/third_party/mbedtls/library/ |
D | ssl_tls13_generic.c | 726 uint32_t verify_result = 0; in ssl_tls13_validate_certificate() local 749 &verify_result, in ssl_tls13_validate_certificate() 769 verify_result |= MBEDTLS_X509_BADCERT_BAD_KEY; in ssl_tls13_validate_certificate() 781 &verify_result ) != 0 ) in ssl_tls13_validate_certificate() 800 if( verify_result & MBEDTLS_X509_BADCERT_OTHER ) in ssl_tls13_validate_certificate() 802 else if( verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH ) in ssl_tls13_validate_certificate() 804 else if( verify_result & ( MBEDTLS_X509_BADCERT_KEY_USAGE | in ssl_tls13_validate_certificate() 810 else if( verify_result & MBEDTLS_X509_BADCERT_EXPIRED ) in ssl_tls13_validate_certificate() 812 else if( verify_result & MBEDTLS_X509_BADCERT_REVOKED ) in ssl_tls13_validate_certificate() 814 else if( verify_result & MBEDTLS_X509_BADCERT_NOT_TRUSTED ) in ssl_tls13_validate_certificate() [all …]
|
D | ssl_tls.c | 2026 ssl->session_negotiate->verify_result = in ssl_parse_certificate_coordinate() 2083 &ssl->session_negotiate->verify_result, in ssl_parse_certificate_verify() 2113 &ssl->session_negotiate->verify_result, in ssl_parse_certificate_verify() 2139 ssl->session_negotiate->verify_result |= MBEDTLS_X509_BADCERT_BAD_KEY; in ssl_parse_certificate_verify() 2151 &ssl->session_negotiate->verify_result ) != 0 ) in ssl_parse_certificate_verify() 2184 if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_OTHER ) in ssl_parse_certificate_verify() 2186 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH ) in ssl_parse_certificate_verify() 2188 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_KEY_USAGE ) in ssl_parse_certificate_verify() 2190 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_EXT_KEY_USAGE ) in ssl_parse_certificate_verify() 2192 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_NS_CERT_TYPE ) in ssl_parse_certificate_verify() [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_set_verify_result.pod | 11 void SSL_set_verify_result(SSL *ssl, long verify_result); 15 SSL_set_verify_result() sets B<verify_result> of the object B<ssl> to be the 26 The valid codes for B<verify_result> are documented in L<openssl-verify(1)>.
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
D | ssl_pm.c | 797 long verify_result; in ssl_pm_get_verify_result() local 806 verify_result = X509_V_ERR_INVALID_CA; in ssl_pm_get_verify_result() 809 verify_result = X509_V_ERR_HOSTNAME_MISMATCH; in ssl_pm_get_verify_result() 813 verify_result = X509_V_ERR_CA_KEY_TOO_SMALL; in ssl_pm_get_verify_result() 817 verify_result = X509_V_ERR_CA_MD_TOO_WEAK; in ssl_pm_get_verify_result() 821 verify_result = X509_V_ERR_CERT_NOT_YET_VALID; in ssl_pm_get_verify_result() 825 verify_result = X509_V_ERR_CERT_HAS_EXPIRED; in ssl_pm_get_verify_result() 828 verify_result = X509_V_ERR_UNSPECIFIED; in ssl_pm_get_verify_result() 833 return verify_result; in ssl_pm_get_verify_result()
|
/third_party/openssl/ssl/ |
D | ssl_asn1.c | 29 int32_t verify_result; member 60 ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, verify_result, ZINT32, 5), 168 as.verify_result = in->verify_result; in i2d_SSL_SESSION() 324 ret->verify_result = as->verify_result; in d2i_SSL_SESSION()
|
D | ssl_txt.c | 144 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, in SSL_SESSION_print() 145 X509_verify_cert_error_string(x->verify_result)) <= 0) in SSL_SESSION_print()
|
D | ssl_sess.c | 135 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ in SSL_SESSION_new() 471 ss->verify_result = X509_V_OK; in ssl_get_new_session() 674 s->verify_result = s->session->verify_result; in ssl_get_prev_session() 874 s->verify_result = session->verify_result; in SSL_set_session()
|
