Searched refs:validate (Results 1 – 25 of 27) sorted by relevance
12
/openssl-master/crypto/evp/ |
A D | keymgmt_meth.c | 141 if (keymgmt->validate == NULL) in keymgmt_from_algorithm() 142 keymgmt->validate = OSSL_FUNC_keymgmt_validate(fns); in keymgmt_from_algorithm() 441 if (keymgmt->validate == NULL) in evp_keymgmt_validate() 443 return keymgmt->validate(keydata, selection, checktype); in evp_keymgmt_validate()
|
A D | evp_local.h | 124 OSSL_FUNC_keymgmt_validate_fn *validate; member
|
/openssl-master/doc/man7/ |
A D | EVP_PKEY-FFC.pod | 103 =item "validate-pq" (B<OSSL_PKEY_PARAM_FFC_VALIDATE_PQ>) <unsigned integer> 105 =item "validate-g" (B<OSSL_PKEY_PARAM_FFC_VALIDATE_G>) <unsigned integer> 109 I<validate-pq> and I<validate-g> are both set to 1 to check that p,q and g are 113 =item "validate-legacy" (B<OSSL_PKEY_PARAM_FFC_VALIDATE_LEGACY>) <unsigned integer>
|
A D | OSSL_PROVIDER-FIPS.pod | 190 Uses HMAC SHA256 on the module file to validate that the module has not been 196 Uses HMAC SHA256 on a fixed string to validate that the installation process
|
A D | EVP_PKEY-DH.pod | 201 To validate B<FIPS 186-4> B<DHX> domain parameters decoded from B<PEM> or
|
A D | provider-keymgmt.pod | 316 RSA keys the function should just return 1 as there is nothing to validate for
|
/openssl-master/doc/man3/ |
A D | OSSL_CMP_validate_msg.pod | 42 used also to validate the issued certificate returned in the IP message. This is 49 OSSL_CMP_validate_cert_path() attempts to validate the given certificate and its
|
A D | DTLSv1_listen.pod | 35 If DTLS is used over UDP (or any datagram based protocol that does not validate 39 stream-based transport protocols (e.g. QUIC) may not validate the source
|
A D | EVP_PKEY_derive.pod | 32 be a public key. The I<validate_peer> will validate the public key if this value
|
A D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys
|
A D | X509_verify_cert.pod | 35 The X509_verify_cert() function attempts to discover and validate a
|
A D | SSL_CTX_use_psk_identity_hint.pod | 71 is to validate the received PSK identity and to fetch the pre-shared key used
|
A D | SSL_alert_type_string.pod | 166 or validate a finished message.
|
A D | EVP_PKEY_meth_new.pod | 375 The check(), public_check() and param_check() methods are used to validate a
|
A D | OSSL_CMP_CTX_new.pod | 308 to validate the certificate chain of an IP message. 648 the I<ctx>. This will be used to validate the recipNonce in incoming messages.
|
A D | X509_STORE_CTX_get_error.pod | 70 X509_STORE_CTX_get1_chain() returns a complete validate chain if a previous
|
A D | X509_VERIFY_PARAM_set_flags.pod | 123 For a certificate chain to validate, the public keys of all the certificates
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_mock_srv_new.pod | 47 It should to useful to validate B<certOut>.
|
A D | evp_keymgmt_newdata.pod | 54 evp_keymgmt_validate() calls the method's validate() function.
|
/openssl-master/ssl/statem/ |
A D | README.md | 13 so that it is easier to validate
|
/openssl-master/util/perl/OpenSSL/ |
A D | Ordinals.pm | 232 $self->validate(); 682 sub validate { subroutine
|
/openssl-master/doc/man1/ |
A D | openssl-ecparam.pod.in | 147 To validate given EC parameters:
|
A D | openssl-verification-options.pod | 368 chain to validate, the public keys of all the certificates must meet the
|
/openssl-master/test/ |
A D | evp_test.c | 1826 int validate = 0; in pderive_test_parse() local 1829 validate = 1; in pderive_test_parse() 1831 if (validate || strcmp(keyword, "PeerKey") == 0) { in pderive_test_parse() 1835 if (EVP_PKEY_derive_set_peer_ex(kdata->ctx, peer, validate) <= 0) { in pderive_test_parse()
|
/openssl-master/include/openssl/ |
A D | ct.h.in | 136 * whose timestamp is in the future", so an SCT will not validate in this case.
|
Completed in 52 milliseconds
12