENSION;
+#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
+ return SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG;
#else
goto not_there;
#endif
@@ -8289,20 +8580,20 @@ constant (const char *name, size_t len) {
}
break;
case '_':
- if (!memcmp(name, "X509_CHECK_FLAG_NEVER_CHECK_SUBJECT", 35)) {
- /* ^ */
+ if (!memcmp(name, "R_PEER_DID_NOT_RETURN_A_CERTIFICATE", 35)) {
+ /* ^ */
-#ifdef X509_CHECK_FLAG_NEVER_CHECK_SUBJECT
- return X509_CHECK_FLAG_NEVER_CHECK_SUBJECT;
+#ifdef SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE
+ return SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE;
#else
goto not_there;
#endif
}
break;
- case 'h':
+ case 'r':
if (!memcmp(name, "TLSEXT_TYPE_certificate_authorities", 35)) {
- /* ^ */
+ /* ^ */
#ifdef TLSEXT_TYPE_certificate_authorities
return TLSEXT_TYPE_certificate_authorities;
diff --git a/helper_script/constants.txt b/helper_script/constants.txt
index 8a03bf3..dfbee0b 100644
--- a/helper_script/constants.txt
+++ b/helper_script/constants.txt
@@ -15,6 +15,12 @@ ASN1_STRFLGS_ESC_CTRL
ASN1_STRFLGS_ESC_MSB
ASN1_STRFLGS_ESC_QUOTE
ASN1_STRFLGS_RFC2253
+CONF_MFLAGS_DEFAULT_SECTION
+CONF_MFLAGS_IGNORE_ERRORS
+CONF_MFLAGS_IGNORE_MISSING_FILE
+CONF_MFLAGS_IGNORE_RETURN_CODES
+CONF_MFLAGS_NO_DSO
+CONF_MFLAGS_SILENT
EVP_PKS_DSA
EVP_PKS_EC
EVP_PKS_RSA
@@ -260,6 +266,26 @@ OPENSSL_INFO_ENGINES_DIR
OPENSSL_INFO_LIST_SEPARATOR
OPENSSL_INFO_MODULES_DIR
OPENSSL_INFO_SEED_SOURCE
+OPENSSL_INIT_ADD_ALL_CIPHERS
+OPENSSL_INIT_ADD_ALL_DIGESTS
+OPENSSL_INIT_ASYNC
+OPENSSL_INIT_ATFORK
+OPENSSL_INIT_ENGINE_AFALG
+OPENSSL_INIT_ENGINE_CAPI
+OPENSSL_INIT_ENGINE_CRYPTODEV
+OPENSSL_INIT_ENGINE_DYNAMIC
+OPENSSL_INIT_ENGINE_OPENSSL
+OPENSSL_INIT_ENGINE_PADLOCK
+OPENSSL_INIT_ENGINE_RDRAND
+OPENSSL_INIT_LOAD_CONFIG
+OPENSSL_INIT_LOAD_CRYPTO_STRINGS
+OPENSSL_INIT_LOAD_SSL_STRINGS
+OPENSSL_INIT_NO_ADD_ALL_CIPHERS
+OPENSSL_INIT_NO_ADD_ALL_DIGESTS
+OPENSSL_INIT_NO_ATEXIT
+OPENSSL_INIT_NO_LOAD_CONFIG
+OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+OPENSSL_INIT_NO_LOAD_SSL_STRINGS
OPENSSL_MODULES_DIR
OPENSSL_PLATFORM
OPENSSL_VERSION
diff --git a/lib/Net/SSLeay.pm b/lib/Net/SSLeay.pm
index ca12167..af2315b 100644
--- a/lib/Net/SSLeay.pm
+++ b/lib/Net/SSLeay.pm
@@ -135,6 +135,12 @@ my @constants = qw(
CLIENT_HELLO_ERROR
CLIENT_HELLO_RETRY
CLIENT_HELLO_SUCCESS
+ CONF_MFLAGS_DEFAULT_SECTION
+ CONF_MFLAGS_IGNORE_ERRORS
+ CONF_MFLAGS_IGNORE_MISSING_FILE
+ CONF_MFLAGS_IGNORE_RETURN_CODES
+ CONF_MFLAGS_NO_DSO
+ CONF_MFLAGS_SILENT
ERROR_NONE
ERROR_SSL
ERROR_SYSCALL
@@ -438,6 +444,26 @@ my @constants = qw(
OPENSSL_INFO_LIST_SEPARATOR
OPENSSL_INFO_MODULES_DIR
OPENSSL_INFO_SEED_SOURCE
+ OPENSSL_INIT_ADD_ALL_CIPHERS
+ OPENSSL_INIT_ADD_ALL_DIGESTS
+ OPENSSL_INIT_ASYNC
+ OPENSSL_INIT_ATFORK
+ OPENSSL_INIT_ENGINE_AFALG
+ OPENSSL_INIT_ENGINE_CAPI
+ OPENSSL_INIT_ENGINE_CRYPTODEV
+ OPENSSL_INIT_ENGINE_DYNAMIC
+ OPENSSL_INIT_ENGINE_OPENSSL
+ OPENSSL_INIT_ENGINE_PADLOCK
+ OPENSSL_INIT_ENGINE_RDRAND
+ OPENSSL_INIT_LOAD_CONFIG
+ OPENSSL_INIT_LOAD_CRYPTO_STRINGS
+ OPENSSL_INIT_LOAD_SSL_STRINGS
+ OPENSSL_INIT_NO_ADD_ALL_CIPHERS
+ OPENSSL_INIT_NO_ADD_ALL_DIGESTS
+ OPENSSL_INIT_NO_ATEXIT
+ OPENSSL_INIT_NO_LOAD_CONFIG
+ OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+ OPENSSL_INIT_NO_LOAD_SSL_STRINGS
OPENSSL_MODULES_DIR
OPENSSL_PLATFORM
OPENSSL_VERSION
diff --git a/lib/Net/SSLeay.pod b/lib/Net/SSLeay.pod
index e96133d..926883b 100644
--- a/lib/Net/SSLeay.pod
+++ b/lib/Net/SSLeay.pod
@@ -10221,377 +10221,390 @@ helper_script/update-exported-constants.
