/freebsd/crypto/openssl/crypto/x509/ |
H A D | v3_ncons.c | 276 if (r != X509_V_OK) in NAME_CONSTRAINTS_check() 296 if (r != X509_V_OK) in NAME_CONSTRAINTS_check() 305 if (r != X509_V_OK) in NAME_CONSTRAINTS_check() 309 return X509_V_OK; in NAME_CONSTRAINTS_check() 400 return X509_V_OK; in cn2dnsid() 403 return X509_V_OK; in cn2dnsid() 436 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN() 445 if (r != X509_V_OK) in NAME_CONSTRAINTS_check_CN() 448 return X509_V_OK; in NAME_CONSTRAINTS_check_CN() 508 if (r == X509_V_OK) in nc_match() [all …]
|
H A D | x509_cmp.c | 464 return X509_V_OK; in check_suite_b() 475 return X509_V_OK; in X509_chain_check_suiteb() 504 if (rv != X509_V_OK) { in X509_chain_check_suiteb() 518 if (rv != X509_V_OK) in X509_chain_check_suiteb() 525 if (rv != X509_V_OK) { in X509_chain_check_suiteb() 546 return X509_V_OK; in X509_CRL_check_suiteb()
|
H A D | v3_purp.c | 378 return X509_V_OK; in check_sig_alg_match() 557 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ in ossl_x509v3_cache_extensions() 559 && check_sig_alg_match(X509_get0_pubkey(x), x) == X509_V_OK) in ossl_x509v3_cache_extensions() 909 if ((ret = ossl_x509_likely_issued(issuer, subject)) != X509_V_OK) in X509_check_issued() 929 if (ret != X509_V_OK) in ossl_x509_likely_issued() 950 return X509_V_OK; in ossl_x509_signing_allowed() 956 return X509_V_OK; in X509_check_akid() 988 return X509_V_OK; in X509_check_akid()
|
H A D | x509_vfy.c | 161 if (err != X509_V_OK) in verify_cb_cert() 226 CB_FAIL_IF(err != X509_V_OK, ctx, NULL, ctx->error_depth, err); in verify_chain() 302 if (ret <= 0 && ctx->error == X509_V_OK) in X509_verify_cert() 348 if (err == X509_V_OK) in check_issued() 670 int err = X509_V_OK; in check_name_constraints() 723 CB_FAIL_IF(err != X509_V_OK, ctx, x, i, err); in check_name_constraints() 740 if (rv == X509_V_OK && i == 0 in check_name_constraints() 751 case X509_V_OK: in check_name_constraints() 1274 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { in crl_akid_check() 1286 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { in crl_akid_check() [all …]
|
H A D | x509_txt.c | 24 case X509_V_OK: in X509_verify_cert_error_string()
|
H A D | t_x509.c | 408 if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) { in ossl_x509_print_ex_brief()
|
/freebsd/crypto/openssl/test/ |
H A D | crltest.c | 285 status = X509_verify_cert(ctx) == 1 ? X509_V_OK in verify() 324 X509_V_FLAG_CRL_CHECK), X509_V_OK) in test_basic_crl() 362 X509_V_FLAG_CRL_CHECK), X509_V_OK); in test_known_critical_crl()
|
H A D | danetest.c | 354 SSL_set_verify_result(ssl, X509_V_OK); in test_tlsafile() 361 if (want == X509_V_OK) in test_tlsafile()
|
/freebsd/usr.sbin/rpc.tlsclntd/ |
H A D | rpc.tlsclntd.c | 613 if (verfret == X509_V_OK && (rpctls_verify_cafile != NULL || in rpctls_connect() 617 if (verfret != X509_V_OK && (rpctls_verify_cafile != NULL || in rpctls_connect() 619 if (verfret != X509_V_OK) { in rpctls_connect() 659 if (ret == X509_V_OK && (rpctls_verify_cafile != NULL || in rpctls_connect()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_verify_result.pod | 38 X509_V_OK. This is because no verification error occurred, it does however 48 =item X509_V_OK
|
H A D | X509_check_issued.pod | 29 X509_check_issued() returns B<X509_V_OK> if all checks are successful
|
H A D | SSL_get_peer_cert_chain.pod | 32 X509_V_OK) the chain may be incomplete or invalid.
|
H A D | X509_STORE_CTX_get_error.pod | 36 It may return a code != X509_V_OK even if X509_verify_cert() did not indicate 84 X509_STORE_CTX_get_error() returns B<X509_V_OK> or an error code. 102 =item B<X509_V_OK: ok>
|
H A D | X509_verify_cert.pod | 79 X509_V_OK, likely because a verification callback function has waived the error.
|
H A D | SSL_set1_host.pod | 92 if (SSL_get_verify_result(ssl) == X509_V_OK) {
|
H A D | X509_STORE_CTX_set_verify_cb.pod | 188 if (err == X509_V_OK && ok == 2)
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 46 was B<X509_V_OK> it will be set to B<X509_V_ERR_NO_VALID_SCTS> after the
|
H A D | SSL_CTX_dane_enable.pod | 291 if (SSL_get_verify_result(ssl) == X509_V_OK) { 302 } else if (SSL_get_verify_result(ssl) == X509_V_OK) {
|
/freebsd/crypto/openssl/apps/ |
H A D | verify.c | 292 if (i > 0 && X509_STORE_CTX_get_error(csc) == X509_V_OK) { in check() 388 if (cert_error == X509_V_OK && ok == 2) in cb()
|
H A D | s_time.c | 447 if (verify_args.error != X509_V_OK) in doConnection()
|
H A D | smime.c | 710 && ((error != X509_V_OK) || (ok != 2))) in smime_cb()
|
/freebsd/usr.sbin/rpc.tlsservd/ |
H A D | rpc.tlsservd.c | 768 if (verfret != X509_V_OK) { in rpctls_server() 792 else if (verfret == X509_V_OK) { in rpctls_server()
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | s_cb.c | 29 VERIFY_CB_ARGS verify_args = { -1, 0, X509_V_OK, 0 }; 107 if (err == X509_V_OK && ok == 2 && !verify_args.quiet) in verify_callback() 1192 if (verify_err == X509_V_OK) { in print_verify_detail()
|
/freebsd/crypto/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 232 int self_issued = X509_check_issued(cert, cert) == X509_V_OK; in cert_acceptable()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 1398 {X509_V_OK, SSL_AD_CERTIFICATE_UNKNOWN} 1405 for (tp = x509table; tp->x509err != X509_V_OK; ++tp) in ssl_x509err2alert()
|