85 references to SslPolicyErrors
Aspire.RabbitMQ.Client.Tests (1)
AspireRabbitMQExtensionsTests.cs (1)
154Assert.Equal(SslPolicyErrors.RemoteCertificateNameMismatch, connectionFactory.Ssl.AcceptablePolicyErrors);
Aspire.RabbitMQ.Client.v7.Tests (1)
tests\Aspire.RabbitMQ.Client.Tests\AspireRabbitMQExtensionsTests.cs (1)
154Assert.Equal(SslPolicyErrors.RemoteCertificateNameMismatch, connectionFactory.Ssl.AcceptablePolicyErrors);
dotnet-svcutil-lib (13)
CmdCredentialsProvider.cs (3)
206private bool ValidateServerCertificate(object sender, X509Certificate cert, X509Chain chain, SslPolicyErrors sslPolicyErrors) 213result = sslPolicyErrors == SslPolicyErrors.None ? true : PromptUserOnInvalidCert(cert, sslPolicyErrors); 221private bool PromptUserOnInvalidCert(X509Certificate cert, SslPolicyErrors sslPolicyErrors)
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\HttpsChannelFactory.cs (2)
23private Func<HttpRequestMessage, X509Certificate2, X509Chain, SslPolicyErrors, bool> _remoteCertificateValidationCallback; 186private bool RemoteCertificateValidationCallback(HttpRequestMessage sender, X509Certificate2 certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors)
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\ServiceModelHttpMessageHandler.CoreClr.cs (1)
72public Func<HttpRequestMessage, X509Certificate2, X509Chain, SslPolicyErrors, bool>
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\SslStreamSecurityUpgradeProvider.cs (2)
392SslPolicyErrors sslPolicyErrors) 637SslPolicyErrors sslPolicyErrors)
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\TransportSecurityHelpers.cs (5)
373private static Func<HttpRequestMessage, X509Certificate2, X509Chain, SslPolicyErrors, bool> ChainValidator(Func<HttpRequestMessage, X509Certificate2, X509Chain, SslPolicyErrors, bool> previousValidator) 380Func<HttpRequestMessage, X509Certificate2, X509Chain, SslPolicyErrors, bool> chained = 394SslPolicyErrors sslPolicyErrors) 416return (sslPolicyErrors == SslPolicyErrors.None);
Interop.FunctionalTests (1)
Http3\Http3TlsTests.cs (1)
482RemoteCertificateValidationCallback = (object _sender, X509Certificate actualCertificate, X509Chain _chain, SslPolicyErrors _sslPolicyErrors) =>
Microsoft.AspNetCore.Server.Kestrel.Core (6)
HttpsConnectionAdapterOptions.cs (1)
72public Func<X509Certificate2, X509Chain?, SslPolicyErrors, bool>? ClientCertificateValidation { get; set; }
Middleware\HttpsConnectionMiddleware.cs (5)
377Func<X509Certificate2, X509Chain?, SslPolicyErrors, bool>? clientCertificateValidation, 380SslPolicyErrors sslPolicyErrors) 389if (sslPolicyErrors != SslPolicyErrors.None) 412private bool RemoteCertificateValidationCallback(object sender, X509Certificate? certificate, X509Chain? chain, SslPolicyErrors sslPolicyErrors) 573= (object sender, X509Certificate? certificate, X509Chain? chain, SslPolicyErrors sslPolicyErrors) =>
Microsoft.AspNetCore.Server.Kestrel.Core.Tests (2)
SniOptionsSelectorTests.cs (2)
767Assert.True(options.RemoteCertificateValidationCallback(sender: null, certificate: null, chain: null, SslPolicyErrors.None)); 803Assert.True(options.RemoteCertificateValidationCallback(sender: null, certificate: null, chain: null, SslPolicyErrors.None));
Microsoft.AspNetCore.Server.Kestrel.Transport.Quic.Tests (1)
QuicTestHelpers.cs (1)
114private static bool RemoteCertificateValidationCallback(object sender, X509Certificate certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors)
