/openssl-master/crypto/ |
A D | provider_conf.c | 250 OSSL_PROVIDER_INFO entry; in provider_conf_load() local 252 memset(&entry, 0, sizeof(entry)); in provider_conf_load() 255 entry.name = OPENSSL_strdup(name); in provider_conf_load() 256 if (entry.name == NULL) { in provider_conf_load() 262 entry.path = OPENSSL_strdup(path); in provider_conf_load() 263 if (entry.path == NULL) { in provider_conf_load() 269 ok = provider_conf_params(NULL, &entry, NULL, value, cnf); in provider_conf_load() 270 if (ok && (entry.path != NULL || entry.parameters != NULL)) in provider_conf_load() 271 ok = ossl_provider_info_add_to_store(libctx, &entry); in provider_conf_load() 272 if (!ok || (entry.path == NULL && entry.parameters == NULL)) { in provider_conf_load() [all …]
|
A D | provider.c | 118 OSSL_PROVIDER_INFO entry; in OSSL_PROVIDER_add_builtin() local 124 memset(&entry, 0, sizeof(entry)); in OSSL_PROVIDER_add_builtin() 125 entry.name = OPENSSL_strdup(name); in OSSL_PROVIDER_add_builtin() 126 if (entry.name == NULL) { in OSSL_PROVIDER_add_builtin() 130 entry.init = init_fn; in OSSL_PROVIDER_add_builtin() 131 if (!ossl_provider_info_add_to_store(libctx, &entry)) { in OSSL_PROVIDER_add_builtin() 132 ossl_provider_info_clear(&entry); in OSSL_PROVIDER_add_builtin()
|
A D | provider_local.h | 30 OSSL_PROVIDER_INFO *entry);
|
/openssl-master/crypto/x509/ |
A D | x_name.c | 158 X509_NAME_ENTRY *entry; in x509_name_ex_d2i() local 186 entry->set = i; in x509_name_ex_d2i() 244 X509_NAME_ENTRY *entry; in x509_name_encode() local 251 entry = sk_X509_NAME_ENTRY_value(a->entries, i); in x509_name_encode() 252 if (entry->set != set) { in x509_name_encode() 260 set = entry->set; in x509_name_encode() 262 if (!sk_X509_NAME_ENTRY_push(entries, entry)) in x509_name_encode() 309 X509_NAME_ENTRY *entry, *tmpentry = NULL; in x509_name_canon() local 326 if (entry->set != set) { in x509_name_canon() 335 set = entry->set; in x509_name_canon() [all …]
|
A D | v3_admis.c | 133 ADMISSIONS* entry = sk_ADMISSIONS_value(admission->contentsOfAdmissions, i); in i2r_ADMISSION_SYNTAX() local 137 if (entry->admissionAuthority != NULL) { in i2r_ADMISSION_SYNTAX() 140 || GENERAL_NAME_print(bp, entry->admissionAuthority) <= 0 in i2r_ADMISSION_SYNTAX() 145 if (entry->namingAuthority != NULL) { in i2r_ADMISSION_SYNTAX() 146 if (i2r_NAMING_AUTHORITY(method, entry->namingAuthority, bp, ind) <= 0) in i2r_ADMISSION_SYNTAX() 150 for (j = 0; j < sk_PROFESSION_INFO_num(entry->professionInfos); j++) { in i2r_ADMISSION_SYNTAX() 151 PROFESSION_INFO* pinfo = sk_PROFESSION_INFO_value(entry->professionInfos, j); in i2r_ADMISSION_SYNTAX()
|
/openssl-master/doc/man3/ |
A D | X509_CRL_get0_by_serial.pod | 8 X509_CRL_add0_revoked, X509_CRL_sort - CRL revoked entry utility 33 X509_CRL_get0_by_serial() attempts to find a revoked entry in B<crl> for 35 pointer of the matching entry, as a result B<*ret> must not be freed up 39 looks for a revoked entry using the serial number of certificate B<x>. 58 X509_CRL_add0_revoked() appends revoked entry B<rev> to CRL B<crl>. The 74 1 on success except if the revoked entry has the reason C<removeFromCRL> (8),
|
A D | X509_NAME_add_entry_by_txt.pod | 36 standard ASN1 type (such as B<V_ASN1_IA5STRING>). The new entry is 40 to B<name>. The new entry is added to a position determined by B<loc> 44 X509_NAME_delete_entry() deletes an entry from B<name> at position 45 B<loc>. The deleted entry is returned and must be freed up. 61 The B<loc> and B<set> parameters determine where a new entry should 63 to 0. This adds a new entry to the end of B<name> as a single valued 66 B<loc> actually determines the index where the new entry is inserted:
|
A D | X509_NAME_get_index_by_NID.pod | 45 the "text" from the first entry in B<name> which matches B<nid> or 46 B<obj>, if no such entry exists -1 is returned. At most B<len> bytes 58 entry and will copy the contents of the field verbatim: this can 78 return the index of the next matching entry or -1 if not found. 85 requested entry or B<NULL> if the index is invalid.
