Searched refs:verify_result (Results 1 – 12 of 12) sorted by relevance
/openssl/doc/man3/ |
H A D | SSL_set_verify_result.pod | 11 void SSL_set_verify_result(SSL *ssl, long verify_result); 15 SSL_set_verify_result() sets B<verify_result> of the object B<ssl> to be the 26 The valid codes for B<verify_result> are documented in L<openssl-verify(1)>.
|
H A D | SSL_set1_server_cert_type.pod | 136 int verify_result; 160 verify_result = SSL_get_verify_result(ssl); 161 if (verify_result == X509_V_OK) { 163 } else if (verify_result == X509_V_ERR_DANE_NO_MATCH) { 168 } else if (verify_result == X509_V_ERR_RPK_UNTRUSTED) {
|
/openssl/ssl/ |
H A D | ssl_asn1.c | 30 int32_t verify_result; member 62 ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, verify_result, ZINT32, 5), 173 as.verify_result = in->verify_result; in i2d_SSL_SESSION() 357 ret->verify_result = as->verify_result; in d2i_SSL_SESSION_ex()
|
H A D | ssl_txt.c | 148 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, in SSL_SESSION_print() 149 X509_verify_cert_error_string(x->verify_result)) <= 0) in SSL_SESSION_print()
|
H A D | ssl_sess.c | 113 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ in SSL_SESSION_new() 484 ss->verify_result = X509_V_OK; in ssl_get_new_session() 695 s->verify_result = s->session->verify_result; in ssl_get_prev_session() 901 sc->verify_result = session->verify_result; in SSL_set_session()
|
H A D | ssl_lib.c | 866 s->verify_result = X509_V_OK; in ossl_ssl_connection_new_int() 1276 if (!DANETLS_ENABLED(dane) || sc->verify_result != X509_V_OK) in SSL_get0_dane_authority() 1298 if (!DANETLS_ENABLED(dane) || sc->verify_result != X509_V_OK) in SSL_get0_dane_tlsa() 5551 sc->verify_result = arg; in SSL_set_verify_result() 5561 return sc->verify_result; in SSL_get_verify_result() 6509 s->verify_result != X509_V_OK || in ssl_validate_ct() 6585 s->verify_result = X509_V_ERR_NO_VALID_SCTS; in ssl_validate_ct()
|
H A D | ssl_local.h | 521 long verify_result; /* only for servers */ member 1534 long verify_result; member
|
H A D | ssl_cert.c | 504 s->verify_result = X509_STORE_CTX_get_error(ctx); in ssl_verify_internal()
|
/openssl/ssl/statem/ |
H A D | statem_srvr.c | 1993 s->session->verify_result = X509_V_OK; in tls_early_post_process_client_hello() 3536 SSLfatal(sc, ssl_x509err2alert(sc->verify_result), in tls_process_client_rpk() 3570 sc->session->verify_result = sc->verify_result; in tls_process_client_rpk() 3725 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_process_client_certificate() 3757 s->session->verify_result = s->verify_result; in tls_process_client_certificate()
|
H A D | statem_clnt.c | 1949 sc->session->verify_result = sc->verify_result; in tls_post_process_server_rpk() 2093 SSLfatal(s, ssl_x509err2alert(s->verify_result), in tls_post_process_server_certificate() 2133 s->session->verify_result = s->verify_result; in tls_post_process_server_certificate()
|
/openssl/apps/ |
H A D | s_client.c | 3370 long verify_result; in print_stuff() local 3584 verify_result = SSL_get_verify_result(s); in print_stuff() 3585 BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result, in print_stuff() 3586 X509_verify_cert_error_string(verify_result)); in print_stuff()
|
/openssl/ |
H A D | CHANGES.md | 16738 * Store verify_result within SSL_SESSION also for client side to 16740 always resulted in verify_result==X509_V_OK, not using the original 18541 * For servers, store verify_result in SSL_SESSION data structure 18548 ssl->verify_result to the appropriate error code to avoid
|
Completed in 123 milliseconds