Searched refs:nodes (Results 1 – 22 of 22) sorted by relevance
/openssl/crypto/x509/ |
H A D | pcy_node.c | 28 X509_POLICY_NODE *ossl_policy_tree_find_sk(STACK_OF(X509_POLICY_NODE) *nodes, in ossl_policy_tree_find_sk() argument 38 idx = sk_X509_POLICY_NODE_find(nodes, &l); in ossl_policy_tree_find_sk() 39 return sk_X509_POLICY_NODE_value(nodes, idx); in ossl_policy_tree_find_sk() 49 for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { in ossl_policy_level_find_node() 50 node = sk_X509_POLICY_NODE_value(level->nodes, i); in ossl_policy_level_find_node() 83 if (level->nodes == NULL) in ossl_policy_level_add_node() 84 level->nodes = ossl_policy_node_cmp_new(); in ossl_policy_level_add_node() 85 if (level->nodes == NULL) { in ossl_policy_level_add_node() 89 if (!sk_X509_POLICY_NODE_push(level->nodes, node)) { in ossl_policy_level_add_node() 120 (void) sk_X509_POLICY_NODE_pop(level->nodes); in ossl_policy_level_add_node()
|
H A D | pcy_tree.c | 74 sk_X509_POLICY_NODE_value(plev->nodes, i); in tree_print() 384 node = sk_X509_POLICY_NODE_value(last->nodes, i); in tree_link_any() 409 STACK_OF(X509_POLICY_NODE) *nodes; in tree_prune() 412 nodes = curr->nodes; in tree_prune() 415 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune() 420 (void)sk_X509_POLICY_NODE_delete(nodes, i); in tree_prune() 427 nodes = curr->nodes; in tree_prune() 429 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune() 669 STACK_OF(X509_POLICY_NODE) *nodes, *auth_nodes = NULL; in X509_policy_check() 716 nodes = X509_policy_tree_get0_user_policies(tree); in X509_policy_check() [all …]
|
H A D | pcy_lib.c | 67 if (level->nodes) in X509_policy_level_node_count() 68 n += sk_X509_POLICY_NODE_num(level->nodes); in X509_policy_level_node_count() 81 return sk_X509_POLICY_NODE_value(level->nodes, i); in X509_policy_level_get0_node()
|
H A D | pcy_local.h | 103 STACK_OF(X509_POLICY_NODE) *nodes;
|
/openssl/demos/certs/apps/ |
H A D | mkxcerts.sh | 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 16 -config apps.cnf -extensions usr_cert -x509 -nodes \ 19 -config apps.cnf -extensions usr_cert -x509 -nodes \ 28 -config apps.cnf -extensions ec_cert -x509 -nodes \ 29 -nodes -keyout tecp256.pem -out tecp256.pem -newkey ec:ecp256.pem \ 33 -config apps.cnf -extensions ec_cert -x509 -nodes \ 34 -nodes -keyout tecp384.pem -out tecp384.pem -newkey ec:ecp384.pem \
|
H A D | mkacerts.sh | 12 CN="OpenSSL Test Root CA" opensslcmd req -config apps.cnf -x509 -nodes \ 15 CN="OpenSSL Test Intermediate CA" opensslcmd req -config apps.cnf -nodes \ 21 CN="Test Client Cert" opensslcmd req -config apps.cnf -nodes \ 28 CN="Test Server Cert" opensslcmd req -config apps.cnf -nodes \ 35 CN="Test Server Cert #2" opensslcmd req -config apps.cnf -nodes \
|
/openssl/crypto/ |
H A D | sparse_array.c | 55 void **nodes; member 69 void *nodes[SA_BLOCK_MAX_LEVELS]; in sa_doall() local 74 nodes[0] = sa->nodes; in sa_doall() 77 void ** const p = nodes[l]; in sa_doall() 90 nodes[l] = p[n]; in sa_doall() 165 p = sa->nodes; in ossl_sa_get() 196 p[0] = sa->nodes; in ossl_sa_set() 197 sa->nodes = p; in ossl_sa_set() 202 p = sa->nodes; in ossl_sa_set()
|
H A D | README-sparse_array.md | 108 The nodes themselves are allocated in a sparse manner. Only nodes which exist 110 The complexity is hidden and nodes are allocated on an as needed basis. 115 NULL. The data structure does not attempt to reclaim nodes or reduce the
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \ 16 CN="Test Intermediate CA" opensslcmd req -config ca.cnf -nodes \ 23 CN="Test Server Cert" opensslcmd req -config ca.cnf -nodes \ 30 CN="Test Client Cert" opensslcmd req -config ca.cnf -nodes \ 37 CN="Test Revoked Cert" opensslcmd req -config ca.cnf -nodes \ 44 CN="Test OCSP Responder Cert" opensslcmd req -config ca.cnf -nodes \
|
/openssl/test/recipes/25-test_eai_data/ |
H A D | kdc.sh | 10 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-root-key.pem \ 36 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-key.pem \
|
/openssl/util/perl/OpenSSL/ |
H A D | paramnames.pm | 676 my $nodes = 0; 695 $nodes++;
|
/openssl/apps/ |
H A D | CA.pl.in | 126 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-… 144 } elsif ($WHAT =~ /^\-newreq(\-nodes)?$/ ) {
|
/openssl/demos/sslecho/ |
H A D | A-SSL-Docs.txt | 15 openssl req -newkey rsa:4096 -x509 -sha256 -days 3650 -nodes -out cert.pem -keyout key.pem
|
/openssl/doc/man1/ |
H A D | CA.pl.pod | 17 B<-newreq-nodes> | 76 =item B<-newreq-nodes>
|
H A D | openssl-pkcs12.pod.in | 44 [B<-nodes>] 224 =item B<-nodes> 487 The B<-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
|
H A D | openssl-req.pod.in | 28 [B<-nodes>] 249 =item B<-nodes> 846 The <-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
|
/openssl/doc/man3/ |
H A D | RAND_add.pod | 68 chroot(2) jail without the associated device nodes being available. When
|
H A D | OPENSSL_LH_COMPFUNC.pod | 229 number of nodes. Setting this value to 0 disables hash table contraction.
|
/openssl/test/radix/ |
H A D | README.md | 80 and tearing down the additional nodes. Writing a suitable hook script will be
|
/openssl/apps/lib/ |
H A D | apps.c | 2113 static void nodes_print(const char *name, STACK_OF(X509_POLICY_NODE) *nodes) in nodes_print() argument 2119 if (nodes) { in nodes_print() 2121 for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++) { in nodes_print() 2122 node = sk_X509_POLICY_NODE_value(nodes, i); in nodes_print()
|
/openssl/ |
H A D | NEWS.md | 440 * Limited the number of nodes created in a policy tree ([CVE-2023-0464])
|
H A D | CHANGES.md | 1474 * Limited the number of nodes created in a policy tree to mitigate 1475 against CVE-2023-0464. The default limit is set to 1000 nodes, which 1478 time define to a desired maximum number of nodes or zero to allow 4254 the associated device nodes being available. This behaviour can be 4520 * Reimplement -newreq-nodes and ERR_error_string_n; the 12480 * New function X509_POLICY_NODE_print() which prints out policy nodes. 15334 * New '-newreq-nodes' command option to CA.pl. This is like 15335 '-newreq', but calls 'openssl req' with the '-nodes' option
|
Completed in 73 milliseconds