/third_party/python/Lib/test/ |
D | test_ssl.py | 294 context.verify_mode = cert_reqs 1202 self.assertEqual(ctx.verify_mode, ssl.CERT_NONE) 1203 ctx.verify_mode = ssl.CERT_OPTIONAL 1204 self.assertEqual(ctx.verify_mode, ssl.CERT_OPTIONAL) 1205 ctx.verify_mode = ssl.CERT_REQUIRED 1206 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED) 1207 ctx.verify_mode = ssl.CERT_NONE 1208 self.assertEqual(ctx.verify_mode, ssl.CERT_NONE) 1210 ctx.verify_mode = None 1212 ctx.verify_mode = 42 [all …]
|
D | test_smtpnet.py | 32 context.verify_mode = ssl.CERT_NONE 67 context.verify_mode = ssl.CERT_NONE
|
D | test_poplib.py | 384 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED) 425 ctx.verify_mode = ssl.CERT_NONE
|
D | test_imaplib.py | 554 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED) 1045 ssl_context.verify_mode = ssl.CERT_NONE
|
D | test_ftplib.py | 979 ctx.verify_mode = ssl.CERT_NONE 1010 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
D | ssl_pm.c | 253 if (ssl->verify_mode == SSL_VERIFY_PEER) in ssl_pm_reload_crt() 255 else if (ssl->verify_mode == SSL_VERIFY_FAIL_IF_NO_PEER_CERT) in ssl_pm_reload_crt() 257 else if (ssl->verify_mode == SSL_VERIFY_CLIENT_ONCE) in ssl_pm_reload_crt() 967 if (ctx->verify_mode == SSL_VERIFY_PEER) in SSL_set_SSL_CTX() 969 else if (ctx->verify_mode == SSL_VERIFY_FAIL_IF_NO_PEER_CERT) in SSL_set_SSL_CTX() 971 else if (ctx->verify_mode == SSL_VERIFY_CLIENT_ONCE) in SSL_set_SSL_CTX() 979 ssl->verify_mode = ctx->verify_mode; in SSL_set_SSL_CTX()
|
/third_party/python/Lib/ |
D | ssl.py | 728 def verify_mode(self): member in SSLContext 729 value = super().verify_mode 735 @verify_mode.setter 736 def verify_mode(self, value): member in SSLContext 737 super(SSLContext, SSLContext).verify_mode.__set__(self, value) 757 context.verify_mode = CERT_REQUIRED 766 elif context.verify_mode != CERT_NONE: 808 context.verify_mode = cert_reqs 820 elif context.verify_mode != CERT_NONE: 1434 context.verify_mode = cert_reqs
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_lib.c | 338 ssl->verify_mode = ctx->verify_mode; in SSL_new() 928 return ctx->verify_mode; in SSL_CTX_get_verify_mode() 1087 ctx->verify_mode = mode; in SSL_CTX_set_verify() 1098 ssl->verify_mode = mode; in SSL_set_verify()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_types.h | 188 int verify_mode; member 230 int verify_mode; member
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | types.rs | 476 verify_mode: c_int, 544 verify_mode: c_int, 642 verify_mode: c_int, 770 verify_mode: c_int, 818 verify_mode: c_int, 888 verify_mode: c_int,
|
/third_party/node/src/ |
D | tls_wrap.cc | 910 int verify_mode; in SetVerifyMode() local 915 verify_mode = SSL_VERIFY_NONE; in SetVerifyMode() 918 verify_mode = SSL_VERIFY_PEER; in SetVerifyMode() 920 verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; in SetVerifyMode() 926 verify_mode = SSL_VERIFY_NONE; in SetVerifyMode() 930 SSL_set_verify(wrap->ssl_.get(), verify_mode, crypto::VerifyCallback); in SetVerifyMode()
