/openssl-master/test/recipes/ |
A D | 04-test_pem_reading.t | 88 …my @match = grep /The Great State of Long-Winded Certificate Field Names Whereby to Increase the O… 89 is((scalar @match > 0 ? 1 : 0), $cert_expected{$input}); 100 my @match = grep /68:42:02:16:63:54:16:eb:06:5c:ab:06:72:3b:78:/, @data; 101 is((scalar @match > 0 ? 1 : 0), $dsa_expected{$input}); 107 my @match = grep /00:a0:3a:21:14:5d:cd:b6:d5:a0:3e:49:23:c1:3a:/, @data; 108 ok(scalar @match > 0 ? 1 : 0); 112 @match = grep /:error:/, <DATA>; 114 ok(scalar @match > 0 ? 0 : 1); 115 @match = grep /70:40:4c:20:6a:16:ba:38:b5:c9:b1:4c:b6:b8:db:/, @data; 116 ok(scalar @match > 0 ? 1 : 0);
|
A D | 80-test_pkcs12.t | 127 my @match = grep /:error:/, <DATA>; 129 ok(scalar @match > 0 ? 0 : 1, "test_export_pkcs12_outerr_empty");
|
/openssl-master/test/ |
A D | v3nametest.c | 272 if (match < 0) in check_message() 293 int match, ret; in run_cert() local 297 match = -1; in run_cert() 303 match = 1; in run_cert() 305 match = 0; in run_cert() 307 match = 1; in run_cert() 311 match = -1; in run_cert() 318 match = 1; in run_cert() 322 match = 1; in run_cert() 327 match = -1; in run_cert() [all …]
|
A D | test.cnf | 31 countryName = match 32 stateOrProvinceName = match 33 organizationName = match
|
/openssl-master/test/recipes/90-test_includes_data/conf-includes/ |
A D | includes2.cnf | 3 countryName = match 4 stateOrProvinceName = match 5 organizationName = match
|
/openssl-master/doc/man3/ |
A D | X509_check_host.pod | 30 and they match only in the left-most label; but they may match 32 by default, the host B<name> "www.example.com" would match a 113 to match more than one label in B<name>; this flag only applies 117 values which start with ".", that would otherwise match any sub-domain 118 in the peer certificate, to only match direct child sub-domains. 120 would match a peer certificate with a DNS name of "www.example.com", 121 but would not match a peer certificate with a DNS name of 126 The functions return 1 for a successful match, 0 for a failed match
|
A D | DH_new_by_nid.pod | 26 DH_get_nid() determines if the parameters contained in B<dh> match 28 parameters or B<NID_undef> if there is no match. 36 and optionally q, otherwise it returns B<NID_undef> if there is no match.
|
A D | X509_verify.pod | 29 For success the issuer and subject names must match, the components of the 30 authority key identifier (if present) must match the subject key identifier etc. 47 if all respective fields match and B<verify_signature> is 0.
|
A D | EVP_PKEY_copy_parameters.pod | 35 in B<from> and B<to> are both present and match this function has no effect. 69 inputs match, 0 if they don't match, -1 if the key types are different and
|
A D | OSSL_STORE_SEARCH.pod | 99 This criterion supports a search by exact match of subject name. 106 This criterion supports a search by exact match of both issuer name and serial 116 This criterion supports a search by exact match of key fingerprint. 129 This criterion supports a search by match of an alias of some kind.
|
A D | SSL_set1_host.pod | 33 that can match the peer's certificate. Any previous names set via 77 The calls below will arrange to match either the MX hostname or the 79 are supported, but must match the entire label. The actual name
|
A D | ASN1_TYPE_get.pod | 71 types could be absent OPTIONAL fields and so should match, however, passing 73 unparsable type which returns NULL) for types which do B<not> match. So
|
A D | SSL_CTX_set_alpn_select_cb.pod | 76 B<client>, so it should be copied immediately. If no match is found, the first 147 A match was found and is returned in B<out>, B<outlen>. 151 No match was found. The first item in B<client>, B<client_len> is returned in
|
A D | X509_check_private_key.pod | 28 the keys match each other, and 0 if not.
|
A D | SSL_CTX_dane_enable.pod | 123 The return value indicates the match depth or failure to match just as with 171 not match the digest algorithm, or a C<Full(0)> (binary ASN.1 DER form) 188 The calls below will perform DANE authentication and arrange to match either 190 Wildcards are supported, but must match the entire label.
|
/openssl-master/test/ssl-tests/ |
A D | 09-alpn.cnf | 6 test-1 = 1-alpn-server-finds-match 54 [1-alpn-server-finds-match] 55 ssl_conf = 1-alpn-server-finds-match-ssl 57 [1-alpn-server-finds-match-ssl] 58 server = 1-alpn-server-finds-match-server 59 client = 1-alpn-server-finds-match-client 61 [1-alpn-server-finds-match-server] 66 [1-alpn-server-finds-match-client] 73 server = 1-alpn-server-finds-match-server-extra 76 [1-alpn-server-finds-match-server-extra] [all …]
|
A D | 08-npn.cnf | 6 test-1 = 1-npn-client-finds-match 59 [1-npn-client-finds-match] 60 ssl_conf = 1-npn-client-finds-match-ssl 62 [1-npn-client-finds-match-ssl] 63 server = 1-npn-client-finds-match-server 64 client = 1-npn-client-finds-match-client 66 [1-npn-client-finds-match-server] 71 [1-npn-client-finds-match-client] 79 server = 1-npn-client-finds-match-server-extra 82 [1-npn-client-finds-match-server-extra] [all …]
|
/openssl-master/crypto/pkcs12/ |
A D | p12_kiss.c | 95 int match; in PKCS12_parse() local 98 match = X509_check_private_key(x, *pkey); in PKCS12_parse() 100 if (match) { in PKCS12_parse()
|
/openssl-master/crypto/x509/ |
A D | v3_ncons.c | 477 int i, r, match = 0; in nc_match() local 499 if (match == 2) in nc_match() 501 if (match == 0) in nc_match() 502 match = 1; in nc_match() 505 match = 2; in nc_match() 510 if (match == 1) in nc_match()
|
/openssl-master/crypto/evp/ |
A D | keymgmt_meth.c | 145 if (keymgmt->match == NULL) in keymgmt_from_algorithm() 146 keymgmt->match = OSSL_FUNC_keymgmt_match(fns); in keymgmt_from_algorithm() 451 if (keymgmt->match == NULL) in evp_keymgmt_match() 453 return keymgmt->match(keydata1, keydata2, selection); in evp_keymgmt_match()
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpciph_aes_cts.txt | 160 # 17 bytes Input (For partial blocks the output should match CS3) 169 # 31 bytes input (For partial blocks the output should match CS3) 178 # 32 bytes input (Aligned blocks should match normal CBC mode)
|
/openssl-master/doc/man1/ |
A D | openssl-format-options.pod | 94 The I<object-type> must match the type of object that is expected. 95 For example a C<BEGIN X509 CERTIFICATE> will not match if the command
|
/openssl-master/external/perl/Text-Template-1.56/lib/Text/ |
A D | Template.pm | 576 my $match = qr/^.\Q$name\E$/; 577 @varlist = grep { $_ !~ $match } @varlist;
|
/openssl-master/apps/ |
A D | openssl-vms.cnf | 59 # The fips section name should match the section name inside the 124 countryName = match 125 stateOrProvinceName = match 126 organizationName = match
|
A D | openssl.cnf | 59 # The fips section name should match the section name inside the 124 countryName = match 125 stateOrProvinceName = match 126 organizationName = match
|