Home
last modified time | relevance | path

Searched refs:verification (Results 1 – 25 of 331) sorted by relevance

12345678910>>...14

/third_party/openssl/doc/man3/
DSSL_CTX_set_cert_verify_callback.pod5 SSL_CTX_set_cert_verify_callback - set peer certificate verification procedure
17 SSL_CTX_set_cert_verify_callback() sets the verification callback function for
23 Whenever a certificate is verified during a SSL/TLS handshake, a verification
25 verification callback function, the built-in verification function is used.
26 If a verification callback I<callback> is specified via
30 When the verification must be performed, I<callback> will be called with
34 I<callback> should return 1 to indicate verification success and 0 to
35 indicate verification failure. If SSL_VERIFY_PEER is set and I<callback>
36 returns 0, the handshake will fail. As the verification procedure may
38 returning 1) the verification result must be set in any case using the
[all …]
DSSL_CTX_set_verify.pod12 - set peer certificate verification parameters
33 SSL_CTX_set_verify() sets the verification flags for B<ctx> to be B<mode> and
37 SSL_set_verify() sets the verification flags for B<ssl> to be B<mode> and
45 of the current SSL object that is doing the verification.
48 verification that shall be allowed for B<ctx>.
51 verification that shall be allowed for B<ssl>.
66 The verification of certificates can be controlled by a set of logically
78 certificate verification process can be checked after the TLS/SSL handshake
80 The handshake will be continued regardless of the verification result.
85 The certificate returned (if any) is checked. If the verification process
[all …]
DSSL_get_verify_result.pod5 SSL_get_verify_result - get result of peer certificate verification
15 SSL_get_verify_result() returns the result of the verification of the
20 SSL_get_verify_result() can only return one error code while the verification
22 the last verification error that occurred during the processing is available
25 The verification result is part of the established session and is restored
31 X509_V_OK. This is because no verification error occurred, it does however
43 The verification succeeded or no peer certificate was presented.
DSSL_CTX_get_verify_mode.pod5 …h, SSL_get_verify_callback, SSL_CTX_get_verify_callback - get currently set verification parameters
20 SSL_CTX_get_verify_mode() returns the verification mode currently set in
23 SSL_get_verify_mode() returns the verification mode currently set in
26 SSL_CTX_get_verify_depth() returns the verification depth limit currently set
30 SSL_get_verify_depth() returns the verification depth limit currently set
34 SSL_CTX_get_verify_callback() returns a function pointer to the verification
38 SSL_get_verify_callback() returns a function pointer to the verification
DX509_STORE_CTX_set_verify_cb.pod18 - get and set verification callback
44 X509_STORE_CTX_set_verify_cb() sets the verification callback of B<ctx> to
47 The verification callback can be used to customise the operation of certificate
48 verification, either by overriding error conditions or logging errors for
51 However, a verification callback is B<not> essential and the default operation
61 is performing the verification operation. A callback can examine this
81 In general a verification callback should B<NOT> unconditionally return 1 in
82 all circumstances because this will allow verification to succeed no matter
89 The verification callback can be set and inherited from the parent structure
90 performing the operation. In some cases (such as S/MIME verification) the
[all …]
DSSL_set_verify_result.pod5 SSL_set_verify_result - override result of peer certificate verification
16 result of the verification of the X509 certificate presented by the peer,
21 SSL_set_verify_result() overrides the verification result. It only changes
22 the verification result of the B<ssl> object. It does not become part of the
DX509_VERIFY_PARAM_set_flags.pod19 - X509 verification parameters
70 a certificate verification operation.
79 which specifies how verification flags are copied from one structure to
85 X509_VERIFY_PARAM_set_purpose() sets the verification purpose in B<param>
92 X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to
104 X509_VERIFY_PARAM_set_depth() sets the maximum verification depth to B<depth>.
140 certificate verification automatically invokes L<X509_check_host(3)>
146 be suppressed as appropriate when DANE verification is enabled.
184 is specified, certificate verification automatically invokes
190 address is specified, certificate verification automatically invokes
[all …]
DEVP_PKEY_verify.pod5 EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public key algorithm
19 context using key B<pkey> for a signature verification operation.
21 The EVP_PKEY_verify() function performs a public key verification operation
37 EVP_PKEY_verify_init() and EVP_PKEY_verify() return 1 if the verification was
43 A negative value indicates an error other that signature verification failure.
DSSL_CTX_set1_verify_cert_store.pod9 verification or chain store
28 set the certificate store used for certificate verification to B<st>.
49 The verification store is used to verify the certificate chain sent by the
50 peer: that is an SSL/TLS client will use the verification store to verify
65 If the chain or the verification store is not set then the store associated
DSSL_CTX_set_cert_store.pod5 … SSL_CTX_set1_cert_store, SSL_CTX_get_cert_store - manipulate X509 certificate verification storage
17 SSL_CTX_set_cert_store() sets/replaces the certificate verification storage
21 SSL_CTX_set1_cert_store() sets/replaces the certificate verification storage
26 verification storage.
44 the verification takes place. So will e.g. the verify_callback() be
DEVP_VerifyInit.pod7 - EVP signature verification functions
22 The EVP signature verification routines are a high-level interface to digital
25 EVP_VerifyInit_ex() sets up verification context B<ctx> to use digest
30 verification context B<ctx>. This function can be called several times on the
36 EVP_VerifyInit() initializes verification context B<ctx> to use the default