=for start_constants
- AD_ACCESS_DENIED OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
- AD_BAD_CERTIFICATE OP_CIPHER_SERVER_PREFERENCE
- AD_BAD_CERTIFICATE_HASH_VALUE OP_CISCO_ANYCONNECT
- AD_BAD_CERTIFICATE_STATUS_RESPONSE OP_CLEANSE_PLAINTEXT
- AD_BAD_RECORD_MAC OP_COOKIE_EXCHANGE
- AD_CERTIFICATE_EXPIRED OP_CRYPTOPRO_TLSEXT_BUG
- AD_CERTIFICATE_REQUIRED OP_DISABLE_TLSEXT_CA_NAMES
- AD_CERTIFICATE_REVOKED OP_DONT_INSERT_EMPTY_FRAGMENTS
- AD_CERTIFICATE_UNKNOWN OP_ENABLE_KTLS
- AD_CERTIFICATE_UNOBTAINABLE OP_ENABLE_MIDDLEBOX_COMPAT
- AD_CLOSE_NOTIFY OP_EPHEMERAL_RSA
- AD_DECODE_ERROR OP_IGNORE_UNEXPECTED_EOF
- AD_DECOMPRESSION_FAILURE OP_LEGACY_SERVER_CONNECT
- AD_DECRYPTION_FAILED OP_MICROSOFT_BIG_SSLV3_BUFFER
- AD_DECRYPT_ERROR OP_MICROSOFT_SESS_ID_BUG
- AD_EXPORT_RESTRICTION OP_MSIE_SSLV2_RSA_PADDING
- AD_HANDSHAKE_FAILURE OP_NETSCAPE_CA_DN_BUG
- AD_ILLEGAL_PARAMETER OP_NETSCAPE_CHALLENGE_BUG
- AD_INAPPROPRIATE_FALLBACK OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG
- AD_INSUFFICIENT_SECURITY OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
- AD_INTERNAL_ERROR OP_NON_EXPORT_FIRST
- AD_MISSING_EXTENSION OP_NO_ANTI_REPLAY
- AD_NO_APPLICATION_PROTOCOL OP_NO_CLIENT_RENEGOTIATION
- AD_NO_CERTIFICATE OP_NO_COMPRESSION
- AD_NO_RENEGOTIATION OP_NO_ENCRYPT_THEN_MAC
- AD_PROTOCOL_VERSION OP_NO_EXTENDED_MASTER_SECRET
- AD_RECORD_OVERFLOW OP_NO_QUERY_MTU
- AD_UNEXPECTED_MESSAGE OP_NO_RENEGOTIATION
- AD_UNKNOWN_CA OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
- AD_UNKNOWN_PSK_IDENTITY OP_NO_SSL_MASK
- AD_UNRECOGNIZED_NAME OP_NO_SSLv2
- AD_UNSUPPORTED_CERTIFICATE OP_NO_SSLv3
- AD_UNSUPPORTED_EXTENSION OP_NO_TICKET
- AD_USER_CANCELLED OP_NO_TLSv1
- ASN1_STRFLGS_ESC_CTRL OP_NO_TLSv1_1
- ASN1_STRFLGS_ESC_MSB OP_NO_TLSv1_2
- ASN1_STRFLGS_ESC_QUOTE OP_NO_TLSv1_3
- ASN1_STRFLGS_RFC2253 OP_PKCS1_CHECK_1
- ASYNC_NO_JOBS OP_PKCS1_CHECK_2
- ASYNC_PAUSED OP_PRIORITIZE_CHACHA
- CB_ACCEPT_EXIT OP_SAFARI_ECDHE_ECDSA_BUG
- CB_ACCEPT_LOOP OP_SINGLE_DH_USE
- CB_ALERT OP_SINGLE_ECDH_USE
- CB_CONNECT_EXIT OP_SSLEAY_080_CLIENT_DH_BUG
- CB_CONNECT_LOOP OP_SSLREF2_REUSE_CERT_TYPE_BUG
- CB_EXIT OP_TLSEXT_PADDING
- CB_HANDSHAKE_DONE OP_TLS_BLOCK_PADDING_BUG
- CB_HANDSHAKE_START OP_TLS_D5_BUG
- CB_LOOP OP_TLS_ROLLBACK_BUG
- CB_READ READING
- CB_READ_ALERT RECEIVED_SHUTDOWN
- CB_WRITE RETRY_VERIFY
- CB_WRITE_ALERT RSA_3
- CLIENT_HELLO_CB RSA_F4
- CLIENT_HELLO_ERROR R_BAD_AUTHENTICATION_TYPE
- CLIENT_HELLO_RETRY R_BAD_CHECKSUM
- CLIENT_HELLO_SUCCESS R_BAD_MAC_DECODE
- ERROR_NONE R_BAD_RESPONSE_ARGUMENT
- ERROR_SSL R_BAD_SSL_FILETYPE
- ERROR_SYSCALL R_BAD_SSL_SESSION_ID_LENGTH
- ERROR_WANT_ACCEPT R_BAD_STATE
- ERROR_WANT_ASYNC R_BAD_WRITE_RETRY
- ERROR_WANT_ASYNC_JOB R_CHALLENGE_IS_DIFFERENT
- ERROR_WANT_CLIENT_HELLO_CB R_CIPHER_TABLE_SRC_ERROR
- ERROR_WANT_CONNECT R_INVALID_CHALLENGE_LENGTH
- ERROR_WANT_READ R_NO_CERTIFICATE_SET
- ERROR_WANT_RETRY_VERIFY R_NO_CERTIFICATE_SPECIFIED
- ERROR_WANT_WRITE R_NO_CIPHER_LIST
- ERROR_WANT_X509_LOOKUP R_NO_CIPHER_MATCH
- ERROR_ZERO_RETURN R_NO_PRIVATEKEY
- EVP_PKS_DSA R_NO_PUBLICKEY
- EVP_PKS_EC R_NULL_SSL_CTX
- EVP_PKS_RSA R_PEER_DID_NOT_RETURN_A_CERTIFICATE
- EVP_PKT_ENC R_PEER_ERROR
- EVP_PKT_EXCH R_PEER_ERROR_CERTIFICATE
- EVP_PKT_EXP R_PEER_ERROR_NO_CIPHER
- EVP_PKT_SIGN R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE
- EVP_PK_DH R_PUBLIC_KEY_ENCRYPT_ERROR
- EVP_PK_DSA R_PUBLIC_KEY_IS_NOT_RSA
- EVP_PK_EC R_READ_WRONG_PACKET_TYPE
- EVP_PK_RSA R_SHORT_READ
- FILETYPE_ASN1 R_SSL_SESSION_ID_IS_DIFFERENT
- FILETYPE_PEM R_UNABLE_TO_EXTRACT_PUBLIC_KEY
- F_CLIENT_CERTIFICATE R_UNKNOWN_REMOTE_ERROR_TYPE
- F_CLIENT_HELLO R_UNKNOWN_STATE
- F_CLIENT_MASTER_KEY R_X509_LIB
- F_D2I_SSL_SESSION SENT_SHUTDOWN
- F_GET_CLIENT_FINISHED SESSION_ASN1_VERSION
- F_GET_CLIENT_HELLO SESS_CACHE_BOTH
- F_GET_CLIENT_MASTER_KEY SESS_CACHE_CLIENT
- F_GET_SERVER_FINISHED SESS_CACHE_NO_AUTO_CLEAR
- F_GET_SERVER_HELLO SESS_CACHE_NO_INTERNAL
- F_GET_SERVER_VERIFY SESS_CACHE_NO_INTERNAL_LOOKUP
- F_I2D_SSL_SESSION SESS_CACHE_NO_INTERNAL_STORE
- F_READ_N SESS_CACHE_OFF
- F_REQUEST_CERTIFICATE SESS_CACHE_SERVER
- F_SERVER_HELLO SESS_CACHE_UPDATE_TIME
- F_SSL_CERT_NEW SSL2_MT_CLIENT_CERTIFICATE
- F_SSL_GET_NEW_SESSION SSL2_MT_CLIENT_FINISHED
- F_SSL_NEW SSL2_MT_CLIENT_HELLO
- F_SSL_READ SSL2_MT_CLIENT_MASTER_KEY
- F_SSL_RSA_PRIVATE_DECRYPT SSL2_MT_ERROR
- F_SSL_RSA_PUBLIC_ENCRYPT SSL2_MT_REQUEST_CERTIFICATE
- F_SSL_SESSION_NEW SSL2_MT_SERVER_FINISHED
- F_SSL_SESSION_PRINT_FP SSL2_MT_SERVER_HELLO
- F_SSL_SET_FD SSL2_MT_SERVER_VERIFY
- F_SSL_SET_RFD SSL2_VERSION
- F_SSL_SET_WFD SSL3_MT_CCS
- F_SSL_USE_CERTIFICATE SSL3_MT_CERTIFICATE
- F_SSL_USE_CERTIFICATE_ASN1 SSL3_MT_CERTIFICATE_REQUEST
- F_SSL_USE_CERTIFICATE_FILE SSL3_MT_CERTIFICATE_STATUS
- F_SSL_USE_PRIVATEKEY SSL3_MT_CERTIFICATE_URL
- F_SSL_USE_PRIVATEKEY_ASN1 SSL3_MT_CERTIFICATE_VERIFY
- F_SSL_USE_PRIVATEKEY_FILE SSL3_MT_CHANGE_CIPHER_SPEC
- F_SSL_USE_RSAPRIVATEKEY SSL3_MT_CLIENT_HELLO
- F_SSL_USE_RSAPRIVATEKEY_ASN1 SSL3_MT_CLIENT_KEY_EXCHANGE
- F_SSL_USE_RSAPRIVATEKEY_FILE SSL3_MT_ENCRYPTED_EXTENSIONS
- F_WRITE_PENDING SSL3_MT_END_OF_EARLY_DATA
- GEN_DIRNAME SSL3_MT_FINISHED
- GEN_DNS SSL3_MT_HELLO_REQUEST
- GEN_EDIPARTY SSL3_MT_KEY_UPDATE
- GEN_EMAIL SSL3_MT_MESSAGE_HASH
- GEN_IPADD SSL3_MT_NEWSESSION_TICKET
- GEN_OTHERNAME SSL3_MT_NEXT_PROTO
- GEN_RID SSL3_MT_SERVER_DONE
- GEN_URI SSL3_MT_SERVER_HELLO
