Lines Matching refs:not
50 This would be typically done in case the certificate verification was not yet
71 then the extension is not sent, otherwise it is. By default the extension is not
88 B<Server mode:> the server will not send a client certificate request to the
89 client, so the client will not send a certificate.
91 B<Client mode:> if not using an anonymous cipher (by default disabled), the
116 B<Server mode:> if the client did not return a certificate, the TLS/SSL
125 connection. Do not ask for a client certificate again during
134 B<Server mode:> the server will not send a client certificate request
147 If verification flags are not modified explicitly by C<SSL_CTX_set_verify()>
176 the certificate in question was passed (preverify_ok=1) or not
196 1, the TLS/SSL handshake will not be terminated with respect to verification
226 In client mode, it is not checked whether the SSL_VERIFY_PEER flag
228 lead to unexpected behaviour if SSL_VERIFY_PEER and other flags are not used as
233 The SSL*_set_verify*() functions do not provide diagnostic information.
248 The example is realized for a server that does allow but not require client
291 * We must do it here, because the CHAIN_TOO_LONG error would not
374 Licensed under the Apache License 2.0 (the "License"). You may not use