| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_cert_verify_callback.pod | 5 SSL_CTX_set_cert_verify_callback - set peer certificate verification procedure 17 SSL_CTX_set_cert_verify_callback() sets the verification callback function for 24 a verification function is called regardless of the verification mode. 25 If the application does not explicitly specify a verification callback function, 26 the built-in verification function is used. 27 If a verification callback I<callback> is specified via 33 I<callback> should return 1 to indicate verification success 34 and 0 to indicate verification failure. 38 if the verification mode is B<SSL_VERIFY_NONE>. 45 typically done in case the certificate verification was not yet able [all …]
|
| H A D | SSL_CTX_set_verify.pod | 12 - set various SSL/TLS parameters for peer certificate verification 33 SSL_CTX_set_verify() sets the verification flags for B<ctx> to be B<mode> and 37 SSL_set_verify() sets the verification flags for B<ssl> to be B<mode> and 45 of the current SSL object that is doing the verification. 50 This would be typically done in case the certificate verification was not yet 55 information needed for the verification. 57 server certificate verification step. 63 verification that shall be allowed for B<ctx>. 66 verification that shall be allowed for B<ssl>. 81 The verification of certificates can be controlled by a set of logically [all …]
|
| H A D | X509_STORE_CTX_new.pod | 85 X509_STORE_CTX_init() sets up I<ctx> for a subsequent verification operation. 88 given I<ctx>. Among others, it sets the verification parameters associated 92 L<X509_STORE_CTX_verify(3)>, i.e., a context is only good for one verification. 102 and the caller must not free it before verification is complete. 105 will need a verification target. 108 list of untrusted certificates as its verification target, 111 X509_STORE_CTX_init_rpk() sets up I<ctx> for a subsequent verification 117 and the caller must not free it before verification is complete. 127 and the caller must not free it before verification is complete. 133 and the caller must not free it before verification is complete. [all …]
|
| H A D | X509_VERIFY_PARAM_set_flags.pod | 22 - X509 verification parameters 77 a certificate verification operation. 80 it with B<flags>. See L</VERIFICATION FLAGS> for a complete 86 which specifies how verification flags are copied from one structure to 92 X509_VERIFY_PARAM_set_purpose() sets the verification purpose in B<param> 102 X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to 114 X509_VERIFY_PARAM_set_depth() sets the maximum verification depth to B<depth>. 155 certificate verification automatically invokes L<X509_check_host(3)> 161 be suppressed as appropriate when DANE verification is enabled. 201 is specified, certificate verification automatically invokes [all …]
|
| H A D | X509_STORE_CTX_set_verify_cb.pod | 21 - get and set X509_STORE_CTX components such as verification callback 55 X509_STORE_CTX_set_verify_cb() sets the verification callback of B<ctx> to 58 The verification callback can be used to customise the operation of certificate 59 verification, for instance by overriding error conditions or logging errors for 62 However, a verification callback is B<not> essential and the default operation 72 is performing the verification operation. A callback can examine this 77 X509_STORE_CTX_print_verify_cb() is a verification callback function that, 78 when a certificate verification has failed, adds an entry to the error queue 109 In general a verification callback should B<NOT> unconditionally return 1 in 110 all circumstances because this will allow verification to succeed no matter [all …]
|
| H A D | SSL_get_verify_result.pod | 5 SSL_get_verify_result - get result of peer certificate verification 15 SSL_get_verify_result() returns the result of the verification of the 20 SSL_get_verify_result() can only return one error code while the verification 22 the last verification error that occurred during the processing is available 25 Sometimes there can be a sequence of errors leading to the verification 32 The verification result is part of the established session and is restored 38 X509_V_OK. This is because no verification error occurred, it does however 50 The verification succeeded or no peer certificate was presented.