- GEN_X400 SSL3_MT_SERVER_KEY_EXCHANGE
- LIBRESSL_VERSION_NUMBER SSL3_MT_SUPPLEMENTAL_DATA
- MBSTRING_ASC SSL3_RT_ALERT
- MBSTRING_BMP SSL3_RT_APPLICATION_DATA
- MBSTRING_FLAG SSL3_RT_CHANGE_CIPHER_SPEC
- MBSTRING_UNIV SSL3_RT_HANDSHAKE
- MBSTRING_UTF8 SSL3_RT_HEADER
- MIN_RSA_MODULUS_LENGTH_IN_BYTES SSL3_RT_INNER_CONTENT_TYPE
- MODE_ACCEPT_MOVING_WRITE_BUFFER SSL3_VERSION
- MODE_ASYNC SSLEAY_BUILT_ON
- MODE_AUTO_RETRY SSLEAY_CFLAGS
- MODE_ENABLE_PARTIAL_WRITE SSLEAY_DIR
- MODE_NO_AUTO_CHAIN SSLEAY_PLATFORM
- MODE_RELEASE_BUFFERS SSLEAY_VERSION
- NID_OCSP_sign ST_ACCEPT
- NID_SMIMECapabilities ST_BEFORE
- NID_X500 ST_CONNECT
- NID_X509 ST_INIT
- NID_ad_OCSP ST_OK
- NID_ad_ca_issuers ST_READ_BODY
- NID_algorithm ST_READ_HEADER
- NID_authority_key_identifier TLS1_1_VERSION
- NID_basic_constraints TLS1_2_VERSION
- NID_bf_cbc TLS1_3_VERSION
- NID_bf_cfb64 TLS1_VERSION
- NID_bf_ecb TLSEXT_STATUSTYPE_ocsp
- NID_bf_ofb64 TLSEXT_TYPE_application_layer_protocol_negotiation
- NID_cast5_cbc TLSEXT_TYPE_cert_type
- NID_cast5_cfb64 TLSEXT_TYPE_certificate_authorities
- NID_cast5_ecb TLSEXT_TYPE_client_authz
- NID_cast5_ofb64 TLSEXT_TYPE_client_cert_type
- NID_certBag TLSEXT_TYPE_client_certificate_url
- NID_certificate_policies TLSEXT_TYPE_compress_certificate
- NID_client_auth TLSEXT_TYPE_cookie
- NID_code_sign TLSEXT_TYPE_early_data
- NID_commonName TLSEXT_TYPE_ec_point_formats
- NID_countryName TLSEXT_TYPE_elliptic_curves
- NID_crlBag TLSEXT_TYPE_encrypt_then_mac
- NID_crl_distribution_points TLSEXT_TYPE_extended_master_secret
- NID_crl_number TLSEXT_TYPE_key_share
- NID_crl_reason TLSEXT_TYPE_max_fragment_length
- NID_delta_crl TLSEXT_TYPE_next_proto_neg
- NID_des_cbc TLSEXT_TYPE_padding
- NID_des_cfb64 TLSEXT_TYPE_post_handshake_auth
- NID_des_ecb TLSEXT_TYPE_psk
- NID_des_ede TLSEXT_TYPE_psk_kex_modes
- NID_des_ede3 TLSEXT_TYPE_quic_transport_parameters
- NID_des_ede3_cbc TLSEXT_TYPE_renegotiate
- NID_des_ede3_cfb64 TLSEXT_TYPE_server_authz
- NID_des_ede3_ofb64 TLSEXT_TYPE_server_cert_type
- NID_des_ede_cbc TLSEXT_TYPE_server_name
- NID_des_ede_cfb64 TLSEXT_TYPE_session_ticket
- NID_des_ede_ofb64 TLSEXT_TYPE_signature_algorithms
- NID_des_ofb64 TLSEXT_TYPE_signature_algorithms_cert
- NID_description TLSEXT_TYPE_signed_certificate_timestamp
- NID_desx_cbc TLSEXT_TYPE_srp
- NID_dhKeyAgreement TLSEXT_TYPE_status_request
- NID_dnQualifier TLSEXT_TYPE_supported_groups
- NID_dsa TLSEXT_TYPE_supported_versions
- NID_dsaWithSHA TLSEXT_TYPE_truncated_hmac
- NID_dsaWithSHA1 TLSEXT_TYPE_trusted_ca_keys
- NID_dsaWithSHA1_2 TLSEXT_TYPE_use_srtp
- NID_dsa_2 TLSEXT_TYPE_user_mapping
- NID_email_protect VERIFY_CLIENT_ONCE
- NID_ext_key_usage VERIFY_FAIL_IF_NO_PEER_CERT
- NID_ext_req VERIFY_NONE
- NID_friendlyName VERIFY_PEER
- NID_givenName VERIFY_POST_HANDSHAKE
- NID_hmacWithSHA1 V_OCSP_CERTSTATUS_GOOD
- NID_id_ad V_OCSP_CERTSTATUS_REVOKED
- NID_id_ce V_OCSP_CERTSTATUS_UNKNOWN
- NID_id_kp WRITING
- NID_id_pbkdf2 X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT
- NID_id_pe X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS
- NID_id_pkix X509_CHECK_FLAG_NEVER_CHECK_SUBJECT
- NID_id_qt_cps X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
- NID_id_qt_unotice X509_CHECK_FLAG_NO_WILDCARDS
- NID_idea_cbc X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS
- NID_idea_cfb64 X509_CRL_VERSION_1
- NID_idea_ecb X509_CRL_VERSION_2
- NID_idea_ofb64 X509_FILETYPE_ASN1
- NID_info_access X509_FILETYPE_DEFAULT
- NID_initials X509_FILETYPE_PEM
- NID_invalidity_date X509_LOOKUP
- NID_issuer_alt_name X509_PURPOSE_ANY
- NID_keyBag X509_PURPOSE_CRL_SIGN
- NID_key_usage X509_PURPOSE_NS_SSL_SERVER
- NID_localKeyID X509_PURPOSE_OCSP_HELPER
- NID_localityName X509_PURPOSE_SMIME_ENCRYPT
- NID_md2 X509_PURPOSE_SMIME_SIGN
- NID_md2WithRSAEncryption X509_PURPOSE_SSL_CLIENT
- NID_md5 X509_PURPOSE_SSL_SERVER
- NID_md5WithRSA X509_PURPOSE_TIMESTAMP_SIGN
- NID_md5WithRSAEncryption X509_REQ_VERSION_1
- NID_md5_sha1 X509_REQ_VERSION_2
- NID_mdc2 X509_REQ_VERSION_3
- NID_mdc2WithRSA X509_TRUST_COMPAT
- NID_ms_code_com X509_TRUST_DEFAULT
- NID_ms_code_ind X509_TRUST_EMAIL
- NID_ms_ctl_sign X509_TRUST_OBJECT_SIGN
- NID_ms_efs X509_TRUST_OCSP_REQUEST
- NID_ms_ext_req X509_TRUST_OCSP_SIGN
- NID_ms_sgc X509_TRUST_SSL_CLIENT
- NID_name X509_TRUST_SSL_SERVER
- NID_netscape X509_TRUST_TSA
- NID_netscape_base_url X509_VERSION_1
- NID_netscape_ca_policy_url X509_VERSION_2
- NID_netscape_ca_revocation_url X509_VERSION_3
- NID_netscape_cert_extension X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH
- NID_netscape_cert_sequence X509_V_ERR_AKID_SKID_MISMATCH
- NID_netscape_cert_type X509_V_ERR_APPLICATION_VERIFICATION
- NID_netscape_comment X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL
- NID_netscape_data_type X509_V_ERR_CA_BCONS_NOT_CRITICAL
- NID_netscape_renewal_url X509_V_ERR_CA_CERT_MISSING_KEY_USAGE
- NID_netscape_revocation_url X509_V_ERR_CA_KEY_TOO_SMALL
- NID_netscape_ssl_server_name X509_V_ERR_CA_MD_TOO_WEAK
- NID_ns_sgc X509_V_ERR_CERT_CHAIN_TOO_LONG
- NID_organizationName X509_V_ERR_CERT_HAS_EXPIRED
- NID_organizationalUnitName X509_V_ERR_CERT_NOT_YET_VALID
- NID_pbeWithMD2AndDES_CBC X509_V_ERR_CERT_REJECTED
- NID_pbeWithMD2AndRC2_CBC X509_V_ERR_CERT_REVOKED
- NID_pbeWithMD5AndCast5_CBC X509_V_ERR_CERT_SIGNATURE_FAILURE
- NID_pbeWithMD5AndDES_CBC X509_V_ERR_CERT_UNTRUSTED
