Home
last modified time | relevance | path

Searched refs:verify_result (Results 1 – 25 of 26) sorted by relevance

12

/third_party/mbedtls/library/
Dssl_tls13_generic.c726 uint32_t verify_result = 0; in ssl_tls13_validate_certificate() local
749 &verify_result, in ssl_tls13_validate_certificate()
769 verify_result |= MBEDTLS_X509_BADCERT_BAD_KEY; in ssl_tls13_validate_certificate()
781 &verify_result ) != 0 ) in ssl_tls13_validate_certificate()
800 if( verify_result & MBEDTLS_X509_BADCERT_OTHER ) in ssl_tls13_validate_certificate()
802 else if( verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH ) in ssl_tls13_validate_certificate()
804 else if( verify_result & ( MBEDTLS_X509_BADCERT_KEY_USAGE | in ssl_tls13_validate_certificate()
810 else if( verify_result & MBEDTLS_X509_BADCERT_EXPIRED ) in ssl_tls13_validate_certificate()
812 else if( verify_result & MBEDTLS_X509_BADCERT_REVOKED ) in ssl_tls13_validate_certificate()
814 else if( verify_result & MBEDTLS_X509_BADCERT_NOT_TRUSTED ) in ssl_tls13_validate_certificate()
[all …]
Dssl_tls.c2026 ssl->session_negotiate->verify_result = in ssl_parse_certificate_coordinate()
2083 &ssl->session_negotiate->verify_result, in ssl_parse_certificate_verify()
2113 &ssl->session_negotiate->verify_result, in ssl_parse_certificate_verify()
2139 ssl->session_negotiate->verify_result |= MBEDTLS_X509_BADCERT_BAD_KEY; in ssl_parse_certificate_verify()
2151 &ssl->session_negotiate->verify_result ) != 0 ) in ssl_parse_certificate_verify()
2184 if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_OTHER ) in ssl_parse_certificate_verify()
2186 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH ) in ssl_parse_certificate_verify()
2188 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_KEY_USAGE ) in ssl_parse_certificate_verify()
2190 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_EXT_KEY_USAGE ) in ssl_parse_certificate_verify()
2192 else if( ssl->session_negotiate->verify_result & MBEDTLS_X509_BADCERT_NS_CERT_TYPE ) in ssl_parse_certificate_verify()
[all …]
/third_party/openssl/doc/man3/
DSSL_set_verify_result.pod11 void SSL_set_verify_result(SSL *ssl, long verify_result);
15 SSL_set_verify_result() sets B<verify_result> of the object B<ssl> to be the
26 The valid codes for B<verify_result> are documented in L<openssl-verify(1)>.
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/
Dssl_pm.c797 long verify_result; in ssl_pm_get_verify_result() local
806 verify_result = X509_V_ERR_INVALID_CA; in ssl_pm_get_verify_result()
809 verify_result = X509_V_ERR_HOSTNAME_MISMATCH; in ssl_pm_get_verify_result()
813 verify_result = X509_V_ERR_CA_KEY_TOO_SMALL; in ssl_pm_get_verify_result()
817 verify_result = X509_V_ERR_CA_MD_TOO_WEAK; in ssl_pm_get_verify_result()
821 verify_result = X509_V_ERR_CERT_NOT_YET_VALID; in ssl_pm_get_verify_result()
825 verify_result = X509_V_ERR_CERT_HAS_EXPIRED; in ssl_pm_get_verify_result()
828 verify_result = X509_V_ERR_UNSPECIFIED; in ssl_pm_get_verify_result()
833 return verify_result; in ssl_pm_get_verify_result()
/third_party/openssl/ssl/
Dssl_asn1.c29 int32_t verify_result; member
60 ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, verify_result, ZINT32, 5),
168 as.verify_result = in->verify_result; in i2d_SSL_SESSION()
324 ret->verify_result = as->verify_result; in d2i_SSL_SESSION()
Dssl_txt.c144 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, in SSL_SESSION_print()
145 X509_verify_cert_error_string(x->verify_result)) <= 0) in SSL_SESSION_print()
Dssl_sess.c135 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ in SSL_SESSION_new()
471 ss->verify_result = X509_V_OK; in ssl_get_new_session()
674 s->verify_result = s->session->verify_result; in ssl_get_prev_session()
874 s->verify_result = session->verify_result; in SSL_set_session()
