Searched refs:validity (Results 1 – 25 of 33) sorted by relevance
12
/openssl/crypto/x509/ |
H A D | x509_set.c | 94 &x->cert_info.validity.notBefore, tm); in X509_set1_notBefore() 102 &x->cert_info.validity.notAfter, tm); in X509_set1_notAfter() 134 return x->cert_info.validity.notBefore; in X509_get0_notBefore() 139 return x->cert_info.validity.notAfter; in X509_get0_notAfter() 144 return x->cert_info.validity.notBefore; in X509_getm_notBefore() 149 return x->cert_info.validity.notAfter; in X509_getm_notAfter()
|
H A D | x509_r2x.c | 50 if (X509_gmtime_adj(xi->validity.notBefore, 0) == NULL) in X509_REQ_to_X509() 52 if (X509_gmtime_adj(xi->validity.notAfter, (long)60 * 60 * 24 * days) == in X509_REQ_to_X509()
|
H A D | x_x509.c | 23 ASN1_EMBED(X509_CINF, validity, X509_VAL),
|
/openssl/doc/man3/ |
H A D | SSL_check_chain.pod | 21 SSL_check_chain() returns a bitmap of flags indicating the validity of the 71 The validity of a chain is determined by checking if it matches a supported
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 59 indication of the chain's validity! 61 and the validity of the originally presented chain is then visible
|
H A D | X509_STORE_set_verify_cb_func.pod | 135 limits of each certificate's first and last validity time. 144 On success it assigns to I<*issuer> the first match that has a suitable validity 179 X509_STORE_set_check_crl() sets the function to check the validity of
|
H A D | X509_verify.pod | 29 chain validity) are performed.
|
H A D | SSL_get0_peer_rpk.pod | 48 Raw public keys have no subject, issuer, validity dates nor digital signature
|
H A D | PKCS7_verify.pod | 34 B<not> check their validity or whether any signatures are valid. The I<certs> 104 useful if one merely wishes to write the content to I<out> and its validity
|
H A D | X509_ACERT_print_ex.pod | 59 The period of validity between the times returned from X509_ACERT_get0_notBefore()
|
H A D | OCSP_resp_find_status.pod | 109 OCSP_check_validity() checks the validity of its I<thisupd> and I<nextupd> 185 ID of interest and then check its validity using OCSP_check_validity(). They
|
H A D | OSSL_CRMF_MSG_set0_validity.pod | 44 as validity constraints in the certTemplate of I<crm>.
|
H A D | X509_NAME_get_index_by_NID.pod | 72 should check for the return value of -2. Alternatively the NID validity
|
H A D | X509_LOOKUP_hash_dir.pod | 105 subject or several CRLs with same issuer (and, for example, different validity
|
H A D | SSL_set1_server_cert_type.pod | 90 Raw public keys have no subject, issuer, validity dates or digital signature.
|
H A D | X509_check_host.pod | 23 The validity of the certificate and its trust level has to be checked by
|
H A D | CMS_verify.pod | 125 useful if one merely wishes to write the content to I<out> and its validity
|
/openssl/crypto/crmf/ |
H A D | crmf_local.h | 314 OSSL_CRMF_OPTIONALVALIDITY *validity; member
|
H A D | crmf_asn.c | 191 ASN1_IMP_OPT(OSSL_CRMF_CERTTEMPLATE, validity,
|
H A D | crmf_lib.c | 271 tmpl->validity = vld; in OSSL_CRMF_MSG_set0_validity()
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | SIGNATURE | 10 validity. If "==> Signature verified OK! <==" is not displayed,
|
/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 47 OpenSSL checks the validity period of such certificates 170 The fourth, and final, step is to check the validity of the certificate chain. 172 the validity period as specified by the C<notBefore> and C<notAfter> fields 263 This option suppresses checking the validity period of certificates and CRLs 338 Checks end entity certificate validity by attempting to look up a valid CRL. 343 Checks the validity of B<all> certificates in the chain by attempting
|
/openssl/include/crypto/ |
H A D | x509.h | 165 X509_VAL validity; member
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 212 OpenSSL default provider allows testing of the validity of multi-primes.
|
/openssl/doc/designs/quic-design/ |
H A D | rx-depacketizer.md | 134 The I, H, 0, and 1 columns are validity in different packet types, with this meaning:
|
Completed in 24 milliseconds
12