Searched refs:SCT_validate (Results 1 – 11 of 11) sorted by relevance
/freebsd/crypto/openssl/doc/man3/ |
H A D | SCT_validate.pod | 5 SCT_validate, SCT_LIST_validate, SCT_get_validation_status - 21 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx); 27 SCT_validate() will check that an SCT is valid and verify its signature. 77 SCT_validate() returns a negative integer if an internal error occurs, 0 if the 84 If SCT_validate() or SCT_LIST_validate() have not been passed that SCT, the
|
H A D | SCT_print.pod | 29 a human-readable string. Call SCT_validate() or SCT_LIST_validate() 42 L<SCT_validate(3)>
|
H A D | SCT_new.pod | 181 SCT_VALIDATION_STATUS_NOT_SET (see L<SCT_validate(3)>). 210 L<SCT_validate(3)>,
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | ct.pod | 35 L<SCT_validate(3)>, 36 L<SCT_validate(3)>,
|
/freebsd/crypto/openssl/crypto/ct/ |
H A D | ct_sct.c | 290 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) in SCT_validate() function 389 is_sct_valid = SCT_validate(sct, ctx); in SCT_LIST_validate()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ct.h | 377 __owur int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx);
|
H A D | ct.h.in | 329 __owur int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx);
|
/freebsd/crypto/openssl/doc/ |
H A D | build.info | 2030 DEPEND[html/man3/SCT_validate.html]=man3/SCT_validate.pod 2031 GENERATE[html/man3/SCT_validate.html]=man3/SCT_validate.pod 2032 DEPEND[man/man3/SCT_validate.3]=man3/SCT_validate.pod 2033 GENERATE[man/man3/SCT_validate.3]=man3/SCT_validate.pod 3293 html/man3/SCT_validate.html \ 3901 man/man3/SCT_validate.3 \
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | Makefile | 389 MAN+= SCT_validate.3 3684 MLINKS+= SCT_validate.3 SCT_LIST_validate.3 3693 MLINKS+= SCT_validate.3 SCT_get_validation_status.3
|
/freebsd/secure/lib/libcrypto/ |
H A D | Version.map | 2547 SCT_validate;
|
/freebsd/crypto/openssl/util/ |
H A D | libcrypto.num | 2595 SCT_validate 2653 3_0_0 EXIST::FUNCTION:CT
|