Lines Matching refs:ok

114 	bool ok;
127 ok = false;
141 ok = true;
201 ok = RAND_load_file(randfile, -1) >=
203 if (use && !ok)
211 ok = false;
213 if (ok || bitnset(DBS_INSUFFICIENTENTROPY,
243 if (!ok && bitnset(DBS_INSUFFICIENTENTROPY, DontBlameSendmail))
259 ok = true;
261 done = ok ? RI_SUCCESS : RI_FAIL;
262 return ok;
336 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */
338 # define TLS_S_KEY_OK 0x00000008 /* key file is ok */
340 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */
342 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */
344 # define TLS_S_CRLF_OK 0x00000200 /* CRL file is ok */
348 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */
350 # define TLS_S_KEY2_OK 0x00008000 /* 2nd key file is ok */
353 # define TLS_S_DH_OK 0x00200000 /* DH cert is ok */
355 # define TLS_S_DHPAR_OK 0x00800000 /* DH param file is ok to use */
371 ** ok?
398 ** ok?
425 ** st -- status bit to set if ok
429 ** uses r, ok; may change ok and status.
433 # define TLS_OK_F(var, fn, req, st, type) if (ok) \
439 ok = false; \
467 ** st -- status bit to set if ok
471 ** uses r, ok, ex; may change ok and status.
475 # define TLS_SAFE_F(var, sff, req, ex, st, srv) if (ex && ok) \
481 ok = false; \
530 bool ok;
561 ok = true;
660 if (!ok)
661 return ok;
687 if (!ok)
688 return ok;
1124 sm_syslog(LOG_INFO, NOQID, "STARTTLS=%s, init=%d", who, ok);
1143 return ok;
1580 ** ok -- verify ok?
1585 ** 1 -- ok
1589 tls_verify_log(ok, ctx, name)
1590 int ok;
1616 name, depth, buf, ok, X509_verify_cert_error_string(reason));
1641 int ok;
1649 ok = X509_verify_cert(ctx);
1650 if (ok <= 0)
1653 return tls_verify_log(ok, ctx, "TLS");
1703 x509_verify_cb(ok, ctx)
1704 int ok;
1707 if (ok == 0)
1710 tls_verify_log(ok, ctx, "x509");
1717 return ok;