Dssl_lib.c809 s->verify_result = X509_V_OK; in SSL_new()
1097 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_authority()
1113 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_tlsa()
4470 ssl->verify_result = arg; in SSL_set_verify_result()
4475 return ssl->verify_result; in SSL_get_verify_result()
5224 s->verify_result != X509_V_OK || in ssl_validate_ct()
5298 s->verify_result = X509_V_ERR_NO_VALID_SCTS; in ssl_validate_ct()
Dssl_local.h594 long verify_result; /* only for servers */ member
1541 long verify_result; member
Dssl_cert.c442 s->verify_result = X509_STORE_CTX_get_error(ctx); in ssl_verify_cert_chain()
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
Derror.rs164 let verify = s.ssl().verify_result(); in fmt()
171 let verify = s.ssl().verify_result(); in fmt()
Dmod.rs2279 .field("verify_result", &self.verify_result()) in fmt()
2715 pub fn verify_result(&self) -> X509VerifyResult { in verify_result() method
/third_party/mbedtls/programs/ssl/
Dssl_context_info.c592 uint32_t verify_result, ticket_lifetime; in print_deserialized_ssl_session() local
671 verify_result = ( (uint32_t) ssl[0] << 24 ) | in print_deserialized_ssl_session()
676 printf( "\tverify result : 0x%08X\n", verify_result ); in print_deserialized_ssl_session()
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/
Dssl_types.h241 long verify_result; member
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
Dssl.rs20 verify_result: c_long,
46 verify_result: c_long,
88 verify_result: c_long,
Dtypes.rs480 verify_result: c_long,
551 verify_result: c_long,
659 verify_result: c_long,
/third_party/node/src/
Dnode_crypto.cc4912 bool* verify_result) { in VerifyFinal() argument
4918 *verify_result = false; in VerifyFinal()
4932 *verify_result = r == 1; in VerifyFinal()
4975 bool verify_result; in VerifyFinal() local
4977 salt_len, &verify_result); in VerifyFinal()
4980 args.GetReturnValue().Set(verify_result); in VerifyFinal()
5039 bool verify_result; in VerifyOneShot() local
5048 verify_result = true; in VerifyOneShot()
5051 verify_result = false; in VerifyOneShot()
5057 args.GetReturnValue().Set(verify_result); in VerifyOneShot()
[all …]
Dnode_crypto.h728 bool* verify_result);
/third_party/openssl/apps/
Ds_client.c3137 long verify_result; in print_stuff() local
3332 verify_result = SSL_get_verify_result(s); in print_stuff()
3333 BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result, in print_stuff()
3334 X509_verify_cert_error_string(verify_result)); in print_stuff()
/third_party/openssl/ssl/statem/
Dstatem_srvr.c1904 s->session->verify_result = X509_V_OK; in tls_early_post_process_client_hello()
3523 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_process_client_certificate()
3555 s->session->verify_result = s->verify_result; in tls_process_client_certificate()
Dstatem_clnt.c1889 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_post_process_server_certificate()
1928 s->session->verify_result = s->verify_result; in tls_post_process_server_certificate()
/third_party/mbedtls/include/mbedtls/
Dssl.h1145 uint32_t MBEDTLS_PRIVATE(verify_result); /*!< verification result */
/third_party/mbedtls/tests/suites/
Dtest_suite_ssl.function1493 session->verify_result = 0xdeadbeef;
4161 TEST_ASSERT( original.verify_result == restored.verify_result );
/third_party/libabigail/tests/data/test-diff-pkg/
Dspice-server-0.12.4-19.el7.x86_64-0.12.8-1.el7.x86_64-report-2.txt261 … 'long int verify_result', at offset 3136 (in bits) at ssl.h:1216:1
/third_party/openssl/
DCHANGES.md15363 * Store verify_result within SSL_SESSION also for client side to
15365 always resulted in verify_result==X509_V_OK, not using the original
17166 * For servers, store verify_result in SSL_SESSION data structure
17173 ssl->verify_result to the appropriate error code to avoid

12