|
| H A D | X509_STORE_CTX_get_error.pod | 9 X509_verify_cert_error_string - get or set certificate verification status 30 These functions are typically called after certificate or chain verification 32 an error or in a verification callback to determine the nature of an error. 37 an error, likely because a verification callback function has waived the error. 40 it might be used in a verification callback to set an error based on additional 62 It may be examined by a verification callback invoked to handle each error 63 encountered during chain verification and is no longer required after such a 75 verification is successful. Otherwise the returned chain may be incomplete or 82 verification error I<n>. 94 verification error I<n>. [all …]
|
| H A D | SSL_CTX_get_verify_mode.pod | 5 …h, SSL_get_verify_callback, SSL_CTX_get_verify_callback - get currently set verification parameters 20 SSL_CTX_get_verify_mode() returns the verification mode currently set in 23 SSL_get_verify_mode() returns the verification mode currently set in 26 SSL_CTX_get_verify_depth() returns the verification depth limit currently set 30 SSL_get_verify_depth() returns the verification depth limit currently set 34 SSL_CTX_get_verify_callback() returns a function pointer to the verification 38 SSL_get_verify_callback() returns a function pointer to the verification
|
| H A D | SSL_set_retry_verify.pod | 5 SSL_set_retry_verify - indicate that certificate verification should be retried 15 SSL_set_retry_verify() should be called from the certificate verification 19 is resumed again by the application, retrying the verification step. 26 verification callback on the client side is undefined. 45 if (/* we need to retry verification callback */) 48 /* do normal processing of the verification callback */ 58 incompatible handling of a negative return value from the verification
|
| H A D | SSL_CTX_set1_verify_cert_store.pod | 11 verification or chain store 34 set the certificate store used for certificate verification to B<st>. 60 The verification store is used to verify the certificate chain sent by the 61 peer: that is an SSL/TLS client will use the verification store to verify 67 L<openssl-verification-options(1)/Certification Path Building> and 68 L<openssl-verification-options(1)/Certification Path Validation>. 79 If the chain or the verification store is not set then the store associated
|
| H A D | TS_VERIFY_CTX.pod | 10 - manage the TS response verification context 58 verification context created in advance. 62 TS_VERIFY_CTX_init() initializes a verification context. 65 verification context to be freed. If I<ctx> is NULL, the call is ignored. 67 TS_VERIFY_CTX_set_flags() sets the flags in the verification context. I<f> are 70 TS_VERIFY_CTX_add_flags() adds flags to the verification context. I<f> are the 79 TS_VERIFY_CTX_set0_store() sets the store for the verification context. I<s> is 86 B<TS_VERIFY_CTX> object and initializes it. I<ctx> is the verification context
|
| H A D | X509_verify_cert.pod | 37 The verification context, of type B<X509_STORE_CTX>, can be constructed 43 such as a callback function that allows customizing the verification outcome. 44 A complete description of the certificate verification process is contained in 45 the L<openssl-verification-options(1)> manual page. 62 When the verification target is a raw public key, rather than a certificate, 86 verification indicated success, the stored error code may be different from 87 X509_V_OK, likely because a verification callback function has waived the error.
