/openssl/include/crypto/ |
H A D | sparse_array.h | 47 void (*leaf)(ossl_uintmax_t, type *)) \ 50 (void (*)(ossl_uintmax_t, void *))leaf); \ 54 void (*leaf)(ossl_uintmax_t, type *, void *), \ 58 (void (*)(ossl_uintmax_t, void *, void *))leaf, arg); \ 83 void ossl_sa_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, void *)); 85 void (*leaf)(ossl_uintmax_t, void *, void *), void *);
|
/openssl/crypto/ |
H A D | sparse_array.c | 66 void (*leaf)(ossl_uintmax_t, void *, void *), void *arg) in sa_doall() 92 } else if (leaf != NULL) { in sa_doall() 93 (*leaf)(idx, p[n], arg); in sa_doall() 134 void ossl_sa_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, void *)) in ossl_sa_doall() 138 tramp.func = leaf; in ossl_sa_doall() 144 void (*leaf)(ossl_uintmax_t, void *, void *), in ossl_sa_doall_arg() 148 sa_doall(sa, NULL, leaf, arg); in ossl_sa_doall_arg()
|
H A D | README-sparse_array.md | 8 tree contains a block of pointers to either the user supplied leaf values or 109 along a path from the root of the tree to an added leaf will be allocated.
|
H A D | sparccpuid.S | 153 be 1f ! could have been a leaf function...
|
/openssl/doc/internal/man3/ |
H A D | OPENSSL_SA.pod | 23 void ossl_sa_TYPE_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, 26 void (*leaf)(ossl_uintmax_t, void *, void *), 69 B<ossl_sa_I<TYPE>_doall>() calls the function I<leaf> for each element in I<sa> 71 of each item is passed as the first argument to the leaf function and a 74 B<ossl_sa_I<TYPE>_doall_arg>() calls the function I<leaf> for each element in 76 array, of each item is passed as the first argument to the leaf function,
|
/openssl/test/ |
H A D | crltest.c | 253 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() argument 271 || !TEST_true(X509_STORE_CTX_init(ctx, store, leaf, NULL))) in verify()
|
H A D | danetest.in | 49 ## -- Anonymous and "never valid" leaf certificate DANE-EE(3) tests 1392 # Wrong leaf digest
|
H A D | sslapitest.c | 568 char *leaf = test_mk_file_path(certsdir, "leaf.pem"); in test_client_cert_verify_cb() local 582 if (!TEST_int_eq(SSL_CTX_use_certificate_chain_file(sctx, leaf), 1) in test_client_cert_verify_cb() 635 OPENSSL_free(leaf); in test_client_cert_verify_cb()
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | signer.crt | 1 Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = leaf
|
H A D | test.cnf | 31 subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf"
|
/openssl/doc/man1/ |
H A D | openssl-verify.pod.in | 118 problem was detected starting with zero for the target ("leaf") certificate
|
H A D | openssl-verification-options.pod | 158 The target or "leaf" certificate, as well as any other untrusted certificates, 160 All certificates except the target or "leaf" must also be valid CA certificates.
|
H A D | openssl-cmp.pod.in | 437 This chain excludes the leaf certificate, i.e., the newly enrolled certificate.
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-server-block.pod | 113 * not only the leaf (end-entity) server certificate, but also any 114 * intermediate issuer-CA certificates. The leaf certificate must be the
|
H A D | ossl-guide-migration.pod | 2490 leaf certificate is signed with SHA-1, a call to L<SSL_CTX_use_certificate(3)>
|
/openssl/doc/man3/ |
H A D | SSL_CTX_dane_enable.pod | 97 0 if an EE TLSA record directly matched the leaf certificate, or a positive
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 248 B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf
|
H A D | OSSL_CMP_CTX_new.pod | 653 This chain excludes the leaf certificate, i.e., the newly enrolled certificate.
|
/openssl/ |
H A D | NEWS.md | 423 * Fixed handling of invalid certificate policies in leaf certificates
|
H A D | CHANGES.md | 983 extended key usage of the leaf certificate according to the CA/Browser Forum. 1277 * Fixed an issue where invalid certificate policies in leaf certificates are 7236 bypassed, such as the CA flag, enabling them to use a valid leaf 8398 bypassed, such as the CA flag, enabling them to use a valid leaf
|