/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
H A D | ssl_pm.c | 810 long verify_result; in ssl_pm_get_verify_result() local 819 verify_result = X509_V_ERR_INVALID_CA; in ssl_pm_get_verify_result() 822 verify_result = X509_V_ERR_HOSTNAME_MISMATCH; in ssl_pm_get_verify_result() 826 verify_result = X509_V_ERR_CA_KEY_TOO_SMALL; in ssl_pm_get_verify_result() 830 verify_result = X509_V_ERR_CA_MD_TOO_WEAK; in ssl_pm_get_verify_result() 834 verify_result = X509_V_ERR_CERT_NOT_YET_VALID; in ssl_pm_get_verify_result() 838 verify_result = X509_V_ERR_CERT_HAS_EXPIRED; in ssl_pm_get_verify_result() 841 verify_result = X509_V_ERR_UNSPECIFIED; in ssl_pm_get_verify_result() 846 return verify_result; in ssl_pm_get_verify_result()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_asn1.c | 29 int32_t verify_result; member 60 ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, verify_result, ZINT32, 5), 168 as.verify_result = in->verify_result; 324 ret->verify_result = as->verify_result;
|
H A D | ssl_txt.c | 144 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, in SSL_SESSION_print() 145 X509_verify_cert_error_string(x->verify_result)) <= 0) in SSL_SESSION_print()
|
H A D | ssl_sess.c | 135 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ in SSL_SESSION_new() 475 ss->verify_result = X509_V_OK; in ssl_get_new_session() 563 * existing session if need be) and s->verify_result is set from the session. 678 s->verify_result = s->session->verify_result; in ssl_get_prev_session() 878 s->verify_result = session->verify_result; in SSL_set_session()
|
H A D | ssl_lib.c | 873 s->verify_result = X509_V_OK; in SSL_new() 1165 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_authority() 1181 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_tlsa() 4611 ssl->verify_result = arg; in SSL_set_verify_result() 4616 return ssl->verify_result; in SSL_get_verify_result() 5366 s->verify_result != X509_V_OK || in ssl_validate_ct() 5440 s->verify_result = X509_V_ERR_NO_VALID_SCTS; in ssl_validate_ct()
|
/third_party/openssl/ssl/ |
H A D | ssl_asn1.c | 29 int32_t verify_result; member 60 ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, verify_result, ZINT32, 5), 168 as.verify_result = in->verify_result; 324 ret->verify_result = as->verify_result;
|
H A D | ssl_txt.c | 144 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, in SSL_SESSION_print() 145 X509_verify_cert_error_string(x->verify_result)) <= 0) in SSL_SESSION_print()
|
H A D | ssl_sess.c | 150 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ in SSL_SESSION_new() 503 ss->verify_result = X509_V_OK; in ssl_get_new_session() 597 * existing session if need be) and s->verify_result is set from the session. 712 s->verify_result = s->session->verify_result; in ssl_get_prev_session() 912 s->verify_result = session->verify_result; in SSL_set_session()
|
H A D | ssl_lib.c | 813 s->verify_result = X509_V_OK; in SSL_new() 1101 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_authority() 1117 if (!DANETLS_ENABLED(dane) || s->verify_result != X509_V_OK) in SSL_get0_dane_tlsa() 4492 ssl->verify_result = arg; in SSL_set_verify_result() 4497 return ssl->verify_result; in SSL_get_verify_result() 5247 s->verify_result != X509_V_OK || in ssl_validate_ct() 5321 s->verify_result = X509_V_ERR_NO_VALID_SCTS; in ssl_validate_ct()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_generic.c | 634 uint32_t verify_result = 0; in ssl_tls13_validate_certificate() local 665 ssl->session_negotiate->verify_result = MBEDTLS_X509_BADCERT_MISSING; in ssl_tls13_validate_certificate() 705 &verify_result, in ssl_tls13_validate_certificate() 757 if (verify_result & MBEDTLS_X509_BADCERT_OTHER) { in ssl_tls13_validate_certificate() 760 } else if (verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH) { in ssl_tls13_validate_certificate() 762 } else if (verify_result & (MBEDTLS_X509_BADCERT_KEY_USAGE | in ssl_tls13_validate_certificate() 769 } else if (verify_result & MBEDTLS_X509_BADCERT_EXPIRED) { in ssl_tls13_validate_certificate() 772 } else if (verify_result & MBEDTLS_X509_BADCERT_REVOKED) { in ssl_tls13_validate_certificate() 775 } else if (verify_result & MBEDTLS_X509_BADCERT_NOT_TRUSTED) { in ssl_tls13_validate_certificate() 784 if (verify_result ! in ssl_tls13_validate_certificate() [all...] |
