Home
last modified time | relevance | path

Searched refs:nodes (Results 1 – 16 of 16) sorted by relevance

/openssl-master/crypto/x509/
A Dpcy_node.c28 X509_POLICY_NODE *ossl_policy_tree_find_sk(STACK_OF(X509_POLICY_NODE) *nodes, in ossl_policy_tree_find_sk() argument
38 idx = sk_X509_POLICY_NODE_find(nodes, &l); in ossl_policy_tree_find_sk()
39 return sk_X509_POLICY_NODE_value(nodes, idx); in ossl_policy_tree_find_sk()
49 for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { in ossl_policy_level_find_node()
50 node = sk_X509_POLICY_NODE_value(level->nodes, i); in ossl_policy_level_find_node()
80 if (level->nodes == NULL) in ossl_policy_level_add_node()
81 level->nodes = ossl_policy_node_cmp_new(); in ossl_policy_level_add_node()
82 if (level->nodes == NULL) { in ossl_policy_level_add_node()
86 if (!sk_X509_POLICY_NODE_push(level->nodes, node)) { in ossl_policy_level_add_node()
A Dpcy_tree.c61 sk_X509_POLICY_NODE_value(plev->nodes, i); in tree_print()
365 node = sk_X509_POLICY_NODE_value(last->nodes, i); in tree_link_any()
390 STACK_OF(X509_POLICY_NODE) *nodes; in tree_prune()
393 nodes = curr->nodes; in tree_prune()
396 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune()
401 (void)sk_X509_POLICY_NODE_delete(nodes, i); in tree_prune()
408 nodes = curr->nodes; in tree_prune()
410 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune()
642 STACK_OF(X509_POLICY_NODE) *nodes, *auth_nodes = NULL; in X509_policy_check()
688 nodes = X509_policy_tree_get0_user_policies(tree); in X509_policy_check()
[all …]
A Dpcy_lib.c67 if (level->nodes) in X509_policy_level_node_count()
68 n += sk_X509_POLICY_NODE_num(level->nodes); in X509_policy_level_node_count()
81 return sk_X509_POLICY_NODE_value(level->nodes, i); in X509_policy_level_get0_node()
A Dpcy_local.h103 STACK_OF(X509_POLICY_NODE) *nodes;
/openssl-master/demos/certs/apps/
A Dmkxcerts.sh7 -config apps.cnf -extensions usr_cert -x509 -nodes \
10 -config apps.cnf -extensions usr_cert -x509 -nodes \
13 -config apps.cnf -extensions usr_cert -x509 -nodes \
22 -config apps.cnf -extensions ec_cert -x509 -nodes \
23 -nodes -keyout tecp256.pem -out tecp256.pem -newkey ec:ecp256.pem \
27 -config apps.cnf -extensions ec_cert -x509 -nodes \
28 -nodes -keyout tecp384.pem -out tecp384.pem -newkey ec:ecp384.pem \
A Dmkacerts.sh8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \
11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \
17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \
24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \
31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \
/openssl-master/crypto/
A Dsparse_array.c60 void **nodes; member
74 void *nodes[SA_BLOCK_MAX_LEVELS]; in sa_doall() local
79 nodes[0] = sa->nodes; in sa_doall()
82 void ** const p = nodes[l]; in sa_doall()
95 nodes[l] = p[n]; in sa_doall()
168 p = sa->nodes; in ossl_sa_get()
199 p[0] = sa->nodes; in ossl_sa_set()
200 sa->nodes = p; in ossl_sa_set()
205 p = sa->nodes; in ossl_sa_set()
A DREADME-sparse_array.md108 The nodes themselves are allocated in a sparse manner. Only nodes which exist
110 The complexity is hidden and nodes are allocated on an as needed basis.
115 NULL. The data structure does not attempt to reclaim nodes or reduce the
/openssl-master/demos/certs/
A Dmkcerts.sh8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \
25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \
32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \
39 CN="Test OCSP Responder Cert" $OPENSSL req -config ca.cnf -nodes \
/openssl-master/apps/
A DCA.pl.in124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
142 } elsif ($WHAT =~ /^\-newreq(\-nodes)?$/ ) {
/openssl-master/doc/man1/
A DCA.pl.pod17 B<-newreq-nodes> |
76 =item B<-newreq-nodes>
A Dopenssl-pkcs12.pod.in44 [B<-nodes>]
220 =item B<-nodes>
459 The B<-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
A Dopenssl-req.pod.in27 [B<-nodes>]
231 =item B<-nodes>
764 The <-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
/openssl-master/doc/man3/
A DRAND_add.pod68 chroot(2) jail without the associated device nodes being available. When
/openssl-master/apps/lib/
A Dapps.c2021 static void nodes_print(const char *name, STACK_OF(X509_POLICY_NODE) *nodes) in nodes_print() argument
2027 if (nodes) { in nodes_print()
2029 for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++) { in nodes_print()
2030 node = sk_X509_POLICY_NODE_value(nodes, i); in nodes_print()
/openssl-master/
A DCHANGES.md2121 the associated device nodes being available. This behaviour can be
2387 * Reimplement -newreq-nodes and ERR_error_string_n; the
10347 * New function X509_POLICY_NODE_print() which prints out policy nodes.
13201 * New '-newreq-nodes' command option to CA.pl. This is like
13202 '-newreq', but calls 'openssl req' with the '-nodes' option

Completed in 40 milliseconds