Home
last modified time | relevance | path

Searched refs:matched (Results 1 – 18 of 18) sorted by relevance

/openssl/doc/man3/
H A DSSL_set1_host.pod47 from the peer certificate that matched one of the reference
49 matched in the peer certificate may be a wildcard name. When one
52 rather than a fixed name, the matched peer name may be a sub-domain
71 matched. Otherwise, it returns the matched peername. To determine
80 matched in the certificate (which might be a wildcard) is retrieved,
96 /* Name checks were in scope and matched the peername */
H A DSSL_CTX_dane_enable.pod95 the matched DANE trust-anchor after successful connection completion.
97 0 if an EE TLSA record directly matched the leaf certificate, or a positive
98 number indicating the depth at which a TA record matched an issuer certificate.
103 If the B<mcert> argument is not B<NULL> and a TLSA record matched a chain
111 If no TLSA records directly matched any elements of the certificate chain, but
122 matched the peer certificate chain.
176 nonnegative value indicates the chain depth at which the TLSA record matched a
191 The actual name matched in the certificate (which might be a wildcard) is
313 mdpth ? "matched the TA" : "matched the EE", mdpth);
315 printf(bio, "matched the peer raw public key\n");
[all …]
H A DPKCS7_type_is_other.pod27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
H A DUI_STRING.pod89 if the B<result> matched any of them, or the first of the
90 B<cancel_chars> if the B<result> matched any of them, otherwise it's
H A DX509_check_host.pod40 with a dot (e.g. ".example.com"), it will be matched by a certificate
44 When the certificate is matched, and B<peername> is not NULL, a
H A DSSL_get0_peer_rpk.pod49 to verify. They can, however, be matched verbatim or by their digest value, this
H A DSSL_set1_server_cert_type.pod162 /* The server's raw public key matched the TLSA record */
H A DSSL_alert_type_string.pod147 be located or couldn't be matched with a known, trusted CA. This
H A DOSSL_HTTP_REQ_CTX.pod110 this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
H A DX509_STORE_CTX_get_error.pod398 DANE TLSA authentication is enabled, but no TLSA records matched the
H A DOSSL_HTTP_transfer.pod188 this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
H A DX509_VERIFY_PARAM_set_flags.pod183 CommonName from the peer certificate that matched one of the reference
/openssl/crypto/x509/
H A Dx509_vfy.c2860 int matched = 0; in dane_match_cert() local
2985 return matched; in dane_match_cert()
2992 int matched = 0; in check_dane_issuer() local
3006 if (matched > 0) { in check_dane_issuer()
3068 int matched = 0; in dane_match_rpk() local
3104 return matched; in dane_match_rpk()
3130 int matched; in dane_verify_rpk() local
3143 if (matched < 0) { in dane_verify_rpk()
3148 if (matched > 0) in dane_verify_rpk()
3161 int matched; in dane_verify() local
[all …]
H A Dpcy_tree.c261 int i, matched = 0; in tree_link_matching_nodes() local
270 matched = 1; in tree_link_matching_nodes()
273 if (!matched && last->anyPolicy) { in tree_link_matching_nodes()
/openssl/test/
H A DREADME.ssltest.md71 matched against the _last_ received alert (i.e., a fatal alert or a
73 alert will not be correctly matched, if followed by a `close_notify` or
/openssl/doc/man1/
H A Dopenssl-s_client.pod.in375 anchor public key that signed (rather than matched) the top-most
377 verified". Otherwise, either the TLSA record "matched TA certificate"
378 at a positive depth or else "matched EE certificate" at depth 0.
399 DANE TLSA 2 1 1 ...ee12d2cc90180517616e8a18 matched TA certificate at depth 1
/openssl/Configurations/
H A Ddescrip.mms.tmpl1453 @ ! string: %SEARCH-I-NOMATCHES, no strings matched
/openssl/
H A DCHANGES.md11934 "RC4-MD5" that intentionally matched multiple ciphersuites --
19135 It was supposed to omit the parameters when they matched the signing key:

Completed in 70 milliseconds