- NID_pbeWithMD5AndRC2_CBC X509_V_ERR_CRL_HAS_EXPIRED
- NID_pbeWithSHA1AndDES_CBC X509_V_ERR_CRL_NOT_YET_VALID
- NID_pbeWithSHA1AndRC2_CBC X509_V_ERR_CRL_PATH_VALIDATION_ERROR
- NID_pbe_WithSHA1And128BitRC2_CBC X509_V_ERR_CRL_SIGNATURE_FAILURE
- NID_pbe_WithSHA1And128BitRC4 X509_V_ERR_DANE_NO_MATCH
- NID_pbe_WithSHA1And2_Key_TripleDES_CBC X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT
- NID_pbe_WithSHA1And3_Key_TripleDES_CBC X509_V_ERR_DIFFERENT_CRL_SCOPE
- NID_pbe_WithSHA1And40BitRC2_CBC X509_V_ERR_EC_KEY_EXPLICIT_PARAMS
- NID_pbe_WithSHA1And40BitRC4 X509_V_ERR_EE_KEY_TOO_SMALL
- NID_pbes2 X509_V_ERR_EMAIL_MISMATCH
- NID_pbmac1 X509_V_ERR_EMPTY_SUBJECT_ALT_NAME
- NID_pkcs X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL
- NID_pkcs3 X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD
- NID_pkcs7 X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD
- NID_pkcs7_data X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD
- NID_pkcs7_digest X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD
- NID_pkcs7_encrypted X509_V_ERR_EXCLUDED_VIOLATION
- NID_pkcs7_enveloped X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3
- NID_pkcs7_signed X509_V_ERR_HOSTNAME_MISMATCH
- NID_pkcs7_signedAndEnveloped X509_V_ERR_INVALID_CA
- NID_pkcs8ShroudedKeyBag X509_V_ERR_INVALID_CALL
- NID_pkcs9 X509_V_ERR_INVALID_EXTENSION
- NID_pkcs9_challengePassword X509_V_ERR_INVALID_NON_CA
- NID_pkcs9_contentType X509_V_ERR_INVALID_POLICY_EXTENSION
- NID_pkcs9_countersignature X509_V_ERR_INVALID_PURPOSE
- NID_pkcs9_emailAddress X509_V_ERR_IP_ADDRESS_MISMATCH
- NID_pkcs9_extCertAttributes X509_V_ERR_ISSUER_NAME_EMPTY
- NID_pkcs9_messageDigest X509_V_ERR_KEYUSAGE_NO_CERTSIGN
- NID_pkcs9_signingTime X509_V_ERR_KEYUSAGE_NO_CRL_SIGN
- NID_pkcs9_unstructuredAddress X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE
- NID_pkcs9_unstructuredName X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA
- NID_private_key_usage_period X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER
- NID_rc2_40_cbc X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER
- NID_rc2_64_cbc X509_V_ERR_NO_EXPLICIT_POLICY
- NID_rc2_cbc X509_V_ERR_NO_ISSUER_PUBLIC_KEY
- NID_rc2_cfb64 X509_V_ERR_NO_VALID_SCTS
- NID_rc2_ecb X509_V_ERR_OCSP_CERT_UNKNOWN
- NID_rc2_ofb64 X509_V_ERR_OCSP_VERIFY_FAILED
- NID_rc4 X509_V_ERR_OCSP_VERIFY_NEEDED
- NID_rc4_40 X509_V_ERR_OUT_OF_MEM
- NID_rc5_cbc X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA
- NID_rc5_cfb64 X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN
- NID_rc5_ecb X509_V_ERR_PATH_LENGTH_EXCEEDED
- NID_rc5_ofb64 X509_V_ERR_PATH_LOOP
- NID_ripemd160 X509_V_ERR_PERMITTED_VIOLATION
- NID_ripemd160WithRSA X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED
- NID_rle_compression X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED
- NID_rsa X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION
- NID_rsaEncryption X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN
- NID_rsadsi X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY
- NID_safeContentsBag X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH
- NID_sdsiCertificate X509_V_ERR_STORE_LOOKUP
- NID_secretBag X509_V_ERR_SUBJECT_ISSUER_MISMATCH
- NID_serialNumber X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL
- NID_server_auth X509_V_ERR_SUBJECT_NAME_EMPTY
- NID_sha X509_V_ERR_SUBTREE_MINMAX
- NID_sha1 X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256
- NID_sha1WithRSA X509_V_ERR_SUITE_B_INVALID_ALGORITHM
- NID_sha1WithRSAEncryption X509_V_ERR_SUITE_B_INVALID_CURVE
- NID_sha224 X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM
- NID_sha224WithRSAEncryption X509_V_ERR_SUITE_B_INVALID_VERSION
- NID_sha256 X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED
- NID_sha256WithRSAEncryption X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY
- NID_sha384 X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE
- NID_sha384WithRSAEncryption X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE
- NID_sha3_224 X509_V_ERR_UNABLE_TO_GET_CRL
- NID_sha3_256 X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER
- NID_sha3_384 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT
- NID_sha3_512 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY
- NID_sha512 X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE
- NID_sha512WithRSAEncryption X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION
- NID_sha512_224 X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION
- NID_sha512_224WithRSAEncryption X509_V_ERR_UNNESTED_RESOURCE
- NID_sha512_256 X509_V_ERR_UNSPECIFIED
- NID_sha512_256WithRSAEncryption X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX
- NID_shaWithRSAEncryption X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE
- NID_shake128 X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE
- NID_shake256 X509_V_ERR_UNSUPPORTED_NAME_SYNTAX
- NID_stateOrProvinceName X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM
- NID_subject_alt_name X509_V_FLAG_ALLOW_PROXY_CERTS
- NID_subject_key_identifier X509_V_FLAG_CB_ISSUER_CHECK
- NID_surname X509_V_FLAG_CHECK_SS_SIGNATURE
- NID_sxnet X509_V_FLAG_CRL_CHECK
- NID_time_stamp X509_V_FLAG_CRL_CHECK_ALL
- NID_title X509_V_FLAG_EXPLICIT_POLICY
- NID_undef X509_V_FLAG_EXTENDED_CRL_SUPPORT
- NID_uniqueIdentifier X509_V_FLAG_IGNORE_CRITICAL
- NID_x509Certificate X509_V_FLAG_INHIBIT_ANY
