Searched refs:challenge (Results 1 – 15 of 15) sorted by relevance
/openssl-master/crypto/ec/curve448/ |
A D | eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign() 243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign() 244 sizeof(challenge)); in ossl_c448_ed448_sign() 245 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign() 331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local 339 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify() 345 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify() 346 sizeof(challenge)); in ossl_c448_ed448_verify() 347 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_verify()
|
/openssl-master/apps/ |
A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 114 challenge = opt_arg(); in spkac_main() 156 if (challenge != NULL) in spkac_main() 157 ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 158 challenge, (int)strlen(challenge)); in spkac_main()
|
A D | openssl-vms.cnf | 196 challengePassword = A challenge password
|
A D | openssl.cnf | 196 challengePassword = A challenge password
|
/openssl-master/doc/man1/ |
A D | openssl-spkac.pod.in | 22 [B<-challenge> I<string>] 32 This command processes Netscape signed public key and challenge 75 =item B<-challenge> I<string> 77 Specifies the challenge string if an SPKAC is being created. 120 Create an SPKAC using the challenge string "hello": 122 openssl spkac -key key.pem -challenge hello -out spkac.cnf 142 The challenge string permits a primitive form of proof of possession 143 of private key. By checking the SPKAC signature and a random challenge
|
A D | openssl-req.pod.in | 647 challengePassword = A challenge password 678 challengePassword = A challenge password
|
A D | openssl-ca.pod.in | 126 A file containing a single Netscape signed public key and challenge 623 signed public key and challenge. This will usually come from
|
/openssl-master/crypto/asn1/ |
A D | x_spki.c | 17 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
A D | t_spki.c | 39 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
|
/openssl-master/doc/man3/ |
A D | OSSL_CRMF_MSG_set0_validity.pod | 87 challenge-response exchange (challengeResp) not yet supported.
|
A D | SSL_CTX_set_client_hello_cb.pod | 44 'challenge' field is exposed via SSL_client_hello_get0_random(), padded to
|
/openssl-master/crypto/cmp/ |
A D | cmp_asn.c | 35 ASN1_SIMPLE(OSSL_CMP_CHALLENGE, challenge, ASN1_OCTET_STRING)
|
A D | cmp_local.h | 187 ASN1_OCTET_STRING *challenge; member
|
/openssl-master/include/openssl/ |
A D | x509.h.in | 227 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member 231 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
|
/openssl-master/ssl/statem/ |
A D | statem_srvr.c | 1460 PACKET challenge; in tls_process_client_hello() local 1477 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) in tls_process_client_hello() 1493 if (!PACKET_copy_bytes(&challenge, in tls_process_client_hello()
|
Completed in 26 milliseconds