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_CTX_set_verify.3 | 71 \&\- set various SSL/TLS parameters for peer certificate verification 92 \&\fBSSL_CTX_set_verify()\fR sets the verification flags for \fBctx\fR to be \fBmode\fR and 96 \&\fBSSL_set_verify()\fR sets the verification flags for \fBssl\fR to be \fBmode\fR and 104 of the current SSL object that is doing the verification. 109 This would be typically done in case the certificate verification was not yet 114 information needed for the verification. 116 server certificate verification step. 122 verification that shall be allowed for \fBctx\fR. 125 verification that shall be allowed for \fBssl\fR. 139 The verification of certificates can be controlled by a set of logically [all …]
|
| H A D | SSL_CTX_set_cert_verify_callback.3 | 64 SSL_CTX_set_cert_verify_callback \- set peer certificate verification procedure 76 \&\fBSSL_CTX_set_cert_verify_callback()\fR sets the verification callback function for 82 a verification function is called regardless of the verification mode. 83 If the application does not explicitly specify a verification callback function, 84 the built-in verification function is used. 85 If a verification callback \fIcallback\fR is specified via 91 \&\fIcallback\fR should return 1 to indicate verification success 92 and 0 to indicate verification failure. 96 if the verification mode is \fBSSL_VERIFY_NONE\fR. 103 typically done in case the certificate verification was not yet able [all …]
|
| H A D | X509_STORE_CTX_new.3 | 144 \&\fBX509_STORE_CTX_init()\fR sets up \fIctx\fR for a subsequent verification operation. 147 given \fIctx\fR. Among others, it sets the verification parameters associated 151 \&\fBX509_STORE_CTX_verify\fR\|(3), i.e., a context is only good for one verification. 161 and the caller must not free it before verification is complete. 164 will need a verification target. 167 list of untrusted certificates as its verification target, 170 \&\fBX509_STORE_CTX_init_rpk()\fR sets up \fIctx\fR for a subsequent verification 176 and the caller must not free it before verification is complete. 186 and the caller must not free it before verification is complete. 192 and the caller must not free it before verification is complete. [all …]
|
| H A D | X509_VERIFY_PARAM_set_flags.3 | 81 \&\- X509 verification parameters 136 a certificate verification operation. 139 it with \fBflags\fR. See "VERIFICATION FLAGS" for a complete 145 which specifies how verification flags are copied from one structure to 151 \&\fBX509_VERIFY_PARAM_set_purpose()\fR sets the verification purpose in \fBparam\fR 161 \&\fBX509_VERIFY_PARAM_set_time()\fR sets the verification time in \fBparam\fR to 173 \&\fBX509_VERIFY_PARAM_set_depth()\fR sets the maximum verification depth to \fBdepth\fR. 214 certificate verification automatically invokes \fBX509_check_host\fR\|(3) 220 be suppressed as appropriate when DANE verification is enabled. 260 is specified, certificate verification automatically invokes [all …]
|
| H A D | X509_STORE_CTX_get_error.3 | 68 X509_verify_cert_error_string \- get or set certificate verification status 89 These functions are typically called after certificate or chain verification 91 an error or in a verification callback to determine the nature of an error. 96 an error, likely because a verification callback function has waived the error. 99 it might be used in a verification callback to set an error based on additional 121 It may be examined by a verification callback invoked to handle each error 122 encountered during chain verification and is no longer required after such a 134 verification is successful. Otherwise the returned chain may be incomplete or 143 verification error \fIn\fR. 154 verification error \fIn\fR. [all …]
|
| H A D | X509_STORE_CTX_set_verify_cb.3 | 80 \&\- get and set X509_STORE_CTX components such as verification callback 114 \&\fBX509_STORE_CTX_set_verify_cb()\fR sets the verification callback of \fBctx\fR to 117 The verification callback can be used to customise the operation of certificate 118 verification, for instance by overriding error conditions or logging errors for 121 However, a verification callback is \fBnot\fR essential and the default operation 131 is performing the verification operation. A callback can examine this 136 \&\fBX509_STORE_CTX_print_verify_cb()\fR is a verification callback function that, 137 when a certificate verification has failed, adds an entry to the error queue 166 In general a verification callback should \fBNOT\fR unconditionally return 1 in 167 all circumstances because this will allow verification to succeed no matter [all …]
|
| H A D | SSL_get_verify_result.3 | 64 SSL_get_verify_result \- get result of peer certificate verification 74 \&\fBSSL_get_verify_result()\fR returns the result of the verification of the 78 \&\fBSSL_get_verify_result()\fR can only return one error code while the verification 80 the last verification error that occurred during the processing is available 83 Sometimes there can be a sequence of errors leading to the verification 90 The verification result is part of the established session and is restored 95 X509_V_OK. This is because no verification error occurred, it does however 103 The verification succeeded or no peer certificate was presented.