- NID_x509Crl X509_V_FLAG_INHIBIT_MAP
- NID_zlib_compression X509_V_FLAG_LEGACY_VERIFY
- NOTHING X509_V_FLAG_NOTIFY_POLICY
- OCSP_RESPONSE_STATUS_INTERNALERROR X509_V_FLAG_NO_ALT_CHAINS
- OCSP_RESPONSE_STATUS_MALFORMEDREQUEST X509_V_FLAG_NO_CHECK_TIME
- OCSP_RESPONSE_STATUS_SIGREQUIRED X509_V_FLAG_PARTIAL_CHAIN
- OCSP_RESPONSE_STATUS_SUCCESSFUL X509_V_FLAG_POLICY_CHECK
- OCSP_RESPONSE_STATUS_TRYLATER X509_V_FLAG_POLICY_MASK
- OCSP_RESPONSE_STATUS_UNAUTHORIZED X509_V_FLAG_SUITEB_128_LOS
- OPENSSL_BUILT_ON X509_V_FLAG_SUITEB_128_LOS_ONLY
- OPENSSL_CFLAGS X509_V_FLAG_SUITEB_192_LOS
- OPENSSL_CPU_INFO X509_V_FLAG_TRUSTED_FIRST
- OPENSSL_DIR X509_V_FLAG_USE_CHECK_TIME
- OPENSSL_ENGINES_DIR X509_V_FLAG_USE_DELTAS
- OPENSSL_FULL_VERSION_STRING X509_V_FLAG_X509_STRICT
- OPENSSL_INFO_CONFIG_DIR X509_V_OK
- OPENSSL_INFO_CPU_SETTINGS XN_FLAG_COMPAT
- OPENSSL_INFO_DIR_FILENAME_SEPARATOR XN_FLAG_DN_REV
- OPENSSL_INFO_DSO_EXTENSION XN_FLAG_DUMP_UNKNOWN_FIELDS
- OPENSSL_INFO_ENGINES_DIR XN_FLAG_FN_ALIGN
- OPENSSL_INFO_LIST_SEPARATOR XN_FLAG_FN_LN
- OPENSSL_INFO_MODULES_DIR XN_FLAG_FN_MASK
- OPENSSL_INFO_SEED_SOURCE XN_FLAG_FN_NONE
- OPENSSL_MODULES_DIR XN_FLAG_FN_OID
- OPENSSL_PLATFORM XN_FLAG_FN_SN
- OPENSSL_VERSION XN_FLAG_MULTILINE
- OPENSSL_VERSION_MAJOR XN_FLAG_ONELINE
- OPENSSL_VERSION_MINOR XN_FLAG_RFC2253
- OPENSSL_VERSION_NUMBER XN_FLAG_SEP_COMMA_PLUS
- OPENSSL_VERSION_PATCH XN_FLAG_SEP_CPLUS_SPC
- OPENSSL_VERSION_STRING XN_FLAG_SEP_MASK
- OP_ALL XN_FLAG_SEP_MULTILINE
- OP_ALLOW_CLIENT_RENEGOTIATION XN_FLAG_SEP_SPLUS_SPC
- OP_ALLOW_NO_DHE_KEX XN_FLAG_SPC_EQ
+ AD_ACCESS_DENIED OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+ AD_BAD_CERTIFICATE OPENSSL_INIT_NO_LOAD_SSL_STRINGS
+ AD_BAD_CERTIFICATE_HASH_VALUE OPENSSL_MODULES_DIR
+ AD_BAD_CERTIFICATE_STATUS_RESPONSE OPENSSL_PLATFORM
+ AD_BAD_RECORD_MAC OPENSSL_VERSION
+ AD_CERTIFICATE_EXPIRED OPENSSL_VERSION_MAJOR
+ AD_CERTIFICATE_REQUIRED OPENSSL_VERSION_MINOR
+ AD_CERTIFICATE_REVOKED OPENSSL_VERSION_NUMBER
+ AD_CERTIFICATE_UNKNOWN OPENSSL_VERSION_PATCH
+ AD_CERTIFICATE_UNOBTAINABLE OPENSSL_VERSION_STRING
+ AD_CLOSE_NOTIFY OP_ALL
+ AD_DECODE_ERROR OP_ALLOW_CLIENT_RENEGOTIATION
+ AD_DECOMPRESSION_FAILURE OP_ALLOW_NO_DHE_KEX
+ AD_DECRYPTION_FAILED OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
+ AD_DECRYPT_ERROR OP_CIPHER_SERVER_PREFERENCE
+ AD_EXPORT_RESTRICTION OP_CISCO_ANYCONNECT
+ AD_HANDSHAKE_FAILURE OP_CLEANSE_PLAINTEXT
+ AD_ILLEGAL_PARAMETER OP_COOKIE_EXCHANGE
+ AD_INAPPROPRIATE_FALLBACK OP_CRYPTOPRO_TLSEXT_BUG
+ AD_INSUFFICIENT_SECURITY OP_DISABLE_TLSEXT_CA_NAMES
+ AD_INTERNAL_ERROR OP_DONT_INSERT_EMPTY_FRAGMENTS
+ AD_MISSING_EXTENSION OP_ENABLE_KTLS
+ AD_NO_APPLICATION_PROTOCOL OP_ENABLE_MIDDLEBOX_COMPAT
+ AD_NO_CERTIFICATE OP_EPHEMERAL_RSA
+ AD_NO_RENEGOTIATION OP_IGNORE_UNEXPECTED_EOF
+ AD_PROTOCOL_VERSION OP_LEGACY_SERVER_CONNECT
+ AD_RECORD_OVERFLOW OP_MICROSOFT_BIG_SSLV3_BUFFER
+ AD_UNEXPECTED_MESSAGE OP_MICROSOFT_SESS_ID_BUG
+ AD_UNKNOWN_CA OP_MSIE_SSLV2_RSA_PADDING
+ AD_UNKNOWN_PSK_IDENTITY OP_NETSCAPE_CA_DN_BUG
+ AD_UNRECOGNIZED_NAME OP_NETSCAPE_CHALLENGE_BUG
+ AD_UNSUPPORTED_CERTIFICATE OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG
+ AD_UNSUPPORTED_EXTENSION OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
+ AD_USER_CANCELLED OP_NON_EXPORT_FIRST
+ ASN1_STRFLGS_ESC_CTRL OP_NO_ANTI_REPLAY
+ ASN1_STRFLGS_ESC_MSB OP_NO_CLIENT_RENEGOTIATION
+ ASN1_STRFLGS_ESC_QUOTE OP_NO_COMPRESSION
+ ASN1_STRFLGS_RFC2253 OP_NO_ENCRYPT_THEN_MAC
+ ASYNC_NO_JOBS OP_NO_EXTENDED_MASTER_SECRET
+ ASYNC_PAUSED OP_NO_QUERY_MTU
+ CB_ACCEPT_EXIT OP_NO_RENEGOTIATION
+ CB_ACCEPT_LOOP OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
+ CB_ALERT OP_NO_SSL_MASK
+ CB_CONNECT_EXIT OP_NO_SSLv2
+ CB_CONNECT_LOOP OP_NO_SSLv3
+ CB_EXIT OP_NO_TICKET
+ CB_HANDSHAKE_DONE OP_NO_TLSv1
+ CB_HANDSHAKE_START OP_NO_TLSv1_1
+ CB_LOOP OP_NO_TLSv1_2
+ CB_READ OP_NO_TLSv1_3
+ CB_READ_ALERT OP_PKCS1_CHECK_1
+ CB_WRITE OP_PKCS1_CHECK_2
+ CB_WRITE_ALERT OP_PRIORITIZE_CHACHA
+ CLIENT_HELLO_CB OP_SAFARI_ECDHE_ECDSA_BUG
+ CLIENT_HELLO_ERROR OP_SINGLE_DH_USE
+ CLIENT_HELLO_RETRY OP_SINGLE_ECDH_USE
+ CLIENT_HELLO_SUCCESS OP_SSLEAY_080_CLIENT_DH_BUG
+ CONF_MFLAGS_DEFAULT_SECTION OP_SSLREF2_REUSE_CERT_TYPE_BUG
+ CONF_MFLAGS_IGNORE_ERRORS OP_TLSEXT_PADDING
+ CONF_MFLAGS_IGNORE_MISSING_FILE OP_TLS_BLOCK_PADDING_BUG
+ CONF_MFLAGS_IGNORE_RETURN_CODES OP_TLS_D5_BUG
+ CONF_MFLAGS_NO_DSO OP_TLS_ROLLBACK_BUG
+ CONF_MFLAGS_SILENT READING
+ ERROR_NONE RECEIVED_SHUTDOWN
+ ERROR_SSL RETRY_VERIFY
+ ERROR_SYSCALL RSA_3
+ ERROR_WANT_ACCEPT RSA_F4
+ ERROR_WANT_ASYNC R_BAD_AUTHENTICATION_TYPE
+ ERROR_WANT_ASYNC_JOB R_BAD_CHECKSUM
+ ERROR_WANT_CLIENT_HELLO_CB R_BAD_MAC_DECODE
+ ERROR_WANT_CONNECT R_BAD_RESPONSE_ARGUMENT
+ ERROR_WANT_READ R_BAD_SSL_FILETYPE
+ ERROR_WANT_RETRY_VERIFY R_BAD_SSL_SESSION_ID_LENGTH
+ ERROR_WANT_WRITE R_BAD_STATE
+ ERROR_WANT_X509_LOOKUP R_BAD_WRITE_RETRY
+ ERROR_ZERO_RETURN R_CHALLENGE_IS_DIFFERENT
+ EVP_PKS_DSA R_CIPHER_TABLE_SRC_ERROR
+ EVP_PKS_EC R_INVALID_CHALLENGE_LENGTH
+ EVP_PKS_RSA R_NO_CERTIFICATE_SET
+ EVP_PKT_ENC R_NO_CERTIFICATE_SPECIFIED
+ EVP_PKT_EXCH R_NO_CIPHER_LIST
+ EVP_PKT_EXP R_NO_CIPHER_MATCH
+ EVP_PKT_SIGN R_NO_PRIVATEKEY
+ EVP_PK_DH R_NO_PUBLICKEY
+ EVP_PK_DSA R_NULL_SSL_CTX
+ EVP_PK_EC R_PEER_DID_NOT_RETURN_A_CERTIFICATE
+ EVP_PK_RSA R_PEER_ERROR
+ FILETYPE_ASN1 R_PEER_ERROR_CERTIFICATE
