Home
last modified time | relevance | path

Searched refs:leaf (Results 1 – 20 of 20) sorted by relevance

/openssl/include/crypto/
H A Dsparse_array.h47 void (*leaf)(ossl_uintmax_t, type *)) \
50 (void (*)(ossl_uintmax_t, void *))leaf); \
54 void (*leaf)(ossl_uintmax_t, type *, void *), \
58 (void (*)(ossl_uintmax_t, void *, void *))leaf, arg); \
83 void ossl_sa_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, void *));
85 void (*leaf)(ossl_uintmax_t, void *, void *), void *);
/openssl/crypto/
H A Dsparse_array.c66 void (*leaf)(ossl_uintmax_t, void *, void *), void *arg) in sa_doall()
92 } else if (leaf != NULL) { in sa_doall()
93 (*leaf)(idx, p[n], arg); in sa_doall()
134 void ossl_sa_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t, void *)) in ossl_sa_doall()
138 tramp.func = leaf; in ossl_sa_doall()
144 void (*leaf)(ossl_uintmax_t, void *, void *), in ossl_sa_doall_arg()
148 sa_doall(sa, NULL, leaf, arg); in ossl_sa_doall_arg()
H A DREADME-sparse_array.md8 tree contains a block of pointers to either the user supplied leaf values or
109 along a path from the root of the tree to an added leaf will be allocated.
H A Dsparccpuid.S153 be 1f ! could have been a leaf function...
/openssl/doc/internal/man3/
H A DOPENSSL_SA.pod23 void ossl_sa_TYPE_doall(const OPENSSL_SA *sa, void (*leaf)(ossl_uintmax_t,
26 void (*leaf)(ossl_uintmax_t, void *, void *),
69 B<ossl_sa_I<TYPE>_doall>() calls the function I<leaf> for each element in I<sa>
71 of each item is passed as the first argument to the leaf function and a
74 B<ossl_sa_I<TYPE>_doall_arg>() calls the function I<leaf> for each element in
76 array, of each item is passed as the first argument to the leaf function,
/openssl/test/
H A Dcrltest.c253 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() argument
271 || !TEST_true(X509_STORE_CTX_init(ctx, store, leaf, NULL))) in verify()
H A Ddanetest.in49 ## -- Anonymous and "never valid" leaf certificate DANE-EE(3) tests
1392 # Wrong leaf digest
H A Dsslapitest.c568 char *leaf = test_mk_file_path(certsdir, "leaf.pem"); in test_client_cert_verify_cb() local
582 if (!TEST_int_eq(SSL_CTX_use_certificate_chain_file(sctx, leaf), 1) in test_client_cert_verify_cb()
635 OPENSSL_free(leaf); in test_client_cert_verify_cb()
/openssl/test/recipes/80-test_cmp_http_data/Mock/
H A Dsigner.crt1 Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = leaf
H A Dtest.cnf31 subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf"
/openssl/doc/man1/
H A Dopenssl-verify.pod.in118 problem was detected starting with zero for the target ("leaf") certificate
H A Dopenssl-verification-options.pod158 The target or "leaf" certificate, as well as any other untrusted certificates,
160 All certificates except the target or "leaf" must also be valid CA certificates.
H A Dopenssl-cmp.pod.in437 This chain excludes the leaf certificate, i.e., the newly enrolled certificate.
/openssl/doc/man7/
H A Dossl-guide-tls-server-block.pod113 * not only the leaf (end-entity) server certificate, but also any
114 * intermediate issuer-CA certificates. The leaf certificate must be the
H A Dossl-guide-migration.pod2490 leaf certificate is signed with SHA-1, a call to L<SSL_CTX_use_certificate(3)>
/openssl/doc/man3/
H A DSSL_CTX_dane_enable.pod97 0 if an EE TLSA record directly matched the leaf certificate, or a positive
H A DX509_VERIFY_PARAM_set_flags.pod248 B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf
H A DOSSL_CMP_CTX_new.pod653 This chain excludes the leaf certificate, i.e., the newly enrolled certificate.
/openssl/
H A DNEWS.md405 * Fixed handling of invalid certificate policies in leaf certificates
H A DCHANGES.md914 extended key usage of the leaf certificate according to the CA/Browser Forum.
1208 * Fixed an issue where invalid certificate policies in leaf certificates are
7166 bypassed, such as the CA flag, enabling them to use a valid leaf
8328 bypassed, such as the CA flag, enabling them to use a valid leaf

Completed in 118 milliseconds