/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
D | ssl_pm.c | 253 if (ssl->verify_mode == SSL_VERIFY_PEER) in ssl_pm_reload_crt() 255 else if (ssl->verify_mode == SSL_VERIFY_FAIL_IF_NO_PEER_CERT) in ssl_pm_reload_crt() 257 else if (ssl->verify_mode == SSL_VERIFY_CLIENT_ONCE) in ssl_pm_reload_crt() 967 if (ctx->verify_mode == SSL_VERIFY_PEER) in SSL_set_SSL_CTX() 969 else if (ctx->verify_mode == SSL_VERIFY_FAIL_IF_NO_PEER_CERT) in SSL_set_SSL_CTX() 971 else if (ctx->verify_mode == SSL_VERIFY_CLIENT_ONCE) in SSL_set_SSL_CTX() 979 ssl->verify_mode = ctx->verify_mode; in SSL_set_SSL_CTX()
|
/third_party/python/Lib/test/ |
D | test_ssl.py | 294 context.verify_mode = cert_reqs 1202 self.assertEqual(ctx.verify_mode, ssl.CERT_NONE) 1203 ctx.verify_mode = ssl.CERT_OPTIONAL 1204 self.assertEqual(ctx.verify_mode, ssl.CERT_OPTIONAL) 1205 ctx.verify_mode = ssl.CERT_REQUIRED 1206 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED) 1207 ctx.verify_mode = ssl.CERT_NONE 1208 self.assertEqual(ctx.verify_mode, ssl.CERT_NONE) 1210 ctx.verify_mode = None 1212 ctx.verify_mode = 42 [all …]
|
D | test_smtpnet.py | 32 context.verify_mode = ssl.CERT_NONE 67 context.verify_mode = ssl.CERT_NONE
|
D | test_poplib.py | 384 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED) 425 ctx.verify_mode = ssl.CERT_NONE
|
D | test_imaplib.py | 554 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED) 1045 ssl_context.verify_mode = ssl.CERT_NONE
|
D | test_ftplib.py | 979 ctx.verify_mode = ssl.CERT_NONE 1010 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
|
/third_party/python/Lib/ |
D | ssl.py | 728 def verify_mode(self): member in SSLContext 729 value = super().verify_mode 735 @verify_mode.setter 736 def verify_mode(self, value): member in SSLContext 737 super(SSLContext, SSLContext).verify_mode.__set__(self, value) 757 context.verify_mode = CERT_REQUIRED 766 elif context.verify_mode != CERT_NONE: 808 context.verify_mode = cert_reqs 820 elif context.verify_mode != CERT_NONE: 1434 context.verify_mode = cert_reqs
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_types.h | 188 int verify_mode; member 230 int verify_mode; member
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_lib.c | 338 ssl->verify_mode = ctx->verify_mode; in SSL_new() 928 return ctx->verify_mode; in SSL_CTX_get_verify_mode() 1087 ctx->verify_mode = mode; in SSL_CTX_set_verify() 1098 ssl->verify_mode = mode; in SSL_set_verify()
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | types.rs | 493 verify_mode: c_int, 561 verify_mode: c_int, 659 verify_mode: c_int, 787 verify_mode: c_int, 835 verify_mode: c_int, 905 verify_mode: c_int,
|
/third_party/node/src/quic/ |
D | tlscontext.cc | 380 int verify_mode = SSL_VERIFY_PEER; local 382 verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; 383 SSL_set_verify(ssl_.get(), verify_mode, crypto::VerifyCallback);
|
/third_party/python/Lib/test/test_asyncio/ |
D | utils.py | 78 server_context.verify_mode = ssl.CERT_NONE 86 client_context.verify_mode = ssl.CERT_NONE
|
D | test_events.py | 1000 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1030 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1059 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1090 sslcontext_client.verify_mode = ssl.CERT_REQUIRED 1116 sslcontext_client.verify_mode = ssl.CERT_REQUIRED
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | statem_srvr.c | 194 if ((s->verify_mode & SSL_VERIFY_PEER) in ossl_statem_server_read_transition() 195 && (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { in ossl_statem_server_read_transition() 370 s->verify_mode & SSL_VERIFY_PEER in send_certificate_request() 375 && (!SSL_IS_TLS13(s) || !(s->verify_mode & SSL_VERIFY_POST_HANDSHAKE) in send_certificate_request() 382 !(s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) in send_certificate_request() 394 || (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) in send_certificate_request() 2421 } else if (!(s->verify_mode & SSL_VERIFY_PEER) in tls_construct_server_hello() 3528 else if ((s->verify_mode & SSL_VERIFY_PEER) && in tls_process_client_certificate() 3529 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { in tls_process_client_certificate()
