Home
last modified time | relevance | path

Searched refs:validity (Results 1 – 25 of 33) sorted by relevance

12

/openssl/crypto/x509/
H A Dx509_set.c94 &x->cert_info.validity.notBefore, tm); in X509_set1_notBefore()
102 &x->cert_info.validity.notAfter, tm); in X509_set1_notAfter()
134 return x->cert_info.validity.notBefore; in X509_get0_notBefore()
139 return x->cert_info.validity.notAfter; in X509_get0_notAfter()
144 return x->cert_info.validity.notBefore; in X509_getm_notBefore()
149 return x->cert_info.validity.notAfter; in X509_getm_notAfter()
H A Dx509_r2x.c50 if (X509_gmtime_adj(xi->validity.notBefore, 0) == NULL) in X509_REQ_to_X509()
52 if (X509_gmtime_adj(xi->validity.notAfter, (long)60 * 60 * 24 * days) == in X509_REQ_to_X509()
H A Dx_x509.c23 ASN1_EMBED(X509_CINF, validity, X509_VAL),
/openssl/doc/man3/
H A DSSL_check_chain.pod21 SSL_check_chain() returns a bitmap of flags indicating the validity of the
71 The validity of a chain is determined by checking if it matches a supported
H A DSSL_CTX_set_cert_verify_callback.pod59 indication of the chain's validity!
61 and the validity of the originally presented chain is then visible
H A DX509_STORE_set_verify_cb_func.pod135 limits of each certificate's first and last validity time.
144 On success it assigns to I<*issuer> the first match that has a suitable validity
179 X509_STORE_set_check_crl() sets the function to check the validity of
H A DX509_verify.pod29 chain validity) are performed.
H A DSSL_get0_peer_rpk.pod48 Raw public keys have no subject, issuer, validity dates nor digital signature
H A DPKCS7_verify.pod34 B<not> check their validity or whether any signatures are valid. The I<certs>
104 useful if one merely wishes to write the content to I<out> and its validity
H A DX509_ACERT_print_ex.pod59 The period of validity between the times returned from X509_ACERT_get0_notBefore()
H A DOCSP_resp_find_status.pod109 OCSP_check_validity() checks the validity of its I<thisupd> and I<nextupd>
185 ID of interest and then check its validity using OCSP_check_validity(). They
H A DOSSL_CRMF_MSG_set0_validity.pod44 as validity constraints in the certTemplate of I<crm>.
H A DX509_NAME_get_index_by_NID.pod72 should check for the return value of -2. Alternatively the NID validity
H A DX509_LOOKUP_hash_dir.pod105 subject or several CRLs with same issuer (and, for example, different validity
H A DSSL_set1_server_cert_type.pod90 Raw public keys have no subject, issuer, validity dates or digital signature.
H A DX509_check_host.pod23 The validity of the certificate and its trust level has to be checked by
H A DCMS_verify.pod125 useful if one merely wishes to write the content to I<out> and its validity
/openssl/crypto/crmf/
H A Dcrmf_local.h314 OSSL_CRMF_OPTIONALVALIDITY *validity; member
H A Dcrmf_asn.c191 ASN1_IMP_OPT(OSSL_CRMF_CERTTEMPLATE, validity,
H A Dcrmf_lib.c271 tmpl->validity = vld; in OSSL_CRMF_MSG_set0_validity()
/openssl/external/perl/Text-Template-1.56/
H A DSIGNATURE10 validity. If "==> Signature verified OK! <==" is not displayed,
/openssl/doc/man1/
H A Dopenssl-verification-options.pod47 OpenSSL checks the validity period of such certificates
170 The fourth, and final, step is to check the validity of the certificate chain.
172 the validity period as specified by the C<notBefore> and C<notAfter> fields
263 This option suppresses checking the validity period of certificates and CRLs
338 Checks end entity certificate validity by attempting to look up a valid CRL.
343 Checks the validity of B<all> certificates in the chain by attempting
/openssl/include/crypto/
H A Dx509.h165 X509_VAL validity; member
/openssl/doc/man7/
H A DEVP_PKEY-RSA.pod212 OpenSSL default provider allows testing of the validity of multi-primes.
/openssl/doc/designs/quic-design/
H A Drx-depacketizer.md134 The I, H, 0, and 1 columns are validity in different packet types, with this meaning:

Completed in 24 milliseconds

12