D | ssl_lib.c | 809 s->verify_result = X509_V_OK; in SSL_new() 1097 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_authority() 1113 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_tlsa() 4470 ssl->verify_result = arg; in SSL_set_verify_result() 4475 return ssl->verify_result; in SSL_get_verify_result() 5224 s->verify_result != X509_V_OK || in ssl_validate_ct() 5298 s->verify_result = X509_V_ERR_NO_VALID_SCTS; in ssl_validate_ct()
|
D | ssl_local.h | 594 long verify_result; /* only for servers */ member 1541 long verify_result; member
|
D | ssl_cert.c | 442 s->verify_result = X509_STORE_CTX_get_error(ctx); in ssl_verify_cert_chain()
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | error.rs | 164 let verify = s.ssl().verify_result(); in fmt() 171 let verify = s.ssl().verify_result(); in fmt()
|
D | mod.rs | 2279 .field("verify_result", &self.verify_result()) in fmt() 2715 pub fn verify_result(&self) -> X509VerifyResult { in verify_result() method
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_context_info.c | 592 uint32_t verify_result, ticket_lifetime; in print_deserialized_ssl_session() local 671 verify_result = ( (uint32_t) ssl[0] << 24 ) | in print_deserialized_ssl_session() 676 printf( "\tverify result : 0x%08X\n", verify_result ); in print_deserialized_ssl_session()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_types.h | 241 long verify_result; member
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | ssl.rs | 20 verify_result: c_long, 46 verify_result: c_long, 88 verify_result: c_long,
|
D | types.rs | 480 verify_result: c_long, 551 verify_result: c_long, 659 verify_result: c_long,
|
/third_party/node/src/ |
D | node_crypto.cc | 4912 bool* verify_result) { in VerifyFinal() argument 4918 *verify_result = false; in VerifyFinal() 4932 *verify_result = r == 1; in VerifyFinal() 4975 bool verify_result; in VerifyFinal() local 4977 salt_len, &verify_result); in VerifyFinal() 4980 args.GetReturnValue().Set(verify_result); in VerifyFinal() 5039 bool verify_result; in VerifyOneShot() local 5048 verify_result = true; in VerifyOneShot() 5051 verify_result = false; in VerifyOneShot() 5057 args.GetReturnValue().Set(verify_result); in VerifyOneShot() [all …]
|
D | node_crypto.h | 728 bool* verify_result);
|
/third_party/openssl/apps/ |
D | s_client.c | 3137 long verify_result; in print_stuff() local 3332 verify_result = SSL_get_verify_result(s); in print_stuff() 3333 BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result, in print_stuff() 3334 X509_verify_cert_error_string(verify_result)); in print_stuff()
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 1904 s->session->verify_result = X509_V_OK; in tls_early_post_process_client_hello() 3523 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_process_client_certificate() 3555 s->session->verify_result = s->verify_result; in tls_process_client_certificate()
|
D | statem_clnt.c | 1889 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_post_process_server_certificate() 1928 s->session->verify_result = s->verify_result; in tls_post_process_server_certificate()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 1145 uint32_t MBEDTLS_PRIVATE(verify_result); /*!< verification result */
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ssl.function | 1493 session->verify_result = 0xdeadbeef; 4161 TEST_ASSERT( original.verify_result == restored.verify_result );
|
/third_party/libabigail/tests/data/test-diff-pkg/ |
D | spice-server-0.12.4-19.el7.x86_64-0.12.8-1.el7.x86_64-report-2.txt | 261 … 'long int verify_result', at offset 3136 (in bits) at ssl.h:1216:1
|
/third_party/openssl/ |
D | CHANGES.md | 15363 * Store verify_result within SSL_SESSION also for client side to 15365 always resulted in verify_result==X509_V_OK, not using the original 17166 * For servers, store verify_result in SSL_SESSION data structure 17173 ssl->verify_result to the appropriate error code to avoid
|