Lines Matching refs:verify_callback
20 void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, SSL_verify_cb verify_callback);
21 void SSL_set_verify(SSL *ssl, int mode, SSL_verify_cb verify_callback);
34 specifies the B<verify_callback> function to be used. If no callback function
35 shall be specified, the NULL pointer can be used for B<verify_callback>. B<ctx> B<MUST NOT> be NULL.
38 specifies the B<verify_callback> function to be used. If no callback function
39 shall be specified, the NULL pointer can be used for B<verify_callback>. In
40 this case last B<verify_callback> set specifically for this B<ssl> remains. If
47 In client mode B<verify_callback> may also call the L<SSL_set_retry_verify(3)>
156 and the verify_callback() function, but the way this information is used
173 The B<verify_callback> function is used to control the behaviour when the
184 and B<verify_callback> is called with B<preverify_ok>=0. By applying
185 X509_CTX_store_* functions B<verify_callback> can locate the certificate
187 found for a certificate, B<verify_callback> is called with B<preverify_ok>=1
190 The return value of B<verify_callback> controls the strategy of the further
191 verification process. If B<verify_callback> returns 0, the verification
194 the TLS/SSL handshake is terminated. If B<verify_callback> returns 1,
195 the verification process is continued. If B<verify_callback> always returns
200 own error storage managed by B<verify_callback>.
202 If no B<verify_callback> is specified, the default callback will be used.
241 The following code sequence realizes an example B<verify_callback> function
265 static int verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
330 verify_callback);
333 * Let the verify_callback catch the verify_depth error so that we get