/openssl/test/recipes/ |
H A D | 04-test_pem_reading.t | 88 …my @match = grep /The Great State of Long-Winded Certificate Field Names Whereby to Increase the O… 89 is((scalar @match > 0 ? 1 : 0), $cert_expected{$input}); 100 my @match = grep /68:42:02:16:63:54:16:eb:06:5c:ab:06:72:3b:78:/, @data; 101 is((scalar @match > 0 ? 1 : 0), $dsa_expected{$input}); 107 my @match = grep /00:a0:3a:21:14:5d:cd:b6:d5:a0:3e:49:23:c1:3a:/, @data; 108 ok(scalar @match > 0 ? 1 : 0); 112 @match = grep /:error:/, <DATA>; 114 ok(scalar @match > 0 ? 0 : 1); 115 @match = grep /70:40:4c:20:6a:16:ba:38:b5:c9:b1:4c:b6:b8:db:/, @data; 116 ok(scalar @match > 0 ? 1 : 0);
|
H A D | 80-test_pkcs12.t | 131 my @match = grep /:error:/, <DATA>; 133 ok(scalar @match > 0 ? 0 : 1, "test_export_pkcs12_outerr_empty"); 170 my @match = grep /:error:/, <DATA>; 172 ok(scalar @match > 0 ? 0 : 1, "test_export_pkcs12_outerr6_empty"); 194 my @match = grep /:error:/, <DATA>; 196 ok(scalar @match > 0 ? 0 : 1, "test_export_pkcs12_${pbmac1_id}_err.empty"); 202 my @match = grep /$lookup/, <DATA>; 204 ok(scalar @match > 0 ? 1 : 0, "test_export_pkcs12_${pbmac1_id}_info");
|
H A D | 90-test_store_cases.t | 33 @match = grep /try_pkcs12:.*?:maybe wrong password$/, <DATA>; 35 ok(scalar @match > 0 ? 0 : 1,
|
/openssl/test/ |
H A D | v3nametest.c | 268 if (match < 0) in check_message() 289 int match, ret; in run_cert() local 295 match = -1; in run_cert() 301 match = 1; in run_cert() 303 match = 0; in run_cert() 305 match = 1; in run_cert() 309 match = -1; in run_cert() 316 match = 1; in run_cert() 320 match = 1; in run_cert() 325 match = -1; in run_cert() [all …]
|
H A D | test.cnf | 31 countryName = match 32 stateOrProvinceName = match 33 organizationName = match
|
/openssl/test/recipes/90-test_includes_data/conf-includes/ |
H A D | includes2.cnf | 3 countryName = match 4 stateOrProvinceName = match 5 organizationName = match
|
/openssl/doc/man3/ |
H A D | X509_check_host.pod | 30 and they match only in the left-most label; but they may match 32 by default, the host B<name> "www.example.com" would match a 114 to match more than one label in B<name>; this flag only applies 118 values which start with ".", that would otherwise match any sub-domain 119 in the peer certificate, to only match direct child sub-domains. 121 would match a peer certificate with a DNS name of "www.example.com", 122 but would not match a peer certificate with a DNS name of 127 The functions return 1 for a successful match, 0 for a failed match
|
H A D | DH_new_by_nid.pod | 27 DH_get_nid() determines if the parameters contained in B<dh> match 29 parameters or B<NID_undef> if there is no match. 37 and optionally q, otherwise it returns B<NID_undef> if there is no match.
|
H A D | X509_verify.pod | 32 For success the issuer and subject names must match, the components of the 33 authority key identifier (if present) must match the subject key identifier etc. 51 if all respective fields match and B<verify_signature> is 0.
|
H A D | EVP_PKEY_copy_parameters.pod | 35 in B<from> and B<to> are both present and match this function has no effect. 95 inputs match, 0 if they don't match, -1 if the key types are different and
|
H A D | OSSL_STORE_SEARCH.pod | 100 This criterion supports a search by exact match of subject name. 107 This criterion supports a search by exact match of both issuer name and serial 117 This criterion supports a search by exact match of key fingerprint. 130 This criterion supports a search by match of an alias of some kind.
