/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_asn1.c | 80 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 173 if (in->verify_result != X509_V_OK) 175 a.verify_result.length=LSIZE2; 176 a.verify_result.type=V_ASN1_INTEGER; 177 a.verify_result.data=ibuf5; 178 ASN1_INTEGER_set(&a.verify_result,in->verify_result); 200 if (in->verify_result != X509_V_OK) 201 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5); 224 if (in->verify_result ! [all...] |
H A D | ssl_txt.c | 181 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, 182 X509_verify_cert_error_string(x->verify_result)) <= 0) goto err;
|
H A D | ssl_sess.c | 118 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ 276 ss->verify_result = X509_V_OK; 409 s->verify_result = s->session->verify_result; 595 s->verify_result = s->session->verify_result;
|
H A D | s2_clnt.c | 1052 ERR_clear_error(); /* but we keep s->verify_result */ 1053 s->session->verify_result = s->verify_result;
|
H A D | s2_srvr.c | 1092 s->session->verify_result = s->verify_result;
|
H A D | s3_clnt.c | 893 al=ssl_verify_alarm_type(s->verify_result); 897 ERR_clear_error(); /* but we keep s->verify_result */ 970 s->session->verify_result = s->verify_result;
|
H A D | s3_srvr.c | 2486 al=ssl_verify_alarm_type(s->verify_result); 2495 s->session->verify_result = s->verify_result;
|
H A D | ssl_cert.c | 540 s->verify_result=ctx.error;
|
H A D | ssl_lib.c | 310 s->verify_result=X509_V_OK; 2438 ssl->verify_result=arg; 2443 return(ssl->verify_result);
|
H A D | ssl.h | 460 long verify_result; /* only for servers */ member in struct:ssl_session_st 963 long verify_result; member in struct:ssl_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_asn1.c | 106 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 229 if (in->verify_result != X509_V_OK) { 230 a.verify_result.length = LSIZE2; 231 a.verify_result.type = V_ASN1_INTEGER; 232 a.verify_result.data = ibuf5; 233 ASN1_INTEGER_set(&a.verify_result, in->verify_result); 293 if (in->verify_result != X509_V_OK) 294 M_ASN1_I2D_len_EXP_opt(&(a.verify_result), i2d_ASN1_INTEGER, 5, v5); 346 if (in->verify_result ! [all...] |
H A D | ssl_txt.c | 255 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, 256 X509_verify_cert_error_string(x->verify_result)) <= 0)
|
H A D | ssl_sess.c | 203 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ 539 ss->verify_result = X509_V_OK; 560 * existing session if need be) and s->verify_result is set from the session. 716 s->verify_result = s->session->verify_result; 933 s->verify_result = s->session->verify_result;
|
H A D | s2_clnt.c | 1026 ERR_clear_error(); /* but we keep s->verify_result */ 1027 s->session->verify_result = s->verify_result;
|
H A D | s2_srvr.c | 1126 s->session->verify_result = s->verify_result;
|
H A D | s3_srvr.c | 1268 s->session->verify_result = X509_V_OK; 3268 al = ssl_verify_alarm_type(s->verify_result); 3278 s->session->verify_result = s->verify_result;
|
H A D | ssl_cert.c | 769 s->verify_result = ctx.error;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_asn1.c | 106 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 229 if (in->verify_result != X509_V_OK) { 230 a.verify_result.length = LSIZE2; 231 a.verify_result.type = V_ASN1_INTEGER; 232 a.verify_result.data = ibuf5; 233 ASN1_INTEGER_set(&a.verify_result, in->verify_result); 293 if (in->verify_result != X509_V_OK) 294 M_ASN1_I2D_len_EXP_opt(&(a.verify_result), i2d_ASN1_INTEGER, 5, v5); 346 if (in->verify_result ! [all...] |
H A D | ssl_txt.c | 255 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, 256 X509_verify_cert_error_string(x->verify_result)) <= 0)
|
H A D | ssl_sess.c | 203 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ 539 ss->verify_result = X509_V_OK; 560 * existing session if need be) and s->verify_result is set from the session. 716 s->verify_result = s->session->verify_result; 933 s->verify_result = s->session->verify_result;
|
H A D | s2_clnt.c | 1026 ERR_clear_error(); /* but we keep s->verify_result */ 1027 s->session->verify_result = s->verify_result;
|
H A D | s2_srvr.c | 1126 s->session->verify_result = s->verify_result;
|
H A D | s3_srvr.c | 1268 s->session->verify_result = X509_V_OK; 3268 al = ssl_verify_alarm_type(s->verify_result); 3278 s->session->verify_result = s->verify_result;
|
H A D | ssl_cert.c | 769 s->verify_result = ctx.error;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 460 long verify_result; /* only for servers */ member in struct:ssl_session_st 963 long verify_result; member in struct:ssl_st
|