Searched refs:matched (Results 1 – 14 of 14) sorted by relevance
/openssl-master/doc/man3/ |
A D | SSL_set1_host.pod | 47 from the peer certificate that matched one of the reference 49 matched in the peer certificate may be a wildcard name. When one 52 rather than a fixed name, the matched peer name may be a sub-domain 71 matched. Otherwise, it returns the matched peername. To determine 80 matched in the certificate (which might be a wildcard) is retrieved, 96 /* Name checks were in scope and matched the peername */
|
A D | SSL_CTX_dane_enable.pod | 95 the matched DANE trust-anchor after successful connection completion. 97 0 if an EE TLSA record directly matched the leaf certificate, or a positive 98 number indicating the depth at which a TA record matched an issuer certificate. 103 If the B<mcert> argument is not B<NULL> and a TLSA record matched a chain 111 If no TLSA records directly matched any elements of the certificate chain, but 122 matched the peer certificate chain. 176 nonnegative value indicates the chain depth at which the TLSA record matched a 191 The actual name matched in the certificate (which might be a wildcard) is 311 depth ? "matched TA certificate" : "matched EE certificate", 315 /* Name checks were in scope and matched the peername */ [all …]
|
A D | PKCS7_type_is_other.pod | 27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
|
A D | UI_STRING.pod | 89 if the B<result> matched any of them, or the first of the 90 B<cancel_chars> if the B<result> matched any of them, otherwise it's
|
A D | X509_check_host.pod | 40 with a dot (e.g. ".example.com"), it will be matched by a certificate 44 When the certificate is matched, and B<peername> is not NULL, a
|
A D | SSL_alert_type_string.pod | 147 be located or couldn't be matched with a known, trusted CA. This
|
A D | X509_STORE_CTX_get_error.pod | 390 DANE TLSA authentication is enabled, but no TLSA records matched the
|
A D | X509_VERIFY_PARAM_set_flags.pod | 181 CommonName from the peer certificate that matched one of the reference
|
/openssl-master/crypto/x509/ |
A D | x509_vfy.c | 2698 int matched = 0; in dane_match() local 2795 matched = -1; in dane_match() 2809 matched = 1; in dane_match() 2823 return matched; in dane_match() 2830 int matched = 0; in check_dane_issuer() local 2843 return matched; in check_dane_issuer() 2844 if (matched > 0) { in check_dane_issuer() 2912 int matched; in dane_verify() local 2929 matched = dane_match(ctx, ctx->cert, 0); in dane_verify() 2935 if (matched > 0) { in dane_verify() [all …]
|
A D | pcy_tree.c | 245 int i, matched = 0; in tree_link_matching_nodes() local 254 matched = 1; in tree_link_matching_nodes() 257 if (!matched && last->anyPolicy) { in tree_link_matching_nodes()
|
/openssl-master/test/ |
A D | README.ssltest.md | 71 matched against the _last_ received alert (i.e., a fatal alert or a 73 alert will not be correctly matched, if followed by a `close_notify` or
|
/openssl-master/doc/man1/ |
A D | openssl-s_client.pod.in | 354 anchor public key that signed (rather than matched) the top-most 356 verified". Otherwise, either the TLSA record "matched TA certificate" 357 at a positive depth or else "matched EE certificate" at depth 0. 378 DANE TLSA 2 1 1 ...ee12d2cc90180517616e8a18 matched TA certificate at depth 1
|
/openssl-master/Configurations/ |
A D | descrip.mms.tmpl | 1309 @ ! string: %SEARCH-I-NOMATCHES, no strings matched
|
/openssl-master/ |
A D | CHANGES.md | 9989 "RC4-MD5" that intentionally matched multiple ciphersuites -- 17190 It was supposed to omit the parameters when they matched the signing key:
|
Completed in 41 milliseconds