+ FILETYPE_PEM R_PEER_ERROR_NO_CIPHER
+ F_CLIENT_CERTIFICATE R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE
+ F_CLIENT_HELLO R_PUBLIC_KEY_ENCRYPT_ERROR
+ F_CLIENT_MASTER_KEY R_PUBLIC_KEY_IS_NOT_RSA
+ F_D2I_SSL_SESSION R_READ_WRONG_PACKET_TYPE
+ F_GET_CLIENT_FINISHED R_SHORT_READ
+ F_GET_CLIENT_HELLO R_SSL_SESSION_ID_IS_DIFFERENT
+ F_GET_CLIENT_MASTER_KEY R_UNABLE_TO_EXTRACT_PUBLIC_KEY
+ F_GET_SERVER_FINISHED R_UNKNOWN_REMOTE_ERROR_TYPE
+ F_GET_SERVER_HELLO R_UNKNOWN_STATE
+ F_GET_SERVER_VERIFY R_X509_LIB
+ F_I2D_SSL_SESSION SENT_SHUTDOWN
+ F_READ_N SESSION_ASN1_VERSION
+ F_REQUEST_CERTIFICATE SESS_CACHE_BOTH
+ F_SERVER_HELLO SESS_CACHE_CLIENT
+ F_SSL_CERT_NEW SESS_CACHE_NO_AUTO_CLEAR
+ F_SSL_GET_NEW_SESSION SESS_CACHE_NO_INTERNAL
+ F_SSL_NEW SESS_CACHE_NO_INTERNAL_LOOKUP
+ F_SSL_READ SESS_CACHE_NO_INTERNAL_STORE
+ F_SSL_RSA_PRIVATE_DECRYPT SESS_CACHE_OFF
+ F_SSL_RSA_PUBLIC_ENCRYPT SESS_CACHE_SERVER
+ F_SSL_SESSION_NEW SESS_CACHE_UPDATE_TIME
+ F_SSL_SESSION_PRINT_FP SSL2_MT_CLIENT_CERTIFICATE
+ F_SSL_SET_FD SSL2_MT_CLIENT_FINISHED
+ F_SSL_SET_RFD SSL2_MT_CLIENT_HELLO
+ F_SSL_SET_WFD SSL2_MT_CLIENT_MASTER_KEY
+ F_SSL_USE_CERTIFICATE SSL2_MT_ERROR
+ F_SSL_USE_CERTIFICATE_ASN1 SSL2_MT_REQUEST_CERTIFICATE
+ F_SSL_USE_CERTIFICATE_FILE SSL2_MT_SERVER_FINISHED
+ F_SSL_USE_PRIVATEKEY SSL2_MT_SERVER_HELLO
+ F_SSL_USE_PRIVATEKEY_ASN1 SSL2_MT_SERVER_VERIFY
+ F_SSL_USE_PRIVATEKEY_FILE SSL2_VERSION
+ F_SSL_USE_RSAPRIVATEKEY SSL3_MT_CCS
+ F_SSL_USE_RSAPRIVATEKEY_ASN1 SSL3_MT_CERTIFICATE
+ F_SSL_USE_RSAPRIVATEKEY_FILE SSL3_MT_CERTIFICATE_REQUEST
+ F_WRITE_PENDING SSL3_MT_CERTIFICATE_STATUS
+ GEN_DIRNAME SSL3_MT_CERTIFICATE_URL
+ GEN_DNS SSL3_MT_CERTIFICATE_VERIFY
+ GEN_EDIPARTY SSL3_MT_CHANGE_CIPHER_SPEC
+ GEN_EMAIL SSL3_MT_CLIENT_HELLO
+ GEN_IPADD SSL3_MT_CLIENT_KEY_EXCHANGE
+ GEN_OTHERNAME SSL3_MT_ENCRYPTED_EXTENSIONS
+ GEN_RID SSL3_MT_END_OF_EARLY_DATA
+ GEN_URI SSL3_MT_FINISHED
+ GEN_X400 SSL3_MT_HELLO_REQUEST
+ LIBRESSL_VERSION_NUMBER SSL3_MT_KEY_UPDATE
+ MBSTRING_ASC SSL3_MT_MESSAGE_HASH
+ MBSTRING_BMP SSL3_MT_NEWSESSION_TICKET
+ MBSTRING_FLAG SSL3_MT_NEXT_PROTO
+ MBSTRING_UNIV SSL3_MT_SERVER_DONE
+ MBSTRING_UTF8 SSL3_MT_SERVER_HELLO
+ MIN_RSA_MODULUS_LENGTH_IN_BYTES SSL3_MT_SERVER_KEY_EXCHANGE
+ MODE_ACCEPT_MOVING_WRITE_BUFFER SSL3_MT_SUPPLEMENTAL_DATA
+ MODE_ASYNC SSL3_RT_ALERT
+ MODE_AUTO_RETRY SSL3_RT_APPLICATION_DATA
+ MODE_ENABLE_PARTIAL_WRITE SSL3_RT_CHANGE_CIPHER_SPEC
+ MODE_NO_AUTO_CHAIN SSL3_RT_HANDSHAKE
+ MODE_RELEASE_BUFFERS SSL3_RT_HEADER
+ NID_OCSP_sign SSL3_RT_INNER_CONTENT_TYPE
+ NID_SMIMECapabilities SSL3_VERSION
+ NID_X500 SSLEAY_BUILT_ON
+ NID_X509 SSLEAY_CFLAGS
+ NID_ad_OCSP SSLEAY_DIR
+ NID_ad_ca_issuers SSLEAY_PLATFORM
+ NID_algorithm SSLEAY_VERSION
+ NID_authority_key_identifier ST_ACCEPT
+ NID_basic_constraints ST_BEFORE
+ NID_bf_cbc ST_CONNECT
+ NID_bf_cfb64 ST_INIT
+ NID_bf_ecb ST_OK
+ NID_bf_ofb64 ST_READ_BODY
+ NID_cast5_cbc ST_READ_HEADER
+ NID_cast5_cfb64 TLS1_1_VERSION
+ NID_cast5_ecb TLS1_2_VERSION
+ NID_cast5_ofb64 TLS1_3_VERSION
+ NID_certBag TLS1_VERSION
+ NID_certificate_policies TLSEXT_STATUSTYPE_ocsp
+ NID_client_auth TLSEXT_TYPE_application_layer_protocol_negotiation
+ NID_code_sign TLSEXT_TYPE_cert_type
+ NID_commonName TLSEXT_TYPE_certificate_authorities
+ NID_countryName TLSEXT_TYPE_client_authz
+ NID_crlBag TLSEXT_TYPE_client_cert_type
+ NID_crl_distribution_points TLSEXT_TYPE_client_certificate_url
+ NID_crl_number TLSEXT_TYPE_compress_certificate
+ NID_crl_reason TLSEXT_TYPE_cookie
+ NID_delta_crl TLSEXT_TYPE_early_data
+ NID_des_cbc TLSEXT_TYPE_ec_point_formats
+ NID_des_cfb64 TLSEXT_TYPE_elliptic_curves
+ NID_des_ecb TLSEXT_TYPE_encrypt_then_mac
+ NID_des_ede TLSEXT_TYPE_extended_master_secret
+ NID_des_ede3 TLSEXT_TYPE_key_share
+ NID_des_ede3_cbc TLSEXT_TYPE_max_fragment_length
+ NID_des_ede3_cfb64 TLSEXT_TYPE_next_proto_neg
+ NID_des_ede3_ofb64 TLSEXT_TYPE_padding
+ NID_des_ede_cbc TLSEXT_TYPE_post_handshake_auth
+ NID_des_ede_cfb64 TLSEXT_TYPE_psk
+ NID_des_ede_ofb64 TLSEXT_TYPE_psk_kex_modes
+ NID_des_ofb64 TLSEXT_TYPE_quic_transport_parameters
+ NID_description TLSEXT_TYPE_renegotiate
+ NID_desx_cbc TLSEXT_TYPE_server_authz
+ NID_dhKeyAgreement TLSEXT_TYPE_server_cert_type
+ NID_dnQualifier TLSEXT_TYPE_server_name
+ NID_dsa TLSEXT_TYPE_session_ticket
+ NID_dsaWithSHA TLSEXT_TYPE_signature_algorithms
+ NID_dsaWithSHA1 TLSEXT_TYPE_signature_algorithms_cert
+ NID_dsaWithSHA1_2 TLSEXT_TYPE_signed_certificate_timestamp
+ NID_dsa_2 TLSEXT_TYPE_srp
+ NID_email_protect TLSEXT_TYPE_status_request
+ NID_ext_key_usage TLSEXT_TYPE_supported_groups
+ NID_ext_req TLSEXT_TYPE_supported_versions
+ NID_friendlyName TLSEXT_TYPE_truncated_hmac
+ NID_givenName TLSEXT_TYPE_trusted_ca_keys
+ NID_hmacWithSHA1 TLSEXT_TYPE_use_srtp
+ NID_id_ad TLSEXT_TYPE_user_mapping
+ NID_id_ce VERIFY_CLIENT_ONCE
+ NID_id_kp VERIFY_FAIL_IF_NO_PEER_CERT
+ NID_id_pbkdf2 VERIFY_NONE
+ NID_id_pe VERIFY_PEER
+ NID_id_pkix VERIFY_POST_HANDSHAKE
+ NID_id_qt_cps V_OCSP_CERTSTATUS_GOOD
+ NID_id_qt_unotice V_OCSP_CERTSTATUS_REVOKED
+ NID_idea_cbc V_OCSP_CERTSTATUS_UNKNOWN
+ NID_idea_cfb64 WRITING
+ NID_idea_ecb X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT
+ NID_idea_ofb64 X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS
+ NID_info_access X509_CHECK_FLAG_NEVER_CHECK_SUBJECT
+ NID_initials X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
