Revision c36ceb0b1550f0c2a8d56f81ea33c0d876020a07 authored by Adam Langley on 24 April 2013, 18:45:44 UTC, committed by Emilia Kasper on 24 September 2014, 13:56:09 UTC
that bad encryptions are treated like random session keys in constant time. (cherry picked from commit adb46dbc6dd7347750df2468c93e8c34bcb93a4b) Reviewed-by: Rich Salz <rsalz@openssl.org>
1 parent 904fcce
SSL_set_verify_result.pod
=pod
=head1 NAME
SSL_set_verify_result - override result of peer certificate verification
=head1 SYNOPSIS
#include <openssl/ssl.h>
void SSL_set_verify_result(SSL *ssl, long verify_result);
=head1 DESCRIPTION
SSL_set_verify_result() sets B<verify_result> of the object B<ssl> to be the
result of the verification of the X509 certificate presented by the peer,
if any.
=head1 NOTES
SSL_set_verify_result() overrides the verification result. It only changes
the verification result of the B<ssl> object. It does not become part of the
established session, so if the session is to be reused later, the original
value will reappear.
The valid codes for B<verify_result> are documented in L<verify(1)|verify(1)>.
=head1 RETURN VALUES
SSL_set_verify_result() does not provide a return value.
=head1 SEE ALSO
L<ssl(3)|ssl(3)>, L<SSL_get_verify_result(3)|SSL_get_verify_result(3)>,
L<SSL_get_peer_certificate(3)|SSL_get_peer_certificate(3)>,
L<verify(1)|verify(1)>
=cut

Computing file changes ...