Searched refs:leaf (Results 1 – 16 of 16) sorted by relevance
/openssl-master/include/crypto/ |
A D | sparse_array.h | 47 void (*leaf)(ossl_uintmax_t, type *)) \ 50 (void (*)(ossl_uintmax_t, void *))leaf); \ 54 void (*leaf)(ossl_uintmax_t, type *, void *), \ 58 (void (*)(ossl_uintmax_t, void *, void *))leaf, arg); \ 83 void ossl_sa_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, void *)); 85 void (*leaf)(ossl_uintmax_t, void *, void *), void *);
|
/openssl-master/crypto/ |
A D | sparse_array.c | 71 void (*leaf)(ossl_uintmax_t, void *, void *), void *arg) in sa_doall() 97 } else if (leaf != NULL) { in sa_doall() 98 (*leaf)(idx, p[n], arg); in sa_doall() 137 void ossl_sa_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, void *)) in ossl_sa_doall() 141 tramp.func = leaf; in ossl_sa_doall() 147 void (*leaf)(ossl_uintmax_t, void *, void *), in ossl_sa_doall_arg() 151 sa_doall(sa, NULL, leaf, arg); in ossl_sa_doall_arg()
|
A D | README-sparse_array.md | 8 tree contains a block of pointers to either the user supplied leaf values or 109 along a path from the root of the tree to an added leaf will be allocated.
|
A D | sparccpuid.S | 153 be 1f ! could have been a leaf function...
|
/openssl-master/doc/internal/man3/ |
A D | OPENSSL_SA.pod | 23 void ossl_sa_TYPE_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, 26 void (*leaf)(ossl_uintmax_t, void *, void *), 69 B<ossl_sa_I<TYPE>_doall>() calls the function I<leaf> for each element in I<sa> 71 of each item is passed as the first argument to the leaf function and a 74 B<ossl_sa_I<TYPE>_doall_arg>() calls the function I<leaf> for each element in 76 array, of each item is passed as the first argument to the leaf function,
|
/openssl-master/test/ |
A D | crltest.c | 232 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() argument 250 || !TEST_true(X509_STORE_CTX_init(ctx, store, leaf, NULL))) in verify()
|
A D | danetest.in | 49 ## -- Anonymous and "never valid" leaf certificate DANE-EE(3) tests 1263 # Wrong leaf digest
|
A D | sslapitest.c | 571 char *leaf = test_mk_file_path(certsdir, "leaf.pem"); in test_client_cert_verify_cb() local 585 if (!TEST_int_eq(SSL_CTX_use_certificate_chain_file(sctx, leaf), 1) in test_client_cert_verify_cb() 638 OPENSSL_free(leaf); in test_client_cert_verify_cb()
|
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/ |
A D | signer.crt | 1 Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = leaf
|
A D | test.cnf | 31 subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf"
|
/openssl-master/doc/man1/ |
A D | openssl-verify.pod.in | 118 problem was detected starting with zero for the target ("leaf") certificate
|
A D | openssl-verification-options.pod | 158 The target or "leaf" certificate, as well as any other untrusted certificates, 160 All certificates except the target or "leaf" must also be valid CA certificates.
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_dane_enable.pod | 97 0 if an EE TLSA record directly matched the leaf certificate, or a positive
|
A D | X509_VERIFY_PARAM_set_flags.pod | 246 B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf
|
/openssl-master/doc/man7/ |
A D | migration_guide.pod | 2383 leaf certificate is signed with SHA-1, a call to L<SSL_CTX_use_certificate(3)>
|
/openssl-master/ |
A D | CHANGES.md | 5291 bypassed, such as the CA flag, enabling them to use a valid leaf 6453 bypassed, such as the CA flag, enabling them to use a valid leaf
|
Completed in 61 milliseconds