Home
last modified time | relevance | path

Searched refs:matched (Results 1 – 14 of 14) sorted by relevance

/openssl-master/doc/man3/
A DSSL_set1_host.pod47 from the peer certificate that matched one of the reference
49 matched in the peer certificate may be a wildcard name. When one
52 rather than a fixed name, the matched peer name may be a sub-domain
71 matched. Otherwise, it returns the matched peername. To determine
80 matched in the certificate (which might be a wildcard) is retrieved,
96 /* Name checks were in scope and matched the peername */
A DSSL_CTX_dane_enable.pod95 the matched DANE trust-anchor after successful connection completion.
97 0 if an EE TLSA record directly matched the leaf certificate, or a positive
98 number indicating the depth at which a TA record matched an issuer certificate.
103 If the B<mcert> argument is not B<NULL> and a TLSA record matched a chain
111 If no TLSA records directly matched any elements of the certificate chain, but
122 matched the peer certificate chain.
176 nonnegative value indicates the chain depth at which the TLSA record matched a
191 The actual name matched in the certificate (which might be a wildcard) is
311 depth ? "matched TA certificate" : "matched EE certificate",
315 /* Name checks were in scope and matched the peername */
[all …]
A DPKCS7_type_is_other.pod27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
A DUI_STRING.pod89 if the B<result> matched any of them, or the first of the
90 B<cancel_chars> if the B<result> matched any of them, otherwise it's
A DX509_check_host.pod40 with a dot (e.g. ".example.com"), it will be matched by a certificate
44 When the certificate is matched, and B<peername> is not NULL, a
A DSSL_alert_type_string.pod147 be located or couldn't be matched with a known, trusted CA. This
A DX509_STORE_CTX_get_error.pod390 DANE TLSA authentication is enabled, but no TLSA records matched the
A DX509_VERIFY_PARAM_set_flags.pod181 CommonName from the peer certificate that matched one of the reference
/openssl-master/crypto/x509/
A Dx509_vfy.c2698 int matched = 0; in dane_match() local
2795 matched = -1; in dane_match()
2809 matched = 1; in dane_match()
2823 return matched; in dane_match()
2830 int matched = 0; in check_dane_issuer() local
2843 return matched; in check_dane_issuer()
2844 if (matched > 0) { in check_dane_issuer()
2912 int matched; in dane_verify() local
2929 matched = dane_match(ctx, ctx->cert, 0); in dane_verify()
2935 if (matched > 0) { in dane_verify()
[all …]
A Dpcy_tree.c245 int i, matched = 0; in tree_link_matching_nodes() local
254 matched = 1; in tree_link_matching_nodes()
257 if (!matched && last->anyPolicy) { in tree_link_matching_nodes()
/openssl-master/test/
A DREADME.ssltest.md71 matched against the _last_ received alert (i.e., a fatal alert or a
73 alert will not be correctly matched, if followed by a `close_notify` or
/openssl-master/doc/man1/
A Dopenssl-s_client.pod.in354 anchor public key that signed (rather than matched) the top-most
356 verified". Otherwise, either the TLSA record "matched TA certificate"
357 at a positive depth or else "matched EE certificate" at depth 0.
378 DANE TLSA 2 1 1 ...ee12d2cc90180517616e8a18 matched TA certificate at depth 1
/openssl-master/Configurations/
A Ddescrip.mms.tmpl1309 @ ! string: %SEARCH-I-NOMATCHES, no strings matched
/openssl-master/
A DCHANGES.md9989 "RC4-MD5" that intentionally matched multiple ciphersuites --
17190 It was supposed to omit the parameters when they matched the signing key:

Completed in 41 milliseconds