Searched refs:nodes (Results 1 – 16 of 16) sorted by relevance
/openssl-master/crypto/x509/ |
A D | pcy_node.c | 28 X509_POLICY_NODE *ossl_policy_tree_find_sk(STACK_OF(X509_POLICY_NODE) *nodes, in ossl_policy_tree_find_sk() argument 38 idx = sk_X509_POLICY_NODE_find(nodes, &l); in ossl_policy_tree_find_sk() 39 return sk_X509_POLICY_NODE_value(nodes, idx); in ossl_policy_tree_find_sk() 49 for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { in ossl_policy_level_find_node() 50 node = sk_X509_POLICY_NODE_value(level->nodes, i); in ossl_policy_level_find_node() 80 if (level->nodes == NULL) in ossl_policy_level_add_node() 81 level->nodes = ossl_policy_node_cmp_new(); in ossl_policy_level_add_node() 82 if (level->nodes == NULL) { in ossl_policy_level_add_node() 86 if (!sk_X509_POLICY_NODE_push(level->nodes, node)) { in ossl_policy_level_add_node()
|
A D | pcy_tree.c | 61 sk_X509_POLICY_NODE_value(plev->nodes, i); in tree_print() 365 node = sk_X509_POLICY_NODE_value(last->nodes, i); in tree_link_any() 390 STACK_OF(X509_POLICY_NODE) *nodes; in tree_prune() 393 nodes = curr->nodes; in tree_prune() 396 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune() 401 (void)sk_X509_POLICY_NODE_delete(nodes, i); in tree_prune() 408 nodes = curr->nodes; in tree_prune() 410 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune() 642 STACK_OF(X509_POLICY_NODE) *nodes, *auth_nodes = NULL; in X509_policy_check() 688 nodes = X509_policy_tree_get0_user_policies(tree); in X509_policy_check() [all …]
|
A D | pcy_lib.c | 67 if (level->nodes) in X509_policy_level_node_count() 68 n += sk_X509_POLICY_NODE_num(level->nodes); in X509_policy_level_node_count() 81 return sk_X509_POLICY_NODE_value(level->nodes, i); in X509_policy_level_get0_node()
|
A D | pcy_local.h | 103 STACK_OF(X509_POLICY_NODE) *nodes;
|
/openssl-master/demos/certs/apps/ |
A D | mkxcerts.sh | 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 22 -config apps.cnf -extensions ec_cert -x509 -nodes \ 23 -nodes -keyout tecp256.pem -out tecp256.pem -newkey ec:ecp256.pem \ 27 -config apps.cnf -extensions ec_cert -x509 -nodes \ 28 -nodes -keyout tecp384.pem -out tecp384.pem -newkey ec:ecp384.pem \
|
A D | mkacerts.sh | 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \ 24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \ 31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \
|
/openssl-master/crypto/ |
A D | sparse_array.c | 60 void **nodes; member 74 void *nodes[SA_BLOCK_MAX_LEVELS]; in sa_doall() local 79 nodes[0] = sa->nodes; in sa_doall() 82 void ** const p = nodes[l]; in sa_doall() 95 nodes[l] = p[n]; in sa_doall() 168 p = sa->nodes; in ossl_sa_get() 199 p[0] = sa->nodes; in ossl_sa_set() 200 sa->nodes = p; in ossl_sa_set() 205 p = sa->nodes; in ossl_sa_set()
|
A D | README-sparse_array.md | 108 The nodes themselves are allocated in a sparse manner. Only nodes which exist 110 The complexity is hidden and nodes are allocated on an as needed basis. 115 NULL. The data structure does not attempt to reclaim nodes or reduce the
|
/openssl-master/demos/certs/ |
A D | mkcerts.sh | 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ 25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \ 32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \ 39 CN="Test OCSP Responder Cert" $OPENSSL req -config ca.cnf -nodes \
|
/openssl-master/apps/ |
A D | CA.pl.in | 124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-… 142 } elsif ($WHAT =~ /^\-newreq(\-nodes)?$/ ) {
|
/openssl-master/doc/man1/ |
A D | CA.pl.pod | 17 B<-newreq-nodes> | 76 =item B<-newreq-nodes>
|
A D | openssl-pkcs12.pod.in | 44 [B<-nodes>] 220 =item B<-nodes> 459 The B<-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
|
A D | openssl-req.pod.in | 27 [B<-nodes>] 231 =item B<-nodes> 764 The <-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
|
/openssl-master/doc/man3/ |
A D | RAND_add.pod | 68 chroot(2) jail without the associated device nodes being available. When
|
/openssl-master/apps/lib/ |
A D | apps.c | 2021 static void nodes_print(const char *name, STACK_OF(X509_POLICY_NODE) *nodes) in nodes_print() argument 2027 if (nodes) { in nodes_print() 2029 for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++) { in nodes_print() 2030 node = sk_X509_POLICY_NODE_value(nodes, i); in nodes_print()
|
/openssl-master/ |
A D | CHANGES.md | 2121 the associated device nodes being available. This behaviour can be 2387 * Reimplement -newreq-nodes and ERR_error_string_n; the 10347 * New function X509_POLICY_NODE_print() which prints out policy nodes. 13201 * New '-newreq-nodes' command option to CA.pl. This is like 13202 '-newreq', but calls 'openssl req' with the '-nodes' option
|
Completed in 40 milliseconds