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 193 if ((s->verify_mode & SSL_VERIFY_PEER) in ossl_statem_server_read_transition() 194 && (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { in ossl_statem_server_read_transition() 369 s->verify_mode & SSL_VERIFY_PEER in send_certificate_request() 374 && (!SSL_IS_TLS13(s) || !(s->verify_mode & SSL_VERIFY_POST_HANDSHAKE) in send_certificate_request() 381 !(s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) in send_certificate_request() 393 || (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) in send_certificate_request() 2401 } else if (!(s->verify_mode & SSL_VERIFY_PEER) in tls_construct_server_hello() 3508 else if ((s->verify_mode & SSL_VERIFY_PEER) && in tls_process_client_certificate() 3509 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { in tls_process_client_certificate()
|
/third_party/node/src/crypto/ |
D | crypto_tls.cc | 1127 int verify_mode; in SetVerifyMode() local 1132 verify_mode = SSL_VERIFY_NONE; in SetVerifyMode() 1135 verify_mode = SSL_VERIFY_PEER; in SetVerifyMode() 1137 verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; in SetVerifyMode() 1143 verify_mode = SSL_VERIFY_NONE; in SetVerifyMode() 1147 SSL_set_verify(wrap->ssl_.get(), verify_mode, VerifyCallback); in SetVerifyMode()
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | ssl_quic.c | 99 if ((ssl->verify_mode & SSL_VERIFY_PEER) in SSL_quic_max_handshake_flight_len()
|
D | ssl_conf.c | 1054 cctx->pvfy_flags = &ssl->verify_mode; in SSL_CONF_CTX_set_ssl() 1073 cctx->pvfy_flags = &ctx->verify_mode; in SSL_CONF_CTX_set_ssl_ctx()
|
D | ssl_lib.c | 780 s->verify_mode = ctx->verify_mode; in SSL_new() 1550 return s->verify_mode; in SSL_get_verify_mode() 1564 return ctx->verify_mode; in SSL_CTX_get_verify_mode() 1579 s->verify_mode = mode; in SSL_set_verify() 3340 ret->verify_mode = SSL_VERIFY_NONE; in SSL_CTX_new_ex() 3650 ctx->verify_mode = mode; in SSL_CTX_set_verify() 3820 && (s->verify_mode & SSL_VERIFY_PEER) != 0) in ssl_update_cache()
|
/third_party/python/Misc/NEWS.d/ |
D | 3.7.0rc1.rst | 192 ssl.SSLContext.verify_mode.
|
/third_party/python/Doc/library/ |
D | ssl.rst | 145 as *purpose* sets :data:`~SSLContext.verify_mode` to :data:`CERT_REQUIRED` 557 Possible value for :attr:`SSLContext.verify_mode`, or the ``cert_reqs`` 570 Possible value for :attr:`SSLContext.verify_mode`, or the ``cert_reqs`` 587 Possible value for :attr:`SSLContext.verify_mode`, or the ``cert_reqs`` 1594 other peers' certificates when :data:`verify_mode` is other than 1925 :attr:`~SSLContext.verify_mode` must be set to :data:`CERT_OPTIONAL` or 1928 hostname checking automatically sets :attr:`~SSLContext.verify_mode` from 1939 context.verify_mode = ssl.CERT_REQUIRED 1951 :attr:`~SSLContext.verify_mode` is now automatically changed 1953 :attr:`~SSLContext.verify_mode` is :data:`CERT_NONE`. Previously [all …]
|
/third_party/openssl/ssl/ |
D | ssl_conf.c | 1054 cctx->pvfy_flags = &ssl->verify_mode; in SSL_CONF_CTX_set_ssl() 1073 cctx->pvfy_flags = &ctx->verify_mode; in SSL_CONF_CTX_set_ssl_ctx()
|
D | ssl_lib.c | 731 s->verify_mode = ctx->verify_mode; in SSL_new() 1483 return s->verify_mode; in SSL_get_verify_mode() 1497 return ctx->verify_mode; in SSL_CTX_get_verify_mode() 1512 s->verify_mode = mode; in SSL_set_verify() 3255 ret->verify_mode = SSL_VERIFY_NONE; in SSL_CTX_new_ex() 3565 ctx->verify_mode = mode; in SSL_CTX_set_verify() 3735 && (s->verify_mode & SSL_VERIFY_PEER) != 0) in ssl_update_cache()
|
D | ssl_local.h | 984 uint32_t verify_mode; member 1522 uint32_t verify_mode; member
|
/third_party/rust/crates/rust-openssl/openssl/ |
D | CHANGELOG.md | 357 * Added `SslContextRef::verify_mode` and `SslRef::verify_mode`.
|