+ NID_invalidity_date X509_CHECK_FLAG_NO_WILDCARDS
+ NID_issuer_alt_name X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS
+ NID_keyBag X509_CRL_VERSION_1
+ NID_key_usage X509_CRL_VERSION_2
+ NID_localKeyID X509_FILETYPE_ASN1
+ NID_localityName X509_FILETYPE_DEFAULT
+ NID_md2 X509_FILETYPE_PEM
+ NID_md2WithRSAEncryption X509_LOOKUP
+ NID_md5 X509_PURPOSE_ANY
+ NID_md5WithRSA X509_PURPOSE_CRL_SIGN
+ NID_md5WithRSAEncryption X509_PURPOSE_NS_SSL_SERVER
+ NID_md5_sha1 X509_PURPOSE_OCSP_HELPER
+ NID_mdc2 X509_PURPOSE_SMIME_ENCRYPT
+ NID_mdc2WithRSA X509_PURPOSE_SMIME_SIGN
+ NID_ms_code_com X509_PURPOSE_SSL_CLIENT
+ NID_ms_code_ind X509_PURPOSE_SSL_SERVER
+ NID_ms_ctl_sign X509_PURPOSE_TIMESTAMP_SIGN
+ NID_ms_efs X509_REQ_VERSION_1
+ NID_ms_ext_req X509_REQ_VERSION_2
+ NID_ms_sgc X509_REQ_VERSION_3
+ NID_name X509_TRUST_COMPAT
+ NID_netscape X509_TRUST_DEFAULT
+ NID_netscape_base_url X509_TRUST_EMAIL
+ NID_netscape_ca_policy_url X509_TRUST_OBJECT_SIGN
+ NID_netscape_ca_revocation_url X509_TRUST_OCSP_REQUEST
+ NID_netscape_cert_extension X509_TRUST_OCSP_SIGN
+ NID_netscape_cert_sequence X509_TRUST_SSL_CLIENT
+ NID_netscape_cert_type X509_TRUST_SSL_SERVER
+ NID_netscape_comment X509_TRUST_TSA
+ NID_netscape_data_type X509_VERSION_1
+ NID_netscape_renewal_url X509_VERSION_2
+ NID_netscape_revocation_url X509_VERSION_3
+ NID_netscape_ssl_server_name X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH
+ NID_ns_sgc X509_V_ERR_AKID_SKID_MISMATCH
+ NID_organizationName X509_V_ERR_APPLICATION_VERIFICATION
+ NID_organizationalUnitName X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL
+ NID_pbeWithMD2AndDES_CBC X509_V_ERR_CA_BCONS_NOT_CRITICAL
+ NID_pbeWithMD2AndRC2_CBC X509_V_ERR_CA_CERT_MISSING_KEY_USAGE
+ NID_pbeWithMD5AndCast5_CBC X509_V_ERR_CA_KEY_TOO_SMALL
+ NID_pbeWithMD5AndDES_CBC X509_V_ERR_CA_MD_TOO_WEAK
+ NID_pbeWithMD5AndRC2_CBC X509_V_ERR_CERT_CHAIN_TOO_LONG
+ NID_pbeWithSHA1AndDES_CBC X509_V_ERR_CERT_HAS_EXPIRED
+ NID_pbeWithSHA1AndRC2_CBC X509_V_ERR_CERT_NOT_YET_VALID
+ NID_pbe_WithSHA1And128BitRC2_CBC X509_V_ERR_CERT_REJECTED
+ NID_pbe_WithSHA1And128BitRC4 X509_V_ERR_CERT_REVOKED
+ NID_pbe_WithSHA1And2_Key_TripleDES_CBC X509_V_ERR_CERT_SIGNATURE_FAILURE
+ NID_pbe_WithSHA1And3_Key_TripleDES_CBC X509_V_ERR_CERT_UNTRUSTED
+ NID_pbe_WithSHA1And40BitRC2_CBC X509_V_ERR_CRL_HAS_EXPIRED
+ NID_pbe_WithSHA1And40BitRC4 X509_V_ERR_CRL_NOT_YET_VALID
+ NID_pbes2 X509_V_ERR_CRL_PATH_VALIDATION_ERROR
+ NID_pbmac1 X509_V_ERR_CRL_SIGNATURE_FAILURE
+ NID_pkcs X509_V_ERR_DANE_NO_MATCH
+ NID_pkcs3 X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT
+ NID_pkcs7 X509_V_ERR_DIFFERENT_CRL_SCOPE
+ NID_pkcs7_data X509_V_ERR_EC_KEY_EXPLICIT_PARAMS
+ NID_pkcs7_digest X509_V_ERR_EE_KEY_TOO_SMALL
+ NID_pkcs7_encrypted X509_V_ERR_EMAIL_MISMATCH
+ NID_pkcs7_enveloped X509_V_ERR_EMPTY_SUBJECT_ALT_NAME
+ NID_pkcs7_signed X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL
+ NID_pkcs7_signedAndEnveloped X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD
+ NID_pkcs8ShroudedKeyBag X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD
+ NID_pkcs9 X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD
+ NID_pkcs9_challengePassword X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD
+ NID_pkcs9_contentType X509_V_ERR_EXCLUDED_VIOLATION
+ NID_pkcs9_countersignature X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3
+ NID_pkcs9_emailAddress X509_V_ERR_HOSTNAME_MISMATCH
+ NID_pkcs9_extCertAttributes X509_V_ERR_INVALID_CA
+ NID_pkcs9_messageDigest X509_V_ERR_INVALID_CALL
+ NID_pkcs9_signingTime X509_V_ERR_INVALID_EXTENSION
+ NID_pkcs9_unstructuredAddress X509_V_ERR_INVALID_NON_CA
+ NID_pkcs9_unstructuredName X509_V_ERR_INVALID_POLICY_EXTENSION
+ NID_private_key_usage_period X509_V_ERR_INVALID_PURPOSE
+ NID_rc2_40_cbc X509_V_ERR_IP_ADDRESS_MISMATCH
+ NID_rc2_64_cbc X509_V_ERR_ISSUER_NAME_EMPTY
+ NID_rc2_cbc X509_V_ERR_KEYUSAGE_NO_CERTSIGN
+ NID_rc2_cfb64 X509_V_ERR_KEYUSAGE_NO_CRL_SIGN
+ NID_rc2_ecb X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE
+ NID_rc2_ofb64 X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA
+ NID_rc4 X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER
+ NID_rc4_40 X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER
+ NID_rc5_cbc X509_V_ERR_NO_EXPLICIT_POLICY
+ NID_rc5_cfb64 X509_V_ERR_NO_ISSUER_PUBLIC_KEY
+ NID_rc5_ecb X509_V_ERR_NO_VALID_SCTS
+ NID_rc5_ofb64 X509_V_ERR_OCSP_CERT_UNKNOWN
+ NID_ripemd160 X509_V_ERR_OCSP_VERIFY_FAILED
+ NID_ripemd160WithRSA X509_V_ERR_OCSP_VERIFY_NEEDED
+ NID_rle_compression X509_V_ERR_OUT_OF_MEM
+ NID_rsa X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA
+ NID_rsaEncryption X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN
+ NID_rsadsi X509_V_ERR_PATH_LENGTH_EXCEEDED
+ NID_safeContentsBag X509_V_ERR_PATH_LOOP
+ NID_sdsiCertificate X509_V_ERR_PERMITTED_VIOLATION
+ NID_secretBag X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED
+ NID_serialNumber X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED
+ NID_server_auth X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION
+ NID_sha X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN
+ NID_sha1 X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY
+ NID_sha1WithRSA X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH
+ NID_sha1WithRSAEncryption X509_V_ERR_STORE_LOOKUP
+ NID_sha224 X509_V_ERR_SUBJECT_ISSUER_MISMATCH
