Home
last modified time | relevance | path

Searched refs:X509_V_OK (Results 1 – 25 of 51) sorted by relevance

123

/third_party/openssl/crypto/x509v3/
Dv3_ncons.c278 if (r != X509_V_OK) in NAME_CONSTRAINTS_check()
298 if (r != X509_V_OK) in NAME_CONSTRAINTS_check()
307 if (r != X509_V_OK) in NAME_CONSTRAINTS_check()
311 return X509_V_OK; in NAME_CONSTRAINTS_check()
402 return X509_V_OK; in cn2dnsid()
405 return X509_V_OK; in cn2dnsid()
438 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN()
447 if (r != X509_V_OK) in NAME_CONSTRAINTS_check_CN()
450 return X509_V_OK; in NAME_CONSTRAINTS_check_CN()
475 if (r == X509_V_OK) in nc_match()
[all …]
Dv3_purp.c363 return X509_V_OK; in check_sig_alg_match()
520 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ in x509v3_cache_extensions()
522 && check_sig_alg_match(X509_get0_pubkey(x), x) == X509_V_OK) in x509v3_cache_extensions()
829 return X509_V_OK; in x509_signing_allowed()
850 if ((ret = x509_likely_issued(issuer, subject)) != X509_V_OK) in X509_check_issued()
871 if (ret != X509_V_OK) in x509_likely_issued()
883 return X509_V_OK; in X509_check_akid()
915 return X509_V_OK; in X509_check_akid()
/third_party/openssl/crypto/x509/
Dx509_cmp.c352 return X509_V_OK; in check_suite_b()
363 return X509_V_OK; in X509_chain_check_suiteb()
392 if (rv != X509_V_OK) { in X509_chain_check_suiteb()
406 if (rv != X509_V_OK) in X509_chain_check_suiteb()
413 if (rv != X509_V_OK) { in X509_chain_check_suiteb()
434 return X509_V_OK; in X509_CRL_check_suiteb()
Dx509_vfy.c161 if (err != X509_V_OK) in verify_cb_cert()
227 if (err != X509_V_OK) { in verify_chain()
310 if (ret <= 0 && ctx->error == X509_V_OK) in X509_verify_cert()
352 return x509_likely_issued(issuer, x) == X509_V_OK; in check_issued()
545 if (ret == 0 && !verify_cb_cert(ctx, x, i, X509_V_OK)) in check_chain_extensions()
637 int err = X509_V_OK; in check_name_constraints()
693 if (err != X509_V_OK in check_name_constraints()
711 if (rv == X509_V_OK && i == 0 in check_name_constraints()
720 case X509_V_OK: in check_name_constraints()
1254 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { in crl_akid_check()
[all …]
Dx509_txt.c24 case X509_V_OK: in X509_verify_cert_error_string()
/third_party/openssl/test/
Dcrltest.c264 status = X509_verify_cert(ctx) == 1 ? X509_V_OK in verify()
303 X509_V_FLAG_CRL_CHECK), X509_V_OK) in test_basic_crl()
341 X509_V_FLAG_CRL_CHECK), X509_V_OK); in test_known_critical_crl()
Ddanetest.c357 SSL_set_verify_result(ssl, X509_V_OK); in test_tlsafile()
364 if (want == X509_V_OK) in test_tlsafile()
/third_party/openssl/doc/man3/
DSSL_get_verify_result.pod31 X509_V_OK. This is because no verification error occurred, it does however
41 =item X509_V_OK
DX509_check_issued.pod28 Function return B<X509_V_OK> if certificate I<subject> is issued by
DSSL_get_peer_cert_chain.pod32 X509_V_OK) the chain may be incomplete or invalid.
DSSL_set1_host.pod92 if (SSL_get_verify_result(ssl) == X509_V_OK) {
DX509_STORE_CTX_set_verify_cb.pod180 if (err == X509_V_OK && ok == 2)
DX509_STORE_CTX_get_error.pod80 X509_STORE_CTX_get_error() returns B<X509_V_OK> or an error code.
98 =item B<X509_V_OK: ok>
DSSL_CTX_set_ct_validation_callback.pod46 was B<X509_V_OK> it will be set to B<X509_V_ERR_NO_VALID_SCTS> after the
DSSL_CTX_dane_enable.pod291 if (SSL_get_verify_result(ssl) == X509_V_OK) {
302 } else if (SSL_get_verify_result(ssl) == X509_V_OK) {
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-client.c100 if (err != X509_V_OK) { in OpenSSL_client_verify_callback()
117 X509_STORE_CTX_set_error(x509_ctx, X509_V_OK); in OpenSSL_client_verify_callback()
123 X509_STORE_CTX_set_error(x509_ctx, X509_V_OK); in OpenSSL_client_verify_callback()
136 X509_STORE_CTX_set_error(x509_ctx, X509_V_OK); in OpenSSL_client_verify_callback()
199 if (err != X509_V_OK) { in OpenSSL_client_verify_callback()
615 case X509_V_OK: in lws_tls_client_confirm_peer_cert()
Dopenssl-x509.c396 X509_V_OK; in lws_tls_peer_cert_info()
461 if (ret != X509_V_OK) { in lws_x509_verify()
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/
Dx509_vfy.h22 #define X509_V_OK 0 macro
/third_party/openssl/apps/
Dverify.c238 if (i > 0 && X509_STORE_CTX_get_error(csc) == X509_V_OK) { in check()
317 if (cert_error == X509_V_OK && ok == 2) in cb()
Ds_cb.c27 VERIFY_CB_ARGS verify_args = { -1, 0, X509_V_OK, 0 };
99 if (err == X509_V_OK && ok == 2 && !verify_args.quiet) in verify_callback()
1155 if (verify_err == X509_V_OK) { in print_verify_detail()
Ds_time.c381 if (verify_args.error != X509_V_OK) in doConnection()
/third_party/node/src/
Dnode_crypto_common.cc155 return X509_V_OK; in VerifyPeerCertificate()
369 if (X509_check_issued(ca, cert->get()) != X509_V_OK) in AddIssuerChainToObject()
400 while (X509_check_issued(cert->get(), cert->get()) != X509_V_OK) { in GetLastIssuedCert()
1288 if (X509_check_issued(cert.get(), cert.get()) == X509_V_OK && in GetPeerCert()
/third_party/curl/lib/vtls/
Dopenssl.c1911 if(X509_check_issued(issuer, responder) == X509_V_OK) { in verifystatus()
1938 if(X509_check_issued(issuer, cert) == X509_V_OK) { in verifystatus()
2631 SSL_SET_OPTION_LVALUE(certverifyresult) = !X509_V_OK; in ossl_connect_step1()
3350 if(lerr != X509_V_OK) { in ossl_connect_step2()
3947 if(X509_check_issued(issuer, backend->server_cert) != X509_V_OK) { in servercert()
3966 if(lerr != X509_V_OK) { in servercert()
/third_party/libwebsockets/lib/tls/mbedtls/
Dmbedtls-client.c309 case X509_V_OK: in lws_tls_client_confirm_peer_cert()
Dmbedtls-x509.c303 buf->verified = SSL_get_verify_result(wsi->tls.ssl) == X509_V_OK; in lws_tls_peer_cert_info()

123