Home
last modified time | relevance | path

Searched refs:matched (Results 1 – 18 of 18) sorted by relevance

/openssl/doc/man3/
H A DSSL_set1_host.pod47 from the peer certificate that matched one of the reference
49 matched in the peer certificate may be a wildcard name. When one
52 rather than a fixed name, the matched peer name may be a sub-domain
71 matched. Otherwise, it returns the matched peername. To determine
80 matched in the certificate (which might be a wildcard) is retrieved,
96 /* Name checks were in scope and matched the peername */
H A DSSL_CTX_dane_enable.pod95 the matched DANE trust-anchor after successful connection completion.
97 0 if an EE TLSA record directly matched the leaf certificate, or a positive
98 number indicating the depth at which a TA record matched an issuer certificate.
103 If the B<mcert> argument is not B<NULL> and a TLSA record matched a chain
111 If no TLSA records directly matched any elements of the certificate chain, but
122 matched the peer certificate chain.
176 nonnegative value indicates the chain depth at which the TLSA record matched a
191 The actual name matched in the certificate (which might be a wildcard) is
313 mdpth ? "matched the TA" : "matched the EE", mdpth);
315 printf(bio, "matched the peer raw public key\n");
[all …]
H A DPKCS7_type_is_other.pod27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
H A DUI_STRING.pod89 if the B<result> matched any of them, or the first of the
90 B<cancel_chars> if the B<result> matched any of them, otherwise it's
H A DX509_check_host.pod40 with a dot (e.g. ".example.com"), it will be matched by a certificate
44 When the certificate is matched, and B<peername> is not NULL, a
H A DSSL_get0_peer_rpk.pod49 to verify. They can, however, be matched verbatim or by their digest value, this
H A DSSL_set1_server_cert_type.pod162 /* The server's raw public key matched the TLSA record */
H A DSSL_alert_type_string.pod147 be located or couldn't be matched with a known, trusted CA. This
H A DOSSL_HTTP_REQ_CTX.pod110 this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
H A DX509_STORE_CTX_get_error.pod398 DANE TLSA authentication is enabled, but no TLSA records matched the
H A DOSSL_HTTP_transfer.pod188 this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
H A DX509_VERIFY_PARAM_set_flags.pod183 CommonName from the peer certificate that matched one of the reference
/openssl/crypto/x509/
H A Dx509_vfy.c2827 int matched = 0; in dane_match_cert() local
2952 return matched; in dane_match_cert()
2959 int matched = 0; in check_dane_issuer() local
2973 if (matched > 0) { in check_dane_issuer()
3035 int matched = 0; in dane_match_rpk() local
3071 return matched; in dane_match_rpk()
3097 int matched; in dane_verify_rpk() local
3110 if (matched < 0) { in dane_verify_rpk()
3115 if (matched > 0) in dane_verify_rpk()
3128 int matched; in dane_verify() local
[all …]
H A Dpcy_tree.c261 int i, matched = 0; in tree_link_matching_nodes() local
270 matched = 1; in tree_link_matching_nodes()
273 if (!matched && last->anyPolicy) { in tree_link_matching_nodes()
/openssl/test/
H A DREADME.ssltest.md71 matched against the _last_ received alert (i.e., a fatal alert or a
73 alert will not be correctly matched, if followed by a `close_notify` or
/openssl/doc/man1/
H A Dopenssl-s_client.pod.in373 anchor public key that signed (rather than matched) the top-most
375 verified". Otherwise, either the TLSA record "matched TA certificate"
376 at a positive depth or else "matched EE certificate" at depth 0.
397 DANE TLSA 2 1 1 ...ee12d2cc90180517616e8a18 matched TA certificate at depth 1
/openssl/Configurations/
H A Ddescrip.mms.tmpl1453 @ ! string: %SEARCH-I-NOMATCHES, no strings matched
/openssl/
H A DCHANGES.md11864 "RC4-MD5" that intentionally matched multiple ciphersuites --
19065 It was supposed to omit the parameters when they matched the signing key:

Completed in 88 milliseconds