|
H A D | BIO_find_type.pod | 22 found. If I<type> is B<BIO_TYPE_NONE> it will not find a match. 37 BIO_find_type() returns a matching BIO or NULL for no match.
|
H A D | SSL_set1_host.pod | 33 that can match the peer's certificate. Any previous names set via 77 The calls below will arrange to match either the MX hostname or the 79 are supported, but must match the entire label. The actual name
|
H A D | ASN1_TYPE_get.pod | 71 types could be absent OPTIONAL fields and so should match, however, passing 73 unparsable type which returns NULL) for types which do B<not> match. So
|
/openssl/crypto/encode_decode/ |
H A D | encoder_pkey.c | 107 int match; in collect_encoder() local 111 match = (data->id_names[i] == encoder->base.id); in collect_encoder() 113 match = OSSL_ENCODER_is_a(encoder, in collect_encoder() 115 if (!match in collect_encoder()
|
/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 98 int match; in PKCS12_parse() local 101 match = X509_check_private_key(x, *pkey); in PKCS12_parse() 103 if (match) { in PKCS12_parse()
|
/openssl/test/ssl-tests/ |
H A D | 09-alpn.cnf | 6 test-1 = 1-alpn-server-finds-match 56 [1-alpn-server-finds-match] 57 ssl_conf = 1-alpn-server-finds-match-ssl 59 [1-alpn-server-finds-match-ssl] 60 server = 1-alpn-server-finds-match-server 61 client = 1-alpn-server-finds-match-client 63 [1-alpn-server-finds-match-server] 68 [1-alpn-server-finds-match-client] 75 server = 1-alpn-server-finds-match-server-extra 78 [1-alpn-server-finds-match-server-extra] [all …]
|
H A D | 08-npn.cnf | 6 test-1 = 1-npn-client-finds-match 61 [1-npn-client-finds-match] 62 ssl_conf = 1-npn-client-finds-match-ssl 64 [1-npn-client-finds-match-ssl] 65 server = 1-npn-client-finds-match-server 66 client = 1-npn-client-finds-match-client 68 [1-npn-client-finds-match-server] 73 [1-npn-client-finds-match-client] 81 server = 1-npn-client-finds-match-server-extra 84 [1-npn-client-finds-match-server-extra] [all …]
|
/openssl/crypto/x509/ |
H A D | v3_ncons.c | 504 int i, r, match = 0; in nc_match() local 532 if (match == 2) in nc_match() 534 if (match == 0) in nc_match() 535 match = 1; in nc_match() 538 match = 2; in nc_match() 543 if (match == 1) in nc_match()
|
/openssl/crypto/evp/ |
H A D | keymgmt_meth.c | 178 if (keymgmt->match == NULL) in keymgmt_from_algorithm() 179 keymgmt->match = OSSL_FUNC_keymgmt_match(fns); in keymgmt_from_algorithm() 522 if (keymgmt->match == NULL) in evp_keymgmt_match() 524 return keymgmt->match(keydata1, keydata2, selection); in evp_keymgmt_match()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_cts.txt | 160 # 17 bytes Input (For partial blocks the output should match CS3) 169 # 31 bytes input (For partial blocks the output should match CS3) 178 # 32 bytes input (Aligned blocks should match normal CBC mode)
|
/openssl/external/perl/Text-Template-1.56/lib/Text/ |
H A D | Template.pm | 576 my $match = qr/^.\Q$name\E$/; 577 @varlist = grep { $_ !~ $match } @varlist;
|
/openssl/doc/man1/ |
H A D | openssl-format-options.pod | 94 The I<object-type> must match the type of object that is expected. 95 For example a C<BEGIN X509 CERTIFICATE> will not match if the command
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 59 # The fips section name should match the section name inside the 124 countryName = match 125 stateOrProvinceName = match 126 organizationName = match
|
H A D | openssl.cnf | 59 # The fips section name should match the section name inside the 124 countryName = match 125 stateOrProvinceName = match 126 organizationName = match
|