/openssl-master/crypto/x509/ |
A D | x509_vpm.c | 197 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 337 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 338 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 339 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 342 if (!sk_ASN1_OBJECT_push(param->policies, policy)) in X509_VERIFY_PARAM_add0_policy() 357 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() 358 param->policies = NULL; in X509_VERIFY_PARAM_set1_policies() 362 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_set1_policies() 363 if (param->policies == NULL) in X509_VERIFY_PARAM_set1_policies() 366 for (i = 0; i < sk_ASN1_OBJECT_num(policies); i++) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
A D | x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
|
/openssl-master/crypto/ts/ |
A D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
|
A D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
/openssl-master/test/ |
A D | CAtsa.cnf | 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
A D | cmp_ctx_test.c | 770 DEFINE_PUSH_TEST(0, 0, policies, policy, POLICYINFO) in DEFINE_SET_CB_TEST()
|
/openssl-master/crypto/cmp/ |
A D | cmp_ctx.c | 216 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free() 548 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy() 549 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy() 552 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
|
A D | cmp_msg.c | 346 if (ctx->policies != NULL in OSSL_CMP_CTX_setup_CRM() 348 ctx->setPoliciesCritical, ctx->policies)) in OSSL_CMP_CTX_setup_CRM()
|
A D | cmp_local.h | 111 CERTIFICATEPOLICIES *policies; /* policies to be included in extensions */ member
|
/openssl-master/ |
A D | CONTRIBUTING.md | 29 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html> 63 [coding style]: https://www.openssl.org/policies/codingstyle.html
|
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/ |
A D | test.cnf | 10 policies = certificatePolicies
|
/openssl-master/doc/HOWTO/ |
A D | certificates.txt | 48 policies). A certificate request is sent to a certificate authority 66 policies) and usually waits for payment from you. Once that is
|
/openssl-master/doc/man7/ |
A D | proxy-certificates.pod | 99 The string is then a filename. This is useful for policies that are 106 application to interpret and combine these policies.> 133 To interpret proxy policies, the application would normally start with
|
/openssl-master/doc/man3/ |
A D | X509_VERIFY_PARAM_set_flags.pod | 46 STACK_OF(ASN1_OBJECT) *policies); 104 by default) and sets the acceptable policy set to B<policies>. Any existing 105 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
|
A D | X509_STORE_CTX_set_verify_cb.pod | 189 /* print out policies */
|
A D | X509_STORE_set_verify_cb_func.pod | 189 X509_STORE_set_check_policy() sets the function to check the policies
|
A D | X509_STORE_CTX_get_error.pod | 276 A certificate policies extension had an invalid value (for example an incorrect
|
/openssl-master/doc/man1/ |
A D | openssl-cmp.pod.in | 32 [B<-policies> I<name>] 329 =item B<-policies> I<name> 331 Name of section in OpenSSL config file defining policies to be set 339 to add as certificate policies request extension. 340 This option cannot be used together with B<-policies>. 344 Flag the policies given with B<-policy_oids> as critical.
|
A D | openssl-verification-options.pod | 196 L<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/>. 494 Use default verification policies like trust model and required certificate 495 policies identified by I<name>.
|
/openssl-master/apps/ |
A D | openssl-vms.cnf | 323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
A D | openssl.cnf | 323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
/openssl-master/doc/man5/ |
A D | x509v3_config.pod | 415 Multiple policies are comma-separated. For example:
|
/openssl-master/include/openssl/ |
A D | x509_vfy.h.in | 718 STACK_OF(ASN1_OBJECT) *policies);
|