Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 18 of 18) sorted by relevance

/openssl/crypto/ec/curve448/
H A Deddsa.c228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign()
239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign()
240 sizeof(challenge)); in ossl_c448_ed448_sign()
241 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign()
338 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
346 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify()
352 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify()
353 sizeof(challenge)); in ossl_c448_ed448_verify()
354 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_verify()
/openssl/apps/
H A Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
114 challenge = opt_arg(); in spkac_main()
155 if (challenge != NULL in spkac_main()
156 && !ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
157 challenge, (int)strlen(challenge))) in spkac_main()
H A Dopenssl-vms.cnf196 challengePassword = A challenge password
H A Dopenssl.cnf196 challengePassword = A challenge password
/openssl/doc/man1/
H A Dopenssl-spkac.pod.in22 [B<-challenge> I<string>]
32 This command processes Netscape signed public key and challenge
75 =item B<-challenge> I<string>
77 Specifies the challenge string if an SPKAC is being created.
120 Create an SPKAC using the challenge string "hello":
122 openssl spkac -key key.pem -challenge hello -out spkac.cnf
142 The challenge string permits a primitive form of proof of possession
143 of private key. By checking the SPKAC signature and a random challenge
H A Dopenssl-req.pod.in716 challengePassword = A challenge password
747 challengePassword = A challenge password
H A Dopenssl-ca.pod.in139 A file containing a single Netscape signed public key and challenge
645 signed public key and challenge. This will usually come from
/openssl/ssl/quic/
H A Dqlog_event_helpers.c367 uint64_t challenge; in log_frame_actual() local
369 if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge)) in log_frame_actual()
377 uint64_t challenge; in log_frame_actual() local
379 if (!ossl_quic_wire_decode_frame_path_response(pkt, &challenge)) in log_frame_actual()
/openssl/crypto/asn1/
H A Dx_spki.c17 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
H A Dt_spki.c39 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
/openssl/test/
H A Dquic_wire_test.c900 uint64_t challenge = 0; in encode_case_18_dec() local
902 if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge), fail < 0)) in encode_case_18_dec()
908 if (!TEST_uint64_t_eq(challenge, encode_case_18_data)) in encode_case_18_dec()
934 uint64_t challenge = 0; in encode_case_19_dec() local
936 if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_response(pkt, &challenge), fail < 0)) in encode_case_19_dec()
942 if (!TEST_uint64_t_eq(challenge, encode_case_19_data)) in encode_case_19_dec()
/openssl/doc/man3/
H A DOSSL_CRMF_MSG_set0_validity.pod89 challenge-response exchange (challengeResp) not yet supported.
H A DSSL_CTX_set_client_hello_cb.pod46 'challenge' field is exposed via SSL_client_hello_get0_random(), padded to
/openssl/crypto/cmp/
H A Dcmp_local.h193 ASN1_OCTET_STRING *challenge; member
H A Dcmp_asn.c35 ASN1_SIMPLE(OSSL_CMP_CHALLENGE, challenge, ASN1_OCTET_STRING)
/openssl/doc/designs/quic-design/
H A Drx-depacketizer.md163 [^7]: I imagine that path challenge/response concerns a Connection manager
/openssl/include/openssl/
H A Dx509.h.in238 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member
242 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
/openssl/ssl/statem/
H A Dstatem_srvr.c1556 PACKET challenge; in tls_process_client_hello() local
1573 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) in tls_process_client_hello()
1589 if (!PACKET_copy_bytes(&challenge, in tls_process_client_hello()

Completed in 86 milliseconds