Microsoft.AspNetCore.Testing (1)
FakeCertificateHttpClientHandler.cs (1)
18return errors == SslPolicyErrors.None;
Microsoft.AspNetCore.Testing.Tests (3)
FakeCertificateHttpClientHandlerTests.cs (3)
29SslPolicyErrors.RemoteCertificateChainErrors)); 41SslPolicyErrors.None)); 53SslPolicyErrors.RemoteCertificateChainErrors));
netstandard (1)
netstandard.cs (1)
1249[assembly: System.Runtime.CompilerServices.TypeForwardedTo(typeof(System.Net.Security.SslPolicyErrors))]
System (1)
src\libraries\shims\System\ref\System.cs (1)
738[assembly: System.Runtime.CompilerServices.TypeForwardedTo(typeof(System.Net.Security.SslPolicyErrors))]
System.Net.Http (8)
System\Net\Http\HttpClientHandler.cs (3)
305public Func<HttpRequestMessage, X509Certificate2?, X509Chain?, SslPolicyErrors, bool>? ServerCertificateCustomValidationCallback 371private static Func<HttpRequestMessage, X509Certificate2?, X509Chain?, SslPolicyErrors, bool>? s_dangerousAcceptAnyServerCertificateValidator; 373public static Func<HttpRequestMessage, X509Certificate2?, X509Chain?, SslPolicyErrors, bool> DangerousAcceptAnyServerCertificateValidator =>
System\Net\Http\SocketsHttpHandler\ConnectHelper.cs (5)
25public readonly Func<HttpRequestMessage, X509Certificate2?, X509Chain?, SslPolicyErrors, bool> FromHttpClientHandler; 28public CertificateCallbackMapper(Func<HttpRequestMessage, X509Certificate2?, X509Chain?, SslPolicyErrors, bool> fromHttpClientHandler) 31ForSocketsHttpHandler = (object sender, X509Certificate? certificate, X509Chain? chain, SslPolicyErrors sslPolicyErrors) => 44Func<HttpRequestMessage, X509Certificate2?, X509Chain?, SslPolicyErrors, bool> localFromHttpClientHandler = mapper.FromHttpClientHandler; 46sslOptions.RemoteCertificateValidationCallback = (object sender, X509Certificate? certificate, X509Chain? chain, SslPolicyErrors sslPolicyErrors) =>
System.Net.Http.WinHttpHandler (1)
artifacts\obj\System.Net.Http.WinHttpHandler\Debug\net10.0\System.Net.Http.WinHttpHandler.notsupported.cs (1)
44public System.Func<System.Net.Http.HttpRequestMessage, System.Security.Cryptography.X509Certificates.X509Certificate2, System.Security.Cryptography.X509Certificates.X509Chain, System.Net.Security.SslPolicyErrors, bool>? ServerCertificateValidationCallback { get { throw new System.PlatformNotSupportedException(System.SR.PlatformNotSupported_WinHttpHandler); } set { throw new System.PlatformNotSupportedException(System.SR.PlatformNotSupported_WinHttpHandler); } }
System.Net.Quic (11)
src\libraries\Common\src\System\Net\Security\CertificateValidation.Unix.cs (7)
16internal static SslPolicyErrors BuildChainAndVerifyProperties(X509Chain chain, X509Certificate2 remoteCertificate, bool checkCertName, bool isServer, string? hostName, Span<byte> certificateBuffer) 20internal static SslPolicyErrors BuildChainAndVerifyProperties(X509Chain chain, X509Certificate2 remoteCertificate, bool checkCertName, bool _ /*isServer*/, string? hostName) 22SslPolicyErrors errors = chain.Build(remoteCertificate) ? 23SslPolicyErrors.None : 24SslPolicyErrors.RemoteCertificateChainErrors; 33return errors | SslPolicyErrors.RemoteCertificateNameMismatch; 63errors | SslPolicyErrors.RemoteCertificateNameMismatch;
System\Net\Quic\QuicConnection.SslConnectionOptions.cs (4)
178SslPolicyErrors sslPolicyErrors = SslPolicyErrors.None; 221sslPolicyErrors |= SslPolicyErrors.RemoteCertificateNotAvailable; 239else if (sslPolicyErrors != SslPolicyErrors.None)
