Home
last modified time | relevance | path

Searched refs:nodes (Results 1 – 21 of 21) sorted by relevance

/openssl/crypto/x509/
H A Dpcy_node.c28 X509_POLICY_NODE *ossl_policy_tree_find_sk(STACK_OF(X509_POLICY_NODE) *nodes, in ossl_policy_tree_find_sk() argument
38 idx = sk_X509_POLICY_NODE_find(nodes, &l); in ossl_policy_tree_find_sk()
39 return sk_X509_POLICY_NODE_value(nodes, idx); in ossl_policy_tree_find_sk()
49 for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { in ossl_policy_level_find_node()
50 node = sk_X509_POLICY_NODE_value(level->nodes, i); in ossl_policy_level_find_node()
83 if (level->nodes == NULL) in ossl_policy_level_add_node()
84 level->nodes = ossl_policy_node_cmp_new(); in ossl_policy_level_add_node()
85 if (level->nodes == NULL) { in ossl_policy_level_add_node()
89 if (!sk_X509_POLICY_NODE_push(level->nodes, node)) { in ossl_policy_level_add_node()
120 (void) sk_X509_POLICY_NODE_pop(level->nodes); in ossl_policy_level_add_node()
H A Dpcy_tree.c74 sk_X509_POLICY_NODE_value(plev->nodes, i); in tree_print()
382 node = sk_X509_POLICY_NODE_value(last->nodes, i); in tree_link_any()
407 STACK_OF(X509_POLICY_NODE) *nodes; in tree_prune()
410 nodes = curr->nodes; in tree_prune()
413 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune()
418 (void)sk_X509_POLICY_NODE_delete(nodes, i); in tree_prune()
425 nodes = curr->nodes; in tree_prune()
427 node = sk_X509_POLICY_NODE_value(nodes, i); in tree_prune()
667 STACK_OF(X509_POLICY_NODE) *nodes, *auth_nodes = NULL; in X509_policy_check()
714 nodes = X509_policy_tree_get0_user_policies(tree); in X509_policy_check()
[all …]
H A Dpcy_lib.c67 if (level->nodes) in X509_policy_level_node_count()
68 n += sk_X509_POLICY_NODE_num(level->nodes); in X509_policy_level_node_count()
81 return sk_X509_POLICY_NODE_value(level->nodes, i); in X509_policy_level_get0_node()
H A Dpcy_local.h103 STACK_OF(X509_POLICY_NODE) *nodes;
/openssl/demos/certs/apps/
H A Dmkxcerts.sh13 -config apps.cnf -extensions usr_cert -x509 -nodes \
16 -config apps.cnf -extensions usr_cert -x509 -nodes \
19 -config apps.cnf -extensions usr_cert -x509 -nodes \
28 -config apps.cnf -extensions ec_cert -x509 -nodes \
29 -nodes -keyout tecp256.pem -out tecp256.pem -newkey ec:ecp256.pem \
33 -config apps.cnf -extensions ec_cert -x509 -nodes \
34 -nodes -keyout tecp384.pem -out tecp384.pem -newkey ec:ecp384.pem \
H A Dmkacerts.sh12 CN="OpenSSL Test Root CA" opensslcmd req -config apps.cnf -x509 -nodes \
15 CN="OpenSSL Test Intermediate CA" opensslcmd req -config apps.cnf -nodes \
21 CN="Test Client Cert" opensslcmd req -config apps.cnf -nodes \
28 CN="Test Server Cert" opensslcmd req -config apps.cnf -nodes \
35 CN="Test Server Cert #2" opensslcmd req -config apps.cnf -nodes \
/openssl/crypto/
H A Dsparse_array.c55 void **nodes; member
69 void *nodes[SA_BLOCK_MAX_LEVELS]; in sa_doall() local
74 nodes[0] = sa->nodes; in sa_doall()
77 void ** const p = nodes[l]; in sa_doall()
90 nodes[l] = p[n]; in sa_doall()
165 p = sa->nodes; in ossl_sa_get()
196 p[0] = sa->nodes; in ossl_sa_set()
197 sa->nodes = p; in ossl_sa_set()
202 p = sa->nodes; in ossl_sa_set()
H A DREADME-sparse_array.md108 The nodes themselves are allocated in a sparse manner. Only nodes which exist
110 The complexity is hidden and nodes are allocated on an as needed basis.
115 NULL. The data structure does not attempt to reclaim nodes or reduce the
/openssl/demos/certs/
H A Dmkcerts.sh13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \
16 CN="Test Intermediate CA" opensslcmd req -config ca.cnf -nodes \
23 CN="Test Server Cert" opensslcmd req -config ca.cnf -nodes \
30 CN="Test Client Cert" opensslcmd req -config ca.cnf -nodes \
37 CN="Test Revoked Cert" opensslcmd req -config ca.cnf -nodes \
44 CN="Test OCSP Responder Cert" opensslcmd req -config ca.cnf -nodes \
/openssl/test/recipes/25-test_eai_data/
H A Dkdc.sh10 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-root-key.pem \
36 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-key.pem \
/openssl/util/perl/OpenSSL/
H A Dparamnames.pm644 my $nodes = 0;
663 $nodes++;
/openssl/apps/
H A DCA.pl.in126 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
144 } elsif ($WHAT =~ /^\-newreq(\-nodes)?$/ ) {
/openssl/demos/sslecho/
H A DA-SSL-Docs.txt15 openssl req -newkey rsa:4096 -x509 -sha256 -days 3650 -nodes -out cert.pem -keyout key.pem
/openssl/doc/man1/
H A DCA.pl.pod17 B<-newreq-nodes> |
76 =item B<-newreq-nodes>
H A Dopenssl-pkcs12.pod.in44 [B<-nodes>]
224 =item B<-nodes>
487 The B<-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
H A Dopenssl-req.pod.in28 [B<-nodes>]
250 =item B<-nodes>
845 The <-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
/openssl/doc/man3/
H A DRAND_add.pod68 chroot(2) jail without the associated device nodes being available. When
H A DOPENSSL_LH_COMPFUNC.pod229 number of nodes. Setting this value to 0 disables hash table contraction.
/openssl/apps/lib/
H A Dapps.c2084 static void nodes_print(const char *name, STACK_OF(X509_POLICY_NODE) *nodes) in nodes_print() argument
2090 if (nodes) { in nodes_print()
2092 for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++) { in nodes_print()
2093 node = sk_X509_POLICY_NODE_value(nodes, i); in nodes_print()
/openssl/
H A DNEWS.md424 * Limited the number of nodes created in a policy tree ([CVE-2023-0464])
H A DCHANGES.md1259 * Limited the number of nodes created in a policy tree to mitigate
1260 against CVE-2023-0464. The default limit is set to 1000 nodes, which
1263 time define to a desired maximum number of nodes or zero to allow
4038 the associated device nodes being available. This behaviour can be
4304 * Reimplement -newreq-nodes and ERR_error_string_n; the
12264 * New function X509_POLICY_NODE_print() which prints out policy nodes.
15118 * New '-newreq-nodes' command option to CA.pl. This is like
15119 '-newreq', but calls 'openssl req' with the '-nodes' option

Completed in 129 milliseconds