/third_party/openssl/crypto/x509v3/ |
D | v3_ncons.c | 278 if (r != X509_V_OK) in NAME_CONSTRAINTS_check() 298 if (r != X509_V_OK) in NAME_CONSTRAINTS_check() 307 if (r != X509_V_OK) in NAME_CONSTRAINTS_check() 311 return X509_V_OK; in NAME_CONSTRAINTS_check() 402 return X509_V_OK; in cn2dnsid() 405 return X509_V_OK; in cn2dnsid() 438 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN() 447 if (r != X509_V_OK) in NAME_CONSTRAINTS_check_CN() 450 return X509_V_OK; in NAME_CONSTRAINTS_check_CN() 475 if (r == X509_V_OK) in nc_match() [all …]
|
D | v3_purp.c | 363 return X509_V_OK; in check_sig_alg_match() 520 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ in x509v3_cache_extensions() 522 && check_sig_alg_match(X509_get0_pubkey(x), x) == X509_V_OK) in x509v3_cache_extensions() 829 return X509_V_OK; in x509_signing_allowed() 850 if ((ret = x509_likely_issued(issuer, subject)) != X509_V_OK) in X509_check_issued() 871 if (ret != X509_V_OK) in x509_likely_issued() 883 return X509_V_OK; in X509_check_akid() 915 return X509_V_OK; in X509_check_akid()
|
/third_party/openssl/crypto/x509/ |
D | x509_cmp.c | 352 return X509_V_OK; in check_suite_b() 363 return X509_V_OK; in X509_chain_check_suiteb() 392 if (rv != X509_V_OK) { in X509_chain_check_suiteb() 406 if (rv != X509_V_OK) in X509_chain_check_suiteb() 413 if (rv != X509_V_OK) { in X509_chain_check_suiteb() 434 return X509_V_OK; in X509_CRL_check_suiteb()
|
D | x509_vfy.c | 161 if (err != X509_V_OK) in verify_cb_cert() 227 if (err != X509_V_OK) { in verify_chain() 310 if (ret <= 0 && ctx->error == X509_V_OK) in X509_verify_cert() 352 return x509_likely_issued(issuer, x) == X509_V_OK; in check_issued() 545 if (ret == 0 && !verify_cb_cert(ctx, x, i, X509_V_OK)) in check_chain_extensions() 637 int err = X509_V_OK; in check_name_constraints() 693 if (err != X509_V_OK in check_name_constraints() 711 if (rv == X509_V_OK && i == 0 in check_name_constraints() 720 case X509_V_OK: in check_name_constraints() 1254 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { in crl_akid_check() [all …]
|
D | x509_txt.c | 24 case X509_V_OK: in X509_verify_cert_error_string()
|
/third_party/openssl/test/ |
D | crltest.c | 264 status = X509_verify_cert(ctx) == 1 ? X509_V_OK in verify() 303 X509_V_FLAG_CRL_CHECK), X509_V_OK) in test_basic_crl() 341 X509_V_FLAG_CRL_CHECK), X509_V_OK); in test_known_critical_crl()
|
D | danetest.c | 357 SSL_set_verify_result(ssl, X509_V_OK); in test_tlsafile() 364 if (want == X509_V_OK) in test_tlsafile()
|
/third_party/openssl/doc/man3/ |
D | SSL_get_verify_result.pod | 31 X509_V_OK. This is because no verification error occurred, it does however 41 =item X509_V_OK
|
D | X509_check_issued.pod | 28 Function return B<X509_V_OK> if certificate I<subject> is issued by
|
D | SSL_get_peer_cert_chain.pod | 32 X509_V_OK) the chain may be incomplete or invalid.
|
D | SSL_set1_host.pod | 92 if (SSL_get_verify_result(ssl) == X509_V_OK) {
|
D | X509_STORE_CTX_set_verify_cb.pod | 180 if (err == X509_V_OK && ok == 2)
|
D | X509_STORE_CTX_get_error.pod | 80 X509_STORE_CTX_get_error() returns B<X509_V_OK> or an error code. 98 =item B<X509_V_OK: ok>
|
D | SSL_CTX_set_ct_validation_callback.pod | 46 was B<X509_V_OK> it will be set to B<X509_V_ERR_NO_VALID_SCTS> after the
|
D | SSL_CTX_dane_enable.pod | 291 if (SSL_get_verify_result(ssl) == X509_V_OK) { 302 } else if (SSL_get_verify_result(ssl) == X509_V_OK) {
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-client.c | 100 if (err != X509_V_OK) { in OpenSSL_client_verify_callback() 117 X509_STORE_CTX_set_error(x509_ctx, X509_V_OK); in OpenSSL_client_verify_callback() 123 X509_STORE_CTX_set_error(x509_ctx, X509_V_OK); in OpenSSL_client_verify_callback() 136 X509_STORE_CTX_set_error(x509_ctx, X509_V_OK); in OpenSSL_client_verify_callback() 199 if (err != X509_V_OK) { in OpenSSL_client_verify_callback() 615 case X509_V_OK: in lws_tls_client_confirm_peer_cert()
|
D | openssl-x509.c | 396 X509_V_OK; in lws_tls_peer_cert_info() 461 if (ret != X509_V_OK) { in lws_x509_verify()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | x509_vfy.h | 22 #define X509_V_OK 0 macro
|
/third_party/openssl/apps/ |
D | verify.c | 238 if (i > 0 && X509_STORE_CTX_get_error(csc) == X509_V_OK) { in check() 317 if (cert_error == X509_V_OK && ok == 2) in cb()
|
D | s_cb.c | 27 VERIFY_CB_ARGS verify_args = { -1, 0, X509_V_OK, 0 }; 99 if (err == X509_V_OK && ok == 2 && !verify_args.quiet) in verify_callback() 1155 if (verify_err == X509_V_OK) { in print_verify_detail()
|
D | s_time.c | 381 if (verify_args.error != X509_V_OK) in doConnection()
|
/third_party/node/src/ |
D | node_crypto_common.cc | 155 return X509_V_OK; in VerifyPeerCertificate() 369 if (X509_check_issued(ca, cert->get()) != X509_V_OK) in AddIssuerChainToObject() 400 while (X509_check_issued(cert->get(), cert->get()) != X509_V_OK) { in GetLastIssuedCert() 1288 if (X509_check_issued(cert.get(), cert.get()) == X509_V_OK && in GetPeerCert()
|
/third_party/curl/lib/vtls/ |
D | openssl.c | 1911 if(X509_check_issued(issuer, responder) == X509_V_OK) { in verifystatus() 1938 if(X509_check_issued(issuer, cert) == X509_V_OK) { in verifystatus() 2631 SSL_SET_OPTION_LVALUE(certverifyresult) = !X509_V_OK; in ossl_connect_step1() 3350 if(lerr != X509_V_OK) { in ossl_connect_step2() 3947 if(X509_check_issued(issuer, backend->server_cert) != X509_V_OK) { in servercert() 3966 if(lerr != X509_V_OK) { in servercert()
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-client.c | 309 case X509_V_OK: in lws_tls_client_confirm_peer_cert()
|
D | mbedtls-x509.c | 303 buf->verified = SSL_get_verify_result(wsi->tls.ssl) == X509_V_OK; in lws_tls_peer_cert_info()
|