System.Net.Requests (1)
System\Net\HttpWebRequest.cs (1)
1754return errors == SslPolicyErrors.None;
System.Net.Security (27)
src\libraries\Common\src\System\Net\Security\CertificateValidation.Unix.cs (7)
16internal static SslPolicyErrors BuildChainAndVerifyProperties(X509Chain chain, X509Certificate2 remoteCertificate, bool checkCertName, bool isServer, string? hostName, Span<byte> certificateBuffer) 20internal static SslPolicyErrors BuildChainAndVerifyProperties(X509Chain chain, X509Certificate2 remoteCertificate, bool checkCertName, bool _ /*isServer*/, string? hostName) 22SslPolicyErrors errors = chain.Build(remoteCertificate) ? 23SslPolicyErrors.None : 24SslPolicyErrors.RemoteCertificateChainErrors; 33return errors | SslPolicyErrors.RemoteCertificateNameMismatch; 63errors | SslPolicyErrors.RemoteCertificateNameMismatch;
System\Net\CertificateValidationPal.Unix.cs (1)
13internal static SslPolicyErrors VerifyCertificateProperties(
System\Net\Security\SslStream.cs (1)
33public delegate bool RemoteCertificateValidationCallback(object sender, X509Certificate? certificate, X509Chain? chain, SslPolicyErrors sslPolicyErrors);
System\Net\Security\SslStream.IO.cs (4)
551private bool CompleteHandshake(ref ProtocolToken alertToken, out SslPolicyErrors sslPolicyErrors, out X509ChainStatusFlags chainStatus) 559sslPolicyErrors = SslPolicyErrors.None; 592if (!CompleteHandshake(ref alertToken, out SslPolicyErrors sslPolicyErrors, out X509ChainStatusFlags chainStatus)) 599else if (sslPolicyErrors == SslPolicyErrors.RemoteCertificateChainErrors && chainStatus != X509ChainStatusFlags.NoError)
System\Net\Security\SslStream.Protocol.cs (14)
1038internal bool VerifyRemoteCertificate(RemoteCertificateValidationCallback? remoteCertValidationCallback, SslCertificateTrust? trust, ref ProtocolToken alertToken, out SslPolicyErrors sslPolicyErrors, out X509ChainStatusFlags chainStatus) 1040sslPolicyErrors = SslPolicyErrors.None; 1064sslPolicyErrors |= SslPolicyErrors.RemoteCertificateNotAvailable; 1117sslPolicyErrors &= ~SslPolicyErrors.RemoteCertificateNotAvailable; 1120success = (sslPolicyErrors == SslPolicyErrors.None); 1161private void CreateFatalHandshakeAlertToken(SslPolicyErrors sslPolicyErrors, X509Chain chain, ref ProtocolToken alertToken) 1167case SslPolicyErrors.RemoteCertificateChainErrors: 1170case SslPolicyErrors.RemoteCertificateNameMismatch: 1173case SslPolicyErrors.RemoteCertificateNotAvailable: 1274private void LogCertificateValidation(RemoteCertificateValidationCallback? remoteCertValidationCallback, SslPolicyErrors sslPolicyErrors, bool success, X509Chain chain) 1279if (sslPolicyErrors != SslPolicyErrors.None) 1282if ((sslPolicyErrors & SslPolicyErrors.RemoteCertificateNotAvailable) != 0) 1287if ((sslPolicyErrors & SslPolicyErrors.RemoteCertificateNameMismatch) != 0) 1292if ((sslPolicyErrors & SslPolicyErrors.RemoteCertificateChainErrors) != 0)
System.ServiceModel.NetFramingBase (1)
System\ServiceModel\Channels\SslStreamSecurityUpgradeProvider.cs (1)
403SslPolicyErrors sslPolicyErrors)
Templates.Blazor.Tests (1)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
Templates.Blazor.WebAssembly.Auth.Tests (1)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
Templates.Blazor.WebAssembly.Tests (1)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
Templates.Mvc.Tests (1)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
Templates.Tests (1)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,