/openssl/crypto/bn/ |
H A D | bn_prime.c | 27 static int bn_is_prime_int(const BIGNUM *w, int checks, BN_CTX *ctx, 131 int checks = bn_mr_min_checks(bits); in BN_generate_prime_ex2() local 170 i = bn_is_prime_int(ret, checks, ctx, 0, cb); in BN_generate_prime_ex2() 183 for (i = 0; i < checks; i++) { in BN_generate_prime_ex2() 228 int BN_is_prime_ex(const BIGNUM *a, int checks, BN_CTX *ctx_passed, in BN_is_prime_ex() argument 231 return ossl_bn_check_prime(a, checks, ctx_passed, 0, cb); in BN_is_prime_ex() 242 int ossl_bn_check_prime(const BIGNUM *w, int checks, BN_CTX *ctx, in ossl_bn_check_prime() argument 247 if (checks < min_checks) in ossl_bn_check_prime() 248 checks = min_checks; in ossl_bn_check_prime() 250 return bn_is_prime_int(w, checks, ctx, do_trial_division, cb); in ossl_bn_check_prime() [all …]
|
H A D | bn_depr.c | 46 int BN_is_prime(const BIGNUM *a, int checks, in BN_is_prime() argument 52 return ossl_bn_check_prime(a, checks, ctx_passed, 0, &cb); in BN_is_prime() 55 int BN_is_prime_fasttest(const BIGNUM *a, int checks, in BN_is_prime_fasttest() argument 62 return ossl_bn_check_prime(a, checks, ctx_passed, do_trial_division, &cb); in BN_is_prime_fasttest()
|
/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2blob.c | 61 int checks[] = { in key2blob_check_selection() local 72 for (i = 0; i < OSSL_NELEM(checks); i++) { in key2blob_check_selection() 73 int check1 = (selection & checks[i]) != 0; in key2blob_check_selection() 74 int check2 = (selection_mask & checks[i]) != 0; in key2blob_check_selection()
|
H A D | decode_der2key.c | 179 int checks[] = { in der2key_check_selection() local 190 for (i = 0; i < OSSL_NELEM(checks); i++) { in der2key_check_selection() 191 int check1 = (selection & checks[i]) != 0; in der2key_check_selection() 192 int check2 = (desc->selection_mask & checks[i]) != 0; in der2key_check_selection()
|
/openssl/doc/man3/ |
H A D | X509_check_issued.pod | 5 X509_check_issued - checks if certificate is apparently issued by another 17 X509_check_issued() checks if certificate I<subject> was apparently issued 22 serial number, and issuer fields of I<issuer>, as far as present. It also checks 29 X509_check_issued() returns B<X509_V_OK> if all checks are successful
|
H A D | X509_check_purpose.pod | 15 This function checks if certificate I<x> was created with the purpose 34 The checks performed take into account the X.509 extensions 39 For non-CA checks 51 For CA checks the below integers could be returned with the following meanings:
|
H A D | SSL_set1_host.pod | 19 These functions configure server hostname checks in the SSL client. 24 checks are not performed on the peer certificate. When a nonempty 25 B<name> is specified, certificate verification automatically checks 42 L<X509_check_host(3)> when name checks are applicable, by default 59 explicitly calling L<X509_check_host(3)>. Hostname checks may be out 96 /* Name checks were in scope and matched the peername */
|
H A D | SCT_validate.pod | 6 checks Signed Certificate Timestamps (SCTs) are valid 28 SCT_LIST_validate() performs the same checks on an entire stack of SCTs. 29 The result of the validation checks can be obtained by passing the SCT to 67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID.
|
H A D | SSL_CONF_CTX_set1_prefix.pod | 26 If the B<SSL_CONF_FLAG_CMDLINE> flag is set then prefix checks are case 30 If the B<SSL_CONF_FLAG_FILE> flag is set then prefix checks are case
|
H A D | X509_check_host.pod | 26 X509_check_host() checks if the certificate Subject Alternative 50 X509_check_email() checks if the certificate matches the specified 61 X509_check_ip() checks if the certificate matches a specified IPv4 or 139 checks may be out of scope with the DANE-EE(3) certificate usage, 140 and the internal checks will be suppressed as appropriate when
|
H A D | RSA_check_key.pod | 26 It checks that B<p> and B<q> are 31 It also checks that B<d*e = 1 mod (p-1*q-1)>, 33 It performs integrity checks on all
|
H A D | EVP_PKEY_check.pod | 30 implementations may offer a quicker form of validation that omits some checks in 38 implementations may offer a quicker form of validation that omits some checks in 53 default provider may use checks that are not as restrictive for certain key types.
|
H A D | X509_NAME_add_entry_by_txt.pod | 52 apply length checks according to the relevant standards. This is 55 If instead an ASN1 type is used no checks are performed and the 111 not understand multicharacter types, performs no length checks and
|
H A D | X509_verify.pod | 28 I<pkey>. Only the signature is checked: no other checks (such as certificate 31 X509_self_signed() checks whether certificate I<cert> is self-signed.
|
H A D | OCSP_resp_find_status.pod | 109 OCSP_check_validity() checks the validity of its I<thisupd> and I<nextupd> 115 OCSP_basic_verify() checks that the basic response message I<bs> is correctly 122 Next, unless I<flags> contains B<OCSP_NOSIGS>, the function checks 134 Certificate revocation status checks using CRLs is disabled during path validation 140 B<OCSP_NOEXPLICIT> flag is not set the function checks for explicit
|
H A D | OSSL_ESS_check_signing_certs.pod | 40 OSSL_ESS_check_signing_certs() checks if the validation chain I<chain> contains 51 In addition to the checks required by RFCs 2624 and 5035,
|
H A D | SSL_CTX_has_client_custom_ext.pod | 16 SSL_CTX_has_client_custom_ext() checks whether a handler has been set for a
|
H A D | EVP_PKEY_is_a.pod | 24 EVP_PKEY_is_a() checks if the key type of I<pkey> is I<name>. 26 EVP_PKEY_can_sign() checks if the functionality for the key type of
|
/openssl/doc/man1/ |
H A D | openssl-prime.pod.in | 17 [B<-checks> I<num>] 22 This command checks if the specified numbers are prime. 55 =item B<-checks> I<num>
|
/openssl/doc/man7/ |
H A D | EVP_KDF-PBKDF2.pod | 45 This parameter can be used to enable or disable SP800-132 compliance checks. 46 Setting the mode to 0 enables the compliance checks. 48 The checks performed are:
|
/openssl/doc/man5/ |
H A D | fips_config.pod | 81 The following FIPS configuration options indicate if run-time checks related to 84 A value of '1' will perform the checks, otherwise if the value is '0' the checks 93 =item B<security-checks> 213 security-checks = 1
|
/openssl/test/recipes/30-test_defltfips/ |
H A D | fipsmodule.cnf | 6 security-checks = 1
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_msg_check_update.pod | 7 - generic checks on a received CMP message, updating the context 22 ossl_cmp_msg_check_update() does all generic checks on the given message B<msg>, 63 If all checks pass then ossl_cmp_msg_check_update()
|
/openssl/.github/workflows/ |
H A D | coveralls.yml | 22 checks: write # for coverallsapp/github-action to create new checks
|
/openssl/ssl/quic/ |
H A D | json_enc.c | 608 int checks = isnan(value); in ossl_json_f64() local 610 checks |= isinf(value); in ossl_json_f64() 613 if (checks) { in ossl_json_f64()
|