+ NID_sha224WithRSAEncryption X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL
+ NID_sha256 X509_V_ERR_SUBJECT_NAME_EMPTY
+ NID_sha256WithRSAEncryption X509_V_ERR_SUBTREE_MINMAX
+ NID_sha384 X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256
+ NID_sha384WithRSAEncryption X509_V_ERR_SUITE_B_INVALID_ALGORITHM
+ NID_sha3_224 X509_V_ERR_SUITE_B_INVALID_CURVE
+ NID_sha3_256 X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM
+ NID_sha3_384 X509_V_ERR_SUITE_B_INVALID_VERSION
+ NID_sha3_512 X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED
+ NID_sha512 X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY
+ NID_sha512WithRSAEncryption X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE
+ NID_sha512_224 X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE
+ NID_sha512_224WithRSAEncryption X509_V_ERR_UNABLE_TO_GET_CRL
+ NID_sha512_256 X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER
+ NID_sha512_256WithRSAEncryption X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT
+ NID_shaWithRSAEncryption X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY
+ NID_shake128 X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE
+ NID_shake256 X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION
+ NID_stateOrProvinceName X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION
+ NID_subject_alt_name X509_V_ERR_UNNESTED_RESOURCE
+ NID_subject_key_identifier X509_V_ERR_UNSPECIFIED
+ NID_surname X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX
+ NID_sxnet X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE
+ NID_time_stamp X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE
+ NID_title X509_V_ERR_UNSUPPORTED_NAME_SYNTAX
+ NID_undef X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM
+ NID_uniqueIdentifier X509_V_FLAG_ALLOW_PROXY_CERTS
+ NID_x509Certificate X509_V_FLAG_CB_ISSUER_CHECK
+ NID_x509Crl X509_V_FLAG_CHECK_SS_SIGNATURE
+ NID_zlib_compression X509_V_FLAG_CRL_CHECK
+ NOTHING X509_V_FLAG_CRL_CHECK_ALL
+ OCSP_RESPONSE_STATUS_INTERNALERROR X509_V_FLAG_EXPLICIT_POLICY
+ OCSP_RESPONSE_STATUS_MALFORMEDREQUEST X509_V_FLAG_EXTENDED_CRL_SUPPORT
+ OCSP_RESPONSE_STATUS_SIGREQUIRED X509_V_FLAG_IGNORE_CRITICAL
+ OCSP_RESPONSE_STATUS_SUCCESSFUL X509_V_FLAG_INHIBIT_ANY
+ OCSP_RESPONSE_STATUS_TRYLATER X509_V_FLAG_INHIBIT_MAP
+ OCSP_RESPONSE_STATUS_UNAUTHORIZED X509_V_FLAG_LEGACY_VERIFY
+ OPENSSL_BUILT_ON X509_V_FLAG_NOTIFY_POLICY
+ OPENSSL_CFLAGS X509_V_FLAG_NO_ALT_CHAINS
+ OPENSSL_CPU_INFO X509_V_FLAG_NO_CHECK_TIME
+ OPENSSL_DIR X509_V_FLAG_PARTIAL_CHAIN
+ OPENSSL_ENGINES_DIR X509_V_FLAG_POLICY_CHECK
+ OPENSSL_FULL_VERSION_STRING X509_V_FLAG_POLICY_MASK
+ OPENSSL_INFO_CONFIG_DIR X509_V_FLAG_SUITEB_128_LOS
+ OPENSSL_INFO_CPU_SETTINGS X509_V_FLAG_SUITEB_128_LOS_ONLY
+ OPENSSL_INFO_DIR_FILENAME_SEPARATOR X509_V_FLAG_SUITEB_192_LOS
+ OPENSSL_INFO_DSO_EXTENSION X509_V_FLAG_TRUSTED_FIRST
+ OPENSSL_INFO_ENGINES_DIR X509_V_FLAG_USE_CHECK_TIME
+ OPENSSL_INFO_LIST_SEPARATOR X509_V_FLAG_USE_DELTAS
+ OPENSSL_INFO_MODULES_DIR X509_V_FLAG_X509_STRICT
+ OPENSSL_INFO_SEED_SOURCE X509_V_OK
+ OPENSSL_INIT_ADD_ALL_CIPHERS XN_FLAG_COMPAT
+ OPENSSL_INIT_ADD_ALL_DIGESTS XN_FLAG_DN_REV
+ OPENSSL_INIT_ASYNC XN_FLAG_DUMP_UNKNOWN_FIELDS
+ OPENSSL_INIT_ATFORK XN_FLAG_FN_ALIGN
+ OPENSSL_INIT_ENGINE_AFALG XN_FLAG_FN_LN
+ OPENSSL_INIT_ENGINE_CAPI XN_FLAG_FN_MASK
+ OPENSSL_INIT_ENGINE_CRYPTODEV XN_FLAG_FN_NONE
+ OPENSSL_INIT_ENGINE_DYNAMIC XN_FLAG_FN_OID
+ OPENSSL_INIT_ENGINE_OPENSSL XN_FLAG_FN_SN
+ OPENSSL_INIT_ENGINE_PADLOCK XN_FLAG_MULTILINE
+ OPENSSL_INIT_ENGINE_RDRAND XN_FLAG_ONELINE
+ OPENSSL_INIT_LOAD_CONFIG XN_FLAG_RFC2253
+ OPENSSL_INIT_LOAD_CRYPTO_STRINGS XN_FLAG_SEP_COMMA_PLUS
+ OPENSSL_INIT_LOAD_SSL_STRINGS XN_FLAG_SEP_CPLUS_SPC
+ OPENSSL_INIT_NO_ADD_ALL_CIPHERS XN_FLAG_SEP_MASK
+ OPENSSL_INIT_NO_ADD_ALL_DIGESTS XN_FLAG_SEP_MULTILINE
+ OPENSSL_INIT_NO_ATEXIT XN_FLAG_SEP_SPLUS_SPC
+ OPENSSL_INIT_NO_LOAD_CONFIG XN_FLAG_SPC_EQ
=for end_constants
diff --git a/t/local/21_constants.t b/t/local/21_constants.t
index 8eb1a8a..01bb81e 100644
--- a/t/local/21_constants.t
+++ b/t/local/21_constants.t
@@ -11,7 +11,7 @@ use Test::Net::SSLeay qw(dies_like);
# We rely on symbolic references in the dies_like() tests:
no strict 'refs';
-plan tests => 744;
+plan tests => 770;
my @constants = qw(
AD_ACCESS_DENIED
@@ -71,6 +71,12 @@ my @constants = qw(
CLIENT_HELLO_ERROR
CLIENT_HELLO_RETRY
CLIENT_HELLO_SUCCESS
+ CONF_MFLAGS_DEFAULT_SECTION
+ CONF_MFLAGS_IGNORE_ERRORS
+ CONF_MFLAGS_IGNORE_MISSING_FILE
+ CONF_MFLAGS_IGNORE_RETURN_CODES
+ CONF_MFLAGS_NO_DSO
+ CONF_MFLAGS_SILENT
ERROR_NONE
ERROR_SSL
ERROR_SYSCALL
@@ -374,6 +380,26 @@ my @constants = qw(
OPENSSL_INFO_LIST_SEPARATOR
OPENSSL_INFO_MODULES_DIR
OPENSSL_INFO_SEED_SOURCE
+ OPENSSL_INIT_ADD_ALL_CIPHERS
+ OPENSSL_INIT_ADD_ALL_DIGESTS
+ OPENSSL_INIT_ASYNC
+ OPENSSL_INIT_ATFORK
+ OPENSSL_INIT_ENGINE_AFALG
+ OPENSSL_INIT_ENGINE_CAPI
+ OPENSSL_INIT_ENGINE_CRYPTODEV
+ OPENSSL_INIT_ENGINE_DYNAMIC
+ OPENSSL_INIT_ENGINE_OPENSSL
+ OPENSSL_INIT_ENGINE_PADLOCK
+ OPENSSL_INIT_ENGINE_RDRAND
+ OPENSSL_INIT_LOAD_CONFIG
+ OPENSSL_INIT_LOAD_CRYPTO_STRINGS
+ OPENSSL_INIT_LOAD_SSL_STRINGS
+ OPENSSL_INIT_NO_ADD_ALL_CIPHERS
+ OPENSSL_INIT_NO_ADD_ALL_DIGESTS
+ OPENSSL_INIT_NO_ATEXIT
+ OPENSSL_INIT_NO_LOAD_CONFIG
+ OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
+ OPENSSL_INIT_NO_LOAD_SSL_STRINGS
OPENSSL_MODULES_DIR
OPENSSL_PLATFORM
OPENSSL_VERSION