|
| H A D | SSL_set_retry_verify.3 | 64 SSL_set_retry_verify \- indicate that certificate verification should be retried 74 \&\fBSSL_set_retry_verify()\fR should be called from the certificate verification 78 is resumed again by the application, retrying the verification step. 84 verification callback on the client side is undefined. 102 \& if (/* we need to retry verification callback */) 105 \& /* do normal processing of the verification callback */ 114 incompatible handling of a negative return value from the verification
|
| H A D | SSL_CTX_get_verify_mode.3 | 64 …, SSL_get_verify_callback, SSL_CTX_get_verify_callback \- get currently set verification parameters 79 \&\fBSSL_CTX_get_verify_mode()\fR returns the verification mode currently set in 82 \&\fBSSL_get_verify_mode()\fR returns the verification mode currently set in 85 \&\fBSSL_CTX_get_verify_depth()\fR returns the verification depth limit currently set 89 \&\fBSSL_get_verify_depth()\fR returns the verification depth limit currently set 93 \&\fBSSL_CTX_get_verify_callback()\fR returns a function pointer to the verification 97 \&\fBSSL_get_verify_callback()\fR returns a function pointer to the verification
|
| H A D | TS_VERIFY_CTX.3 | 69 \&\- manage the TS response verification context 121 verification context created in advance. 125 \&\fBTS_VERIFY_CTX_init()\fR initializes a verification context. 128 verification context to be freed. If \fIctx\fR is NULL, the call is ignored. 130 \&\fBTS_VERIFY_CTX_set_flags()\fR sets the flags in the verification context. \fIf\fR are 133 \&\fBTS_VERIFY_CTX_add_flags()\fR adds flags to the verification context. \fIf\fR are the 142 \&\fBTS_VERIFY_CTX_set0_store()\fR sets the store for the verification context. \fIs\fR is 149 \&\fBTS_VERIFY_CTX\fR object and initializes it. \fIctx\fR is the verification context
|
| H A D | SSL_CTX_set1_verify_cert_store.3 | 70 verification or chain store 93 set the certificate store used for certificate verification to \fBst\fR. 118 The verification store is used to verify the certificate chain sent by the 119 peer: that is an SSL/TLS client will use the verification store to verify 125 "Certification Path Building" in \fBopenssl\-verification\-options\fR\|(1) and 126 "Certification Path Validation" in \fBopenssl\-verification\-options\fR\|(1). 137 If the chain or the verification store is not set then the store associated
|
| /freebsd/crypto/heimdal/doc/doxyout/hx509/man/man3/ |
| H A D | hx509_verify.3 | 1 .TH "hx509 verification functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdalx509library" \" -*- nrof… 5 hx509 verification functions \- 192 … the verification context, makes an reference to the keyset, so the consumer can free the keyset i… 196 \fIctx\fP a verification context 204 …estruction of the verification context. If there is no revoke context, the verification process is… 208 \fIctx\fP a verification context. 216 Free an hx509 verification context. 226 Allocate an verification context that is used fo control the verification process. 249 \fIctx\fP A hx509 verification context. 268 \fIctx\fP a verification context [all …]
|
| /freebsd/contrib/libfido2/man/ |
| H A D | fido2-token.1 | 174 A PIN or equivalent user-verification gesture is required. 191 A PIN or equivalent user-verification gesture is required. 203 .Dq user verification always 218 A PIN or equivalent user-verification gesture is required. 237 A PIN or equivalent user-verification gesture is required. 264 A PIN or equivalent user-verification gesture is required. 304 A PIN or equivalent user-verification gesture is required. 323 A PIN or equivalent user-verification gesture is required. 342 A PIN or equivalent user-verification gesture is required. 378 .Dq user verification always [all …]
|