X509_V_OK
if (err != X509_V_OK) {
&& ((error != X509_V_OK) || (ok != 2)))
if (err == X509_V_OK && ok == 2 && !verify_args.quiet)
if (verify_err == X509_V_OK) {
VERIFY_CB_ARGS verify_args = { -1, 0, X509_V_OK, 0 };
if (vret == X509_V_OK) {
if (verify_err != X509_V_OK) {
if (verify_args.error != X509_V_OK)
&& ((error != X509_V_OK) || (ok != 2)))
if (i > 0 && X509_STORE_CTX_get_error(csc) == X509_V_OK) {
if (cert_error == X509_V_OK && ok == 2)
int self_issued = X509_check_issued(cert, cert) == X509_V_OK;
if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) {
if (r != X509_V_OK)
if (r != X509_V_OK)
if (r != X509_V_OK)
return X509_V_OK;
return X509_V_OK;
return X509_V_OK;
if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK)
if (r != X509_V_OK)
return X509_V_OK;
if (r == X509_V_OK)
if (r == X509_V_OK)
return X509_V_OK;
return X509_V_OK;
return X509_V_OK;
return X509_V_OK;
int ret = X509_V_OK;
return X509_V_OK;
return X509_V_OK;
ret = X509_V_OK;
ret = X509_V_OK;
return X509_V_OK;
if (ret != X509_V_OK)
return X509_V_OK;
return X509_V_OK;
return X509_V_OK;
return X509_V_OK;
if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */
&& check_sig_alg_match(X509_get0_pubkey(x), x) == X509_V_OK)
if ((ret = ossl_x509_likely_issued(issuer, subject)) != X509_V_OK)
return X509_V_OK;
return X509_V_OK;
if (rv != X509_V_OK) {
if (rv != X509_V_OK)
if (rv != X509_V_OK) {
return X509_V_OK;
case X509_V_OK:
if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
if (err != X509_V_OK)
if (rv != X509_V_OK && !verify_cb_crl(ctx, rv))
if (!ctx->verify_cb(ctx->error == X509_V_OK, ctx))
} else if (ossl_x509_likely_issued(xi, xi) != X509_V_OK
? X509_V_OK
CB_FAIL_IF(ret != X509_V_OK, ctx, xi, issuer_depth, ret);
return !!ctx->verify_cb(ctx->error == X509_V_OK, ctx);
CB_FAIL_IF(err != X509_V_OK, ctx, NULL, ctx->error_depth, err);
ctx->error = X509_V_OK;
if (ret <= 0 && ctx->error == X509_V_OK)
CB_FAIL_IF(err != X509_V_OK, ctx, cert, 0, err);
ctx->error = X509_V_OK;
case X509_V_OK:
if (ret <= 0 && ctx->error == X509_V_OK)
&& ossl_x509_signing_allowed(candidate, x) != X509_V_OK)
if (err == X509_V_OK)
int err = X509_V_OK;
CB_FAIL_IF(err != X509_V_OK, ctx, x, i, err);
if (rv == X509_V_OK && i == 0
case X509_V_OK:
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (!DANETLS_ENABLED(dane) || sc->verify_result != X509_V_OK)
if (!DANETLS_ENABLED(dane) || sc->verify_result != X509_V_OK)
if (s->ct_validation_callback == NULL || cert == NULL || s->verify_result != X509_V_OK || s->verified_chain == NULL || sk_X509_num(s->verified_chain) <= 1)
s->verify_result = X509_V_OK;
ss->verify_result = X509_V_OK;
{ X509_V_OK, SSL_AD_CERTIFICATE_UNKNOWN }
for (tp = x509table; tp->x509err != X509_V_OK; ++tp)
s->session->verify_result = X509_V_OK;
if (ok == X509_V_OK)
status = X509_verify_cert(ctx) == 1 ? X509_V_OK
X509_V_OK)
X509_V_OK);
status = X509_verify_cert(ctx) == 1 ? X509_V_OK
TEST_int_eq(status, X509_V_OK);
return status == X509_V_OK;
SSL_set_verify_result(ssl, X509_V_OK);
if (want == X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
if (SSL_get_verify_result(ssl) != X509_V_OK)
int client_expected = X509_V_OK;
if (err != X509_V_OK) {
if (err != X509_V_OK) {
if (verfret == X509_V_OK && (rpctls_verify_cafile != NULL ||
if (verfret != X509_V_OK && (rpctls_verify_cafile != NULL ||
if (verfret != X509_V_OK) {
if (ret == X509_V_OK && (rpctls_verify_cafile != NULL ||
if (verfret != X509_V_OK) {
else if (verfret == X509_V_OK) {