Searched refs:matched (Results 1 – 18 of 18) sorted by relevance
/openssl/doc/man3/ |
H A D | SSL_set1_host.pod | 47 from the peer certificate that matched one of the reference 49 matched in the peer certificate may be a wildcard name. When one 52 rather than a fixed name, the matched peer name may be a sub-domain 71 matched. Otherwise, it returns the matched peername. To determine 80 matched in the certificate (which might be a wildcard) is retrieved, 96 /* Name checks were in scope and matched the peername */
|
H A D | SSL_CTX_dane_enable.pod | 95 the matched DANE trust-anchor after successful connection completion. 97 0 if an EE TLSA record directly matched the leaf certificate, or a positive 98 number indicating the depth at which a TA record matched an issuer certificate. 103 If the B<mcert> argument is not B<NULL> and a TLSA record matched a chain 111 If no TLSA records directly matched any elements of the certificate chain, but 122 matched the peer certificate chain. 176 nonnegative value indicates the chain depth at which the TLSA record matched a 191 The actual name matched in the certificate (which might be a wildcard) is 313 mdpth ? "matched the TA" : "matched the EE", mdpth); 315 printf(bio, "matched the peer raw public key\n"); [all …]
|
H A D | PKCS7_type_is_other.pod | 27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
|
H A D | UI_STRING.pod | 89 if the B<result> matched any of them, or the first of the 90 B<cancel_chars> if the B<result> matched any of them, otherwise it's
|
H A D | X509_check_host.pod | 40 with a dot (e.g. ".example.com"), it will be matched by a certificate 44 When the certificate is matched, and B<peername> is not NULL, a
|
H A D | SSL_get0_peer_rpk.pod | 49 to verify. They can, however, be matched verbatim or by their digest value, this
|
H A D | SSL_set1_server_cert_type.pod | 162 /* The server's raw public key matched the TLSA record */
|
H A D | SSL_alert_type_string.pod | 147 be located or couldn't be matched with a known, trusted CA. This
|
H A D | OSSL_HTTP_REQ_CTX.pod | 110 this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
|
H A D | X509_STORE_CTX_get_error.pod | 398 DANE TLSA authentication is enabled, but no TLSA records matched the
|
H A D | OSSL_HTTP_transfer.pod | 188 this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 183 CommonName from the peer certificate that matched one of the reference
|
/openssl/crypto/x509/ |
H A D | x509_vfy.c | 2860 int matched = 0; in dane_match_cert() local 2985 return matched; in dane_match_cert() 2992 int matched = 0; in check_dane_issuer() local 3006 if (matched > 0) { in check_dane_issuer() 3068 int matched = 0; in dane_match_rpk() local 3104 return matched; in dane_match_rpk() 3130 int matched; in dane_verify_rpk() local 3143 if (matched < 0) { in dane_verify_rpk() 3148 if (matched > 0) in dane_verify_rpk() 3161 int matched; in dane_verify() local [all …]
|
H A D | pcy_tree.c | 261 int i, matched = 0; in tree_link_matching_nodes() local 270 matched = 1; in tree_link_matching_nodes() 273 if (!matched && last->anyPolicy) { in tree_link_matching_nodes()
|
/openssl/test/ |
H A D | README.ssltest.md | 71 matched against the _last_ received alert (i.e., a fatal alert or a 73 alert will not be correctly matched, if followed by a `close_notify` or
|
/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 375 anchor public key that signed (rather than matched) the top-most 377 verified". Otherwise, either the TLSA record "matched TA certificate" 378 at a positive depth or else "matched EE certificate" at depth 0. 399 DANE TLSA 2 1 1 ...ee12d2cc90180517616e8a18 matched TA certificate at depth 1
|
/openssl/Configurations/ |
H A D | descrip.mms.tmpl | 1453 @ ! string: %SEARCH-I-NOMATCHES, no strings matched
|
/openssl/ |
H A D | CHANGES.md | 11928 "RC4-MD5" that intentionally matched multiple ciphersuites -- 19129 It was supposed to omit the parameters when they matched the signing key:
|
Completed in 79 milliseconds