Searched refs:challenge (Results 1 – 18 of 18) sorted by relevance
/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign() 239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign() 240 sizeof(challenge)); in ossl_c448_ed448_sign() 241 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign() 338 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local 346 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify() 352 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify() 353 sizeof(challenge)); in ossl_c448_ed448_verify() 354 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_verify()
|
/openssl/apps/ |
H A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 114 challenge = opt_arg(); in spkac_main() 155 if (challenge != NULL in spkac_main() 156 && !ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 157 challenge, (int)strlen(challenge))) in spkac_main()
|
H A D | openssl-vms.cnf | 196 challengePassword = A challenge password
|
H A D | openssl.cnf | 196 challengePassword = A challenge password
|
/openssl/doc/man1/ |
H A D | openssl-spkac.pod.in | 22 [B<-challenge> I<string>] 32 This command processes Netscape signed public key and challenge 75 =item B<-challenge> I<string> 77 Specifies the challenge string if an SPKAC is being created. 120 Create an SPKAC using the challenge string "hello": 122 openssl spkac -key key.pem -challenge hello -out spkac.cnf 142 The challenge string permits a primitive form of proof of possession 143 of private key. By checking the SPKAC signature and a random challenge
|
H A D | openssl-req.pod.in | 728 challengePassword = A challenge password 759 challengePassword = A challenge password
|
H A D | openssl-ca.pod.in | 139 A file containing a single Netscape signed public key and challenge 645 signed public key and challenge. This will usually come from
|
/openssl/ssl/quic/ |
H A D | qlog_event_helpers.c | 367 uint64_t challenge; in log_frame_actual() local 369 if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge)) in log_frame_actual() 377 uint64_t challenge; in log_frame_actual() local 379 if (!ossl_quic_wire_decode_frame_path_response(pkt, &challenge)) in log_frame_actual()
|
/openssl/crypto/asn1/ |
H A D | x_spki.c | 17 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
H A D | t_spki.c | 39 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
|
/openssl/test/ |
H A D | quic_wire_test.c | 900 uint64_t challenge = 0; in encode_case_18_dec() local 902 if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge), fail < 0)) in encode_case_18_dec() 908 if (!TEST_uint64_t_eq(challenge, encode_case_18_data)) in encode_case_18_dec() 934 uint64_t challenge = 0; in encode_case_19_dec() local 936 if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_response(pkt, &challenge), fail < 0)) in encode_case_19_dec() 942 if (!TEST_uint64_t_eq(challenge, encode_case_19_data)) in encode_case_19_dec()
|
/openssl/doc/man3/ |
H A D | OSSL_CRMF_MSG_set0_validity.pod | 89 challenge-response exchange (challengeResp) not yet supported.
|
H A D | SSL_CTX_set_client_hello_cb.pod | 46 'challenge' field is exposed via SSL_client_hello_get0_random(), padded to
|
/openssl/crypto/cmp/ |
H A D | cmp_local.h | 193 ASN1_OCTET_STRING *challenge; member
|
H A D | cmp_asn.c | 35 ASN1_SIMPLE(OSSL_CMP_CHALLENGE, challenge, ASN1_OCTET_STRING)
|
/openssl/doc/designs/quic-design/ |
H A D | rx-depacketizer.md | 163 [^7]: I imagine that path challenge/response concerns a Connection manager
|
/openssl/include/openssl/ |
H A D | x509.h.in | 238 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member 242 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
|
/openssl/ssl/statem/ |
H A D | statem_srvr.c | 1556 PACKET challenge; in tls_process_client_hello() local 1573 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) in tls_process_client_hello() 1589 if (!PACKET_copy_bytes(&challenge, in tls_process_client_hello()
|
Completed in 69 milliseconds