|
A D | OPENSSL_LH_COMPFUNC.pod | 67 callback takes a pointer to a table entry as its argument and returns 122 I<table>. If there already is an entry with the same key, the old 126 B<lh_I<TYPE>_delete>() deletes an entry from I<table>. 128 B<lh_I<TYPE>_retrieve>() looks up an entry in I<table>. Normally, I<data> 132 B<lh_I<TYPE>_doall>() will, for every entry in the hash table, call 160 that is passed both the table entry and an extra argument). As with 199 When a hash table entry is replaced, B<lh_I<TYPE>_insert>() or 203 B<lh_I<TYPE>_delete>() and OPENSSL_LH_delete() return the entry being deleted. 206 B<lh_I<TYPE>_retrieve>() and OPENSSL_LH_retrieve() return the hash table entry
|
A D | SSL_CTX_set_ctlog_list_file.pod | 29 If an error occurs whilst parsing a particular log entry in the file, that log 30 entry will be skipped.
|
A D | ASN1_EXTERN_FUNCS.pod | 105 The I<asn1_ex_d2i> entry may be NULL if I<asn1_ex_d2i_ex> has been specified 113 On entry I<*pval> will contain the B<ASN1_VALUE> to be encoded. If default 114 tagging is to be used then I<tag> will be -1 on entry. Otherwise if implicit 125 The I<asn1_ex_i2d> entry may be NULL if I<asn1_ex_i2d_ex> has been specified
|
A D | OSSL_CMP_HDR_get0_transactionID.pod | 32 or NULL if the respective entry does not exist and on error.
|
A D | ERR_put_error.pod | 52 last error queue entry, after inserting the optional separator string if it is 53 not NULL and the top error entry does not yet have additional data. 58 it is split over sufficiently many new copies of the last error queue entry.
|
A D | ERR_load_strings.pod | 34 The last entry in the array is {0,0}.
|
A D | X509V3_get_d2i.pod | 71 extensions of B<X509_REVOKED> structure B<r> (i.e for CRL entry extensions), 76 of a certificate a CRL or a CRL entry respectively. 174 The following are CRL entry extensions from PKIX standards such as RFC5280.
|
A D | ERR_get_error.pod | 53 queue and removes the entry. This function can be called repeatedly 76 is valid until the respective entry is overwritten in the error queue.
|
A D | OSSL_CMP_CTX_new.pod | 375 needed any more. I<arg> may be NULL to clear the entry. 399 needed any more. I<arg> may be NULL to clear the entry. 410 The I<cert> argument may be NULL to clear the entry. 429 Any store entry already set before is freed. 430 When given a NULL parameter the entry is cleared. 455 The I<cert> argument may be NULL to clear the entry. 476 The I<pkey> argument may be NULL to clear the entry. 564 default issuer entry in the requested certificate template of IR/CR/KUR. 607 needed any more. I<arg> may be NULL to clear the entry.
|
/openssl-master/providers/fips/ |
A D | build.info | 5 # It is necessary to have an explicit entry point
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpciph_rc4_stitched.txt | 11 # DECRYPT must be a separate entry due to change in TLSAAD value
|
/openssl-master/ |
A D | CONTRIBUTING.md | 80 Also note that security fixes get an entry in [CHANGES.md](CHANGES.md). 87 On exception, it might be worth adding a multi-line entry (such as 88 the entry that announces all the types that became opaque with
|
/openssl-master/doc/internal/man7/ |
A D | EVP_PKEY.pod | 117 B<EVP_PKEY>. Each cache entry has two items, a pointer to the 158 Check if there's an entry in the export cache with the same 163 If such an entry is found, nothing more is done, the key data and 164 L<EVP_KEYMGMT(3)> found in that export cache entry will be used for
|
/openssl-master/include/crypto/ |
A D | dso_conf.h.in | 20 # string entry into using the following logic;
|
/openssl-master/apps/ |
A D | srp.c | 116 char *entry = NCONF_get_string(conf, section, tag); in lookup_conf() local 117 if (entry == NULL) in lookup_conf() 119 return entry; in lookup_conf()
|
/openssl-master/crypto/err/ |
A D | README.md | 8 (in `crypto/err/err_all.c`). Finally, add an entry:
|
/openssl-master/demos/certs/ |
A D | ca.cnf | 79 # Minimal CA entry to allow generation of CRLs.
|