H A D | ssl_tls.c | 3083 return ssl->session->verify_result; in mbedtls_ssl_get_verify_result() 3087 return ssl->session_negotiate->verify_result; in mbedtls_ssl_get_verify_result() 3427 + 4; /* verify_result */ in ssl_tls12_session_save() 3437 MBEDTLS_PUT_UINT32_BE(session->verify_result, p, 0); in ssl_tls12_session_save() 3586 session->verify_result = MBEDTLS_GET_UINT32_BE(p, 0); in ssl_tls12_session_load() 4199 * uint32 verify_result; 7918 ssl->session_negotiate->verify_result = in ssl_parse_certificate_coordinate() 7973 &ssl->session_negotiate->verify_result, in ssl_parse_certificate_verify() 8001 &ssl->session_negotiate->verify_result, in ssl_parse_certificate_verify() 8036 ssl->session_negotiate->verify_result | in ssl_parse_certificate_verify() [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | error.rs | 164 let verify = s.ssl().verify_result(); in fmt() 171 let verify = s.ssl().verify_result(); in fmt()
|
/third_party/node/src/crypto/ |
H A D | crypto_sig.cc | 511 bool* verify_result) { in VerifyFinal() 517 *verify_result = false; in VerifyFinal() 531 *verify_result = r == 1; in VerifyFinal() 577 bool verify_result; in VerifyFinal() local 579 salt_len, &verify_result); in VerifyFinal() 582 args.GetReturnValue().Set(verify_result); in VerifyFinal() 507 VerifyFinal(const ManagedEVPPKey& pkey, const ByteSource& sig, int padding, const Maybe<int>& saltlen, bool* verify_result) VerifyFinal() argument
|
H A D | crypto_sig.h | 89 bool* verify_result);
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_context_info.c | 500 * uint32 verify_result; 518 uint32_t verify_result, ticket_lifetime; in print_deserialized_ssl_session() local 595 verify_result = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_session() 600 printf("\tverify result : 0x%08X\n", verify_result); in print_deserialized_ssl_session()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
H A D | ssl_types.h | 241 long verify_result; member
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | ssl.rs | 20 verify_result: c_long, 46 verify_result: c_long, 88 verify_result: c_long,
|
H A D | types.rs | 497 verify_result: c_long, 568 verify_result: c_long, 676 verify_result: c_long,
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_client.c | 3137 long verify_result; in print_stuff() local 3332 verify_result = SSL_get_verify_result(s); in print_stuff() 3333 BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result, in print_stuff() 3334 X509_verify_cert_error_string(verify_result)); in print_stuff()
|
/third_party/openssl/apps/ |
H A D | s_client.c | 3137 long verify_result; in print_stuff() local 3332 verify_result = SSL_get_verify_result(s); in print_stuff() 3333 BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result, in print_stuff() 3334 X509_verify_cert_error_string(verify_result)); in print_stuff()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1865 * On success set s->session->peer and s->session->verify_result. 1897 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_post_process_server_certificate() 1901 ERR_clear_error(); /* but we keep s->verify_result */ in tls_post_process_server_certificate() 1936 s->session->verify_result = s->verify_result; in tls_post_process_server_certificate()
|
H A D | statem_srvr.c | 1924 s->session->verify_result = X509_V_OK; in tls_early_post_process_client_hello() 3543 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_process_client_certificate() 3575 s->session->verify_result = s->verify_result; in tls_process_client_certificate()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1857 * On success set s->session->peer and s->session->verify_result. 1889 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_post_process_server_certificate() 1893 ERR_clear_error(); /* but we keep s->verify_result */ in tls_post_process_server_certificate() 1928 s->session->verify_result = s->verify_result; in tls_post_process_server_certificate()
|
H A D | statem_srvr.c | 1904 s->session->verify_result = X509_V_OK; in tls_early_post_process_client_hello() 3522 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_process_client_certificate() 3554 s->session->verify_result = s->verify_result; in tls_process_client_certificate()
|
/third_party/curl/lib/vtls/ |
H A D | openssl.c | 4097 long verify_result; in infof_certstack() local 4101 verify_result = SSL_get_verify_result(ssl); in infof_certstack() 4102 if(verify_result != X509_V_OK) in infof_certstack()
|