Home
last modified time | relevance | path

Searched refs:policies (Results 1 – 25 of 31) sorted by relevance

12

/openssl-master/crypto/x509/
A Dx509_vpm.c197 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit()
337 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy()
338 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy()
339 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy()
342 if (!sk_ASN1_OBJECT_push(param->policies, policy)) in X509_VERIFY_PARAM_add0_policy()
357 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies()
358 param->policies = NULL; in X509_VERIFY_PARAM_set1_policies()
362 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_set1_policies()
363 if (param->policies == NULL) in X509_VERIFY_PARAM_set1_policies()
366 for (i = 0; i < sk_ASN1_OBJECT_num(policies); i++) { in X509_VERIFY_PARAM_set1_policies()
[all …]
A Dpcy_cache.c27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument
34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create()
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
A Dx509_local.h30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
/openssl-master/crypto/ts/
A Dts_rsp_sign.c151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free()
210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy()
211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy()
215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy()
512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy()
513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
A Dts_conf.c317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local
320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
/openssl-master/test/
A DCAtsa.cnf137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
A Dcmp_ctx_test.c770 DEFINE_PUSH_TEST(0, 0, policies, policy, POLICYINFO) in DEFINE_SET_CB_TEST()
/openssl-master/crypto/cmp/
A Dcmp_ctx.c216 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free()
548 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy()
549 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy()
552 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
A Dcmp_msg.c346 if (ctx->policies != NULL in OSSL_CMP_CTX_setup_CRM()
348 ctx->setPoliciesCritical, ctx->policies)) in OSSL_CMP_CTX_setup_CRM()
A Dcmp_local.h111 CERTIFICATEPOLICIES *policies; /* policies to be included in extensions */ member
/openssl-master/
A DCONTRIBUTING.md29 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html>
63 [coding style]: https://www.openssl.org/policies/codingstyle.html
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/
A Dtest.cnf10 policies = certificatePolicies
/openssl-master/doc/HOWTO/
A Dcertificates.txt48 policies). A certificate request is sent to a certificate authority
66 policies) and usually waits for payment from you. Once that is
/openssl-master/doc/man7/
A Dproxy-certificates.pod99 The string is then a filename. This is useful for policies that are
106 application to interpret and combine these policies.>
133 To interpret proxy policies, the application would normally start with
/openssl-master/doc/man3/
A DX509_VERIFY_PARAM_set_flags.pod46 STACK_OF(ASN1_OBJECT) *policies);
104 by default) and sets the acceptable policy set to B<policies>. Any existing
105 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
A DX509_STORE_CTX_set_verify_cb.pod189 /* print out policies */
A DX509_STORE_set_verify_cb_func.pod189 X509_STORE_set_check_policy() sets the function to check the policies
A DX509_STORE_CTX_get_error.pod276 A certificate policies extension had an invalid value (for example an incorrect
/openssl-master/doc/man1/
A Dopenssl-cmp.pod.in32 [B<-policies> I<name>]
329 =item B<-policies> I<name>
331 Name of section in OpenSSL config file defining policies to be set
339 to add as certificate policies request extension.
340 This option cannot be used together with B<-policies>.
344 Flag the policies given with B<-policy_oids> as critical.
A Dopenssl-verification-options.pod196 L<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/>.
494 Use default verification policies like trust model and required certificate
495 policies identified by I<name>.
/openssl-master/apps/
A Dopenssl-vms.cnf323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
A Dopenssl.cnf323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
/openssl-master/doc/man5/
A Dx509v3_config.pod415 Multiple policies are comma-separated. For example:
/openssl-master/include/openssl/
A Dx509_vfy.h.in718 STACK_OF(ASN1_OBJECT) *policies);

Completed in 62 milliseconds

12