/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_verify.pod | 20 void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, SSL_verify_cb verify_callback); 21 void SSL_set_verify(SSL *ssl, int mode, SSL_verify_cb verify_callback); 34 specifies the B<verify_callback> function to be used. If no callback function 35 shall be specified, the NULL pointer can be used for B<verify_callback>. 38 specifies the B<verify_callback> function to be used. If no callback function 39 shall be specified, the NULL pointer can be used for B<verify_callback>. In 40 this case last B<verify_callback> set specifically for this B<ssl> remains. If 47 In client mode B<verify_callback> may also call the L<SSL_set_retry_verify(3)> 153 and the verify_callback() function, but the way this information is used 170 The B<verify_callback> function is used to control the behaviour when the [all …]
|
D | X509_STORE_CTX_set_verify_cb.pod | 111 int verify_callback(int ok, X509_STORE_CTX *ctx) { 118 int verify_callback(int ok, X509_STORE_CTX *ctx) { 129 int verify_callback(int ok, X509_STORE_CTX *ctx) 145 int verify_callback(int ok, X509_STORE_CTX *ctx)
|
D | SSL_CTX_set_cert_verify_callback.pod | 66 Within I<x509_store_ctx>, I<callback> has access to the I<verify_callback> 76 B<verify_callback> function called during the verification process. The 83 the B<verify_callback> function.
|
D | SSL_CTX_set_cert_store.pod | 44 the verification takes place. So will e.g. the verify_callback() be 45 overridden with the verify_callback() set via the
|
/third_party/openssl/test/ |
D | ssl_test_ctx_test.c | 39 if (!TEST_int_eq(conf1->verify_callback, conf2->verify_callback) in clientconf_eq() 179 fixture->expected_ctx->extra.client.verify_callback = in test_good_configuration()
|
D | ssl_old_test.c | 85 static int verify_callback(int ok, X509_STORE_CTX *ctx); 1557 verify_callback); in main() 1560 verify_callback); in main() 1568 SSL_CTX_set_verify(c_ctx, SSL_VERIFY_PEER, verify_callback); in main() 2874 static int verify_callback(int ok, X509_STORE_CTX *ctx) in verify_callback() function
|
/third_party/openssl/test/helpers/ |
D | ssl_test_ctx.h | 99 ssl_verify_callback_t verify_callback; member 236 const char *ssl_verify_callback_name(ssl_verify_callback_t verify_callback);
|
D | handshake.c | 509 switch (extra->client.verify_callback) { in configure_handshake_ctx() 1643 if (extra->client.verify_callback == SSL_TEST_VERIFY_RETRY_ONCE in do_handshake_internal()
|
D | ssl_test_ctx.c | 190 client_conf->verify_callback = ret_value; in parse_client_verify_callback()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_lib.c | 1083 void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, int (*verify_callback)(SSL *, mbedtls_x509_crt *)) in SSL_CTX_set_verify() 1088 ctx->default_verify_callback = verify_callback; in SSL_CTX_set_verify() 1094 void SSL_set_verify(SSL *ssl, int mode, int (*verify_callback)(SSL *, mbedtls_x509_crt *)) in SSL_set_verify() 1099 ssl->verify_callback = verify_callback; in SSL_set_verify()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/openssl/ |
D | ssl.h | 711 void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, int (*verify_callback)(SSL *, mbedtls_x509_crt *)); 722 void SSL_set_verify(SSL *s, int mode, int (*verify_callback)(SSL *, mbedtls_x509_crt *)); 742 int verify_callback(SSL *, mbedtls_x509_crt *);
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | connector.rs | 404 ctx.set_verify_callback(SslVerifyMode::PEER, verify::verify_callback); 435 pub fn verify_callback(preverify_ok: bool, x509_ctx: &mut X509StoreContextRef) -> bool {
|
/third_party/openssl/apps/include/ |
D | s_apps.h | 24 int verify_callback(int ok, X509_STORE_CTX *ctx);
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_types.h | 232 int (*verify_callback) (SSL *, mbedtls_x509_crt *); member
|
/third_party/openssl/apps/lib/ |
D | tlssrp_depr.c | 213 SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, verify_callback); in set_up_srp_verifier_file()
|
D | s_cb.c | 45 int verify_callback(int ok, X509_STORE_CTX *ctx) in verify_callback() function
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
D | ssl_pm.c | 107 if (ssl_pm->owner->verify_callback) in lws_mbedtls_f_vrfy() 108 (ssl_pm->owner->verify_callback)(ssl_pm->owner, x509); in lws_mbedtls_f_vrfy()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509parse.function | 604 char *verify_callback ) 637 if( strcmp( verify_callback, "NULL" ) == 0 ) 639 else if( strcmp( verify_callback, "verify_none" ) == 0 ) 641 else if( strcmp( verify_callback, "verify_all" ) == 0 )
|
/third_party/openssl/doc/man7/ |
D | proxy-certificates.pod | 208 static int verify_callback(int ok, X509_STORE_CTX *ctx) 308 X509_STORE_CTX_set_verify_cb(ctx, verify_callback);
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | ssl.rs | 501 verify_callback: Option<extern "C" fn(c_int, *mut X509_STORE_CTX) -> c_int>, in SSL_set_verify() 574 verify_callback: Option<extern "C" fn(c_int, *mut X509_STORE_CTX) -> c_int>, in SSL_CTX_set_verify()
|
D | types.rs | 545 verify_callback: Option<unsafe extern "C" fn(c_int, *mut X509_STORE_CTX) -> c_int>, 643 verify_callback: Option<unsafe extern "C" fn(c_int, *mut X509_STORE_CTX) -> c_int>,
|
/third_party/openssl/ssl/ |
D | ssl_cert.c | 430 if (s->verify_callback) in ssl_verify_cert_chain() 431 X509_STORE_CTX_set_verify_cb(ctx, s->verify_callback); in ssl_verify_cert_chain()
|
/third_party/nghttp2/src/ |
D | shrpx_tls.cc | 119 int verify_callback(int preverify_ok, X509_STORE_CTX *ctx) { in verify_callback() function 1135 verify_callback); in create_ssl_context() 1431 verify_callback); in create_quic_ssl_context()
|
D | HttpServer.cc | 2008 int verify_callback(int preverify_ok, X509_STORE_CTX *ctx) { in verify_callback() function 2237 verify_callback); in run()
|
/third_party/openssl/apps/ |
D | s_server.c | 2153 SSL_CTX_set_verify(ctx, s_server_verify, verify_callback); in s_server_main() 2171 SSL_CTX_set_verify(ctx2, s_server_verify, verify_callback); in s_server_main()
|