/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/ |
H A D | tunala.c | 92 int out_verify, int verify_mode, 343 int verify_mode = def_verify_mode; local 489 verify_mode |= SSL_VERIFY_PEER; 492 verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; 495 verify_mode |= SSL_VERIFY_CLIENT_ONCE; 543 out_verify, verify_mode, 788 int out_verify, int verify_mode, 872 /* Success! (includes setting verify_mode) */ 874 SSL_CTX_set_verify(ctx, verify_mode, cb_ssl_verify); 781 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | tunala.c | 73 int ctx_options, int out_state, int out_verify, int verify_mode, 313 int verify_mode = def_verify_mode; local 446 verify_mode |= SSL_VERIFY_PEER; 449 verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; 452 verify_mode |= SSL_VERIFY_CLIENT_ONCE; 497 verify_mode, verify_depth)) == NULL) 732 int ctx_options, int out_state, int out_verify, int verify_mode, 819 /* Success! (includes setting verify_mode) */ 821 SSL_CTX_set_verify(ctx, verify_mode, cb_ssl_verify); 728 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/ |
H A D | tunala.c | 92 int out_verify, int verify_mode, 343 int verify_mode = def_verify_mode; local 489 verify_mode |= SSL_VERIFY_PEER; 492 verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; 495 verify_mode |= SSL_VERIFY_CLIENT_ONCE; 543 out_verify, verify_mode, 788 int out_verify, int verify_mode, 872 /* Success! (includes setting verify_mode) */ 874 SSL_CTX_set_verify(ctx, verify_mode, cb_ssl_verify); 781 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | d1_srvr.c | 538 !(s->verify_mode & SSL_VERIFY_PEER) || 544 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 556 !(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) ||
|
H A D | s3_srvr.c | 504 !(s->verify_mode & SSL_VERIFY_PEER) || 510 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 522 !(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) || 1448 if (!SSL_USE_SIGALGS(s) || !(s->verify_mode & SSL_VERIFY_PEER)) { 3177 if ((s->verify_mode & SSL_VERIFY_PEER) && 3178 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { 3253 else if ((s->verify_mode & SSL_VERIFY_PEER) && 3254 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) {
|
H A D | s2_srvr.c | 310 if (!(s->verify_mode & SSL_VERIFY_PEER) || 312 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE))) { 1022 if (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT) {
|
H A D | ssl_lib.c | 341 s->verify_mode = ctx->verify_mode; 825 return (s->verify_mode); 839 return (ctx->verify_mode); 854 s->verify_mode = mode; 1938 ret->verify_mode = SSL_VERIFY_NONE; 2219 ctx->verify_mode = mode;
|
H A D | s2_clnt.c | 1022 if ((s->verify_mode != SSL_VERIFY_NONE) && (i <= 0)) {
|
H A D | ssl_sess.c | 670 if ((s->verify_mode & SSL_VERIFY_PEER) && s->sid_ctx_length == 0) {
|
H A D | ssl.h | 1043 int verify_mode; member in struct:ssl_ctx_st 1547 int verify_mode; member in struct:ssl_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | d1_srvr.c | 538 !(s->verify_mode & SSL_VERIFY_PEER) || 544 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 556 !(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) ||
|
H A D | s3_srvr.c | 504 !(s->verify_mode & SSL_VERIFY_PEER) || 510 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 522 !(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) || 1448 if (!SSL_USE_SIGALGS(s) || !(s->verify_mode & SSL_VERIFY_PEER)) { 3177 if ((s->verify_mode & SSL_VERIFY_PEER) && 3178 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { 3253 else if ((s->verify_mode & SSL_VERIFY_PEER) && 3254 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) {
|
H A D | s2_srvr.c | 310 if (!(s->verify_mode & SSL_VERIFY_PEER) || 312 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE))) { 1022 if (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT) {
|
H A D | ssl_lib.c | 341 s->verify_mode = ctx->verify_mode; 825 return (s->verify_mode); 839 return (ctx->verify_mode); 854 s->verify_mode = mode; 1938 ret->verify_mode = SSL_VERIFY_NONE; 2219 ctx->verify_mode = mode;
|
H A D | s2_clnt.c | 1022 if ((s->verify_mode != SSL_VERIFY_NONE) && (i <= 0)) {
|
H A D | ssl_sess.c | 670 if ((s->verify_mode & SSL_VERIFY_PEER) && s->sid_ctx_length == 0) {
|
H A D | ssl.h | 1043 int verify_mode; member in struct:ssl_ctx_st 1547 int verify_mode; member in struct:ssl_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_srvr.c | 370 !(s->verify_mode & SSL_VERIFY_PEER) || 374 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 381 !(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) || 2392 if ( (s->verify_mode & SSL_VERIFY_PEER) && 2393 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) 2473 else if ((s->verify_mode & SSL_VERIFY_PEER) && 2474 (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT))
|
H A D | d1_srvr.c | 361 !(s->verify_mode & SSL_VERIFY_PEER) || 365 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 372 !(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) ||
|
H A D | s2_srvr.c | 300 if (!(s->verify_mode & SSL_VERIFY_PEER) || 302 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE))) 987 if (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)
|
H A D | ssl_lib.c | 287 s->verify_mode=ctx->verify_mode; 666 return(s->verify_mode); 681 return(ctx->verify_mode); 697 s->verify_mode=mode; 1397 ret->verify_mode=SSL_VERIFY_NONE; 1547 ctx->verify_mode=mode;
|
H A D | ssl_sess.c | 337 if((s->verify_mode&SSL_VERIFY_PEER)
|
H A D | ssl.h | 739 int verify_mode; member in struct:ssl_ctx_st 944 int verify_mode; /* 0 don't care about verify failure. member in struct:ssl_st
|
H A D | s2_clnt.c | 1047 if ((s->verify_mode != SSL_VERIFY_NONE) && (!i))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 739 int verify_mode; member in struct:ssl_ctx_st 944 int verify_mode; /* 0 don't care about verify failure. member in struct:ssl_st
|