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 193 if ((s->verify_mode & SSL_VERIFY_PEER) in ossl_statem_server_read_transition() 194 && (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { in ossl_statem_server_read_transition() 369 s->verify_mode & SSL_VERIFY_PEER in send_certificate_request() 374 && (!SSL_IS_TLS13(s) || !(s->verify_mode & SSL_VERIFY_POST_HANDSHAKE) in send_certificate_request() 381 !(s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) in send_certificate_request() 393 || (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) in send_certificate_request() 2401 } else if (!(s->verify_mode & SSL_VERIFY_PEER) in tls_construct_server_hello() 3508 else if ((s->verify_mode & SSL_VERIFY_PEER) && in tls_process_client_certificate() 3509 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { in tls_process_client_certificate()
|
D | statem_clnt.c | 1888 if (s->verify_mode != SSL_VERIFY_NONE && i <= 0) { in tls_post_process_server_certificate() 2713 if (!ssl_validate_ct(s) && (s->verify_mode & SSL_VERIFY_PEER)) { in tls_process_initial_server_flight()
|
/third_party/python/Lib/test/test_asyncio/ |
D | utils.py | 78 server_context.verify_mode = ssl.CERT_NONE 86 client_context.verify_mode = ssl.CERT_NONE
|
D | test_events.py | 1000 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1030 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1059 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1090 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1116 sslcontext_client.verify_mode = ssl.CERT_REQUIRED
|
/third_party/python/Doc/library/ |
D | ssl.rst | 145 as *purpose* sets :data:`~SSLContext.verify_mode` to :data:`CERT_REQUIRED` 557 Possible value for :attr:`SSLContext.verify_mode`, or the ``cert_reqs`` 570 Possible value for :attr:`SSLContext.verify_mode`, or the ``cert_reqs`` 587 Possible value for :attr:`SSLContext.verify_mode`, or the ``cert_reqs`` 1594 other peers' certificates when :data:`verify_mode` is other than 1925 :attr:`~SSLContext.verify_mode` must be set to :data:`CERT_OPTIONAL` or 1928 hostname checking automatically sets :attr:`~SSLContext.verify_mode` from 1939 context.verify_mode = ssl.CERT_REQUIRED 1951 :attr:`~SSLContext.verify_mode` is now automatically changed 1953 :attr:`~SSLContext.verify_mode` is :data:`CERT_NONE`. Previously [all …]
|
/third_party/python/Misc/NEWS.d/ |
D | 3.7.0rc1.rst | 192 ssl.SSLContext.verify_mode.
|
D | 3.6.6rc1.rst | 615 ssl.SSLContext.verify_mode.
|
/third_party/openssl/ssl/ |
D | ssl_conf.c | 1054 cctx->pvfy_flags = &ssl->verify_mode; in SSL_CONF_CTX_set_ssl() 1073 cctx->pvfy_flags = &ctx->verify_mode; in SSL_CONF_CTX_set_ssl_ctx()
|
D | ssl_lib.c | 731 s->verify_mode = ctx->verify_mode; in SSL_new() 1483 return s->verify_mode; in SSL_get_verify_mode() 1497 return ctx->verify_mode; in SSL_CTX_get_verify_mode() 1512 s->verify_mode = mode; in SSL_set_verify() 3255 ret->verify_mode = SSL_VERIFY_NONE; in SSL_CTX_new_ex() 3565 ctx->verify_mode = mode; in SSL_CTX_set_verify() 3735 && (s->verify_mode & SSL_VERIFY_PEER) != 0) in ssl_update_cache()
|
D | ssl_local.h | 984 uint32_t verify_mode; member 1522 uint32_t verify_mode; member
|
D | ssl_sess.c | 628 if ((s->verify_mode & SSL_VERIFY_PEER) && s->sid_ctx_length == 0) { in ssl_get_prev_session()
|
/third_party/rust/crates/rust-openssl/openssl/ |
D | CHANGELOG.md | 267 * Added `SslContextRef::verify_mode` and `SslRef::verify_mode`.
|
/third_party/python/Lib/http/ |
D | client.py | 1428 will_verify = context.verify_mode != ssl.CERT_NONE
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | mod.rs | 1889 pub fn verify_mode(&self) -> SslVerifyMode { in verify_mode() method 2330 pub fn verify_mode(&self) -> SslVerifyMode { in verify_mode() method
|