DSSL_CTX_set_ct_validation_callback.pod41 TLS handshake with the verification mode set to B<SSL_VERIFY_PEER>, if the peer
43 If the verification mode is B<SSL_VERIFY_NONE>, the handshake will continue
45 However, in that case if the verification status before the built-in callback
49 handshake completion, even after session resumption since the verification
54 handshake continues, and the verification status is not modified, regardless of
69 The TLS handshake is aborted if the verification mode is not B<SSL_VERIFY_NONE>
88 nor to have specified server verification via DANE-TA(2) or DANE-EE(3) TLSA
DSSL_CTX_get0_param.pod6 get and set verification parameters
20 the verification parameters for B<ctx> or B<ssl> respectively. The returned
23 SSL_CTX_set1_param() and SSL_set1_param() set the verification parameters
DX509_STORE_CTX_new.pod69 X509_STORE_CTX_init() sets up B<ctx> for a subsequent verification operation.
95 verification to B<sk>. These CRLs will only be used if CRL verification is
101 to the verification parameters associated with B<ctx>.
109 X509_STORE_CTX_set0_param() sets the internal verification parameter pointer
112 X509_STORE_CTX_set_default() looks up and sets the default verification
146 custom "purpose" (see below) or supply a nondefault verification callback
159 same time. During verification this trust setting will be verified to check it
184 for verification is set from the I<purpose> argument, and the trust is set from
DEVP_DigestVerifyInit.pod6 EVP_DigestVerify - EVP signature verification functions
24 EVP_DigestVerifyInit() sets up verification context B<ctx> to use digest
27 EVP_PKEY_CTX of the verification operation will be written to B<*pctx>: this
28 can be used to set alternative verification options. Note that any existing
39 verification context B<ctx>. This function can be called several times on the
DCMS_verify.pod21 chain verification. B<indata> is the detached content if the content is not
86 lookup certificates in a database or perform customised verification. This
91 setting B<CMS_NO_CONTENT_VERIFY> will totally disable all content verification
96 Chain verification should arguably be performed using the signing time rather
103 CMS_verify() returns 1 for a successful verification and zero if an error
DSSL_set1_host.pod6 SSL server verification parameters
25 B<name> is specified, certificate verification automatically checks
69 SSL_get0_peername() returns NULL if peername verification is not
72 whether verification succeeded call L<SSL_get_verify_result(3)>.
DX509_STORE_get0_param.pod18 X509_STORE_set1_param() sets the verification parameters
21 X509_STORE_get0_param() retrieves an internal pointer to the verification
DX509_STORE_CTX_get_error.pod9 X509_verify_cert_error_string - get or set certificate verification status
31 an error or in a verification callback to determine the nature of an error.
37 it might be used in a verification callback to set an error based on additional
56 It may be examined by a verification callback invoked to handle each error
57 encountered during chain verification and is no longer required after such a
76 verification error B<n>.
88 verification error B<n>.
262 The verification flags were set to require and explicit policy but none was
302 =item B<X509_V_ERR_APPLICATION_VERIFICATION: application verification failure>
/third_party/vk-gl-cts/external/openglcts/modules/gles31/
Des31cArrayOfArraysTests.cpp4505 std::string verification; in test_shader_compilation() local
4522 verification = iterator_declaration; in test_shader_compilation()
4523 verification += " float result = 1.0;\n"; in test_shader_compilation()
4524 verification += iteration_loop_start; in test_shader_compilation()
4525 verification += " if (my_array[a][b][c][d] " + in test_shader_compilation()
4533 verification += iteration_loop_end; in test_shader_compilation()
4537 execute_draw_test(tested_shader_type, function_definition, function_use, verification); in test_shader_compilation()
4541 execute_dispatch_test(tested_shader_type, function_definition, function_use, verification); in test_shader_compilation()
4566 const std::string& function_use, const std::string& verification) in execute_dispatch_test() argument
4569 prepare_compute_shader(tested_shader_type, function_definition, function_use, verification); in execute_dispatch_test()
[all …]
Des31cArrayOfArraysTests.hpp1623 const std::string& verification);
1627 const std::string& verification);
1631 const std::string& verification);
1635 const std::string& verification);
1639 const std::string& verification);
1643 const std::string& verification);
1647 const std::string& verification);
1651 const std::string& verification);
2294 const std::string& verification, bool use_original, bool expect_invalid_result);
2298 const std::string& verification, bool use_original, bool expect_invalid_result);
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_x509parse.data426 X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN)
430 X509 CRT verification #1a (Revoked Cert, Future CRL, no CN)
434 X509 CRT verification #2 (Revoked Cert, Expired CRL)
438 X509 CRT verification #2a (Revoked Cert, Future CRL)
442 X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch)
446 X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch)
450 X509 CRT verification #4 (Valid Cert, Expired CRL)
454 X509 CRT verification #4a (Revoked Cert, Future CRL)
458 X509 CRT verification #5 (Revoked Cert)
462 X509 CRT verification #5' (Revoked Cert, differing DN string formats #1)
[all …]
Dtest_suite_psa_crypto_se_driver_hal_mocks.data55 SE verification mock test
58 SE verification mock test: verify failed
/third_party/openssl/test/ssl-tests/
D03-custom_verify.conf.in16 # Sanity-check that verification indeed succeeds without the
54 # Sanity-check that verification indeed succeeds if peer verification
100 # Sanity-check that verification indeed fails without the
/third_party/openssl/doc/man7/
Dct.pod13 This library implements Certificate Transparency (CT) verification for TLS
14 clients, as defined in RFC 6962. This verification can provide some confidence

12345678910>>...14