/openssl/crypto/x509/ |
H A D | x509_vpm.c | 188 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 333 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 334 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 335 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 339 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 356 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() 357 param->policies = NULL; in X509_VERIFY_PARAM_set1_policies() 361 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_set1_policies() 362 if (param->policies == NULL) in X509_VERIFY_PARAM_set1_policies() 365 for (i = 0; i < sk_ASN1_OBJECT_num(policies); i++) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 75 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
H A D | x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
|
/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 130 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 189 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 190 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) { in TS_RESP_CTX_add_policy() 198 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) { in TS_RESP_CTX_add_policy() 510 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 511 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
H A D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
|
/openssl/ |
H A D | CONTRIBUTING.md | 43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html> 80 [coding style]: https://openssl-library.org/policies/technical/coding-style/ 81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
|
/openssl/test/ |
H A D | CAtsa.cnf | 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 240 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free() 511 if (ctx->policies == NULL in DEFINE_OSSL_set1_certs() 512 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in DEFINE_OSSL_set1_certs() 515 return sk_POLICYINFO_push(ctx->policies, pinfo); in DEFINE_OSSL_set1_certs()
|
H A D | cmp_msg.c | 340 if (ctx->policies != NULL in OSSL_CMP_CTX_setup_CRM() 342 ctx->setPoliciesCritical, ctx->policies)) in OSSL_CMP_CTX_setup_CRM()
|
H A D | cmp_local.h | 117 CERTIFICATEPOLICIES *policies; /* policies to be included in extensions */ member
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 11 policies = certificatePolicies
|
/openssl/.github/workflows/ |
H A D | interop-tests.yml | 32 fips-mode-setup crypto-policies-scripts
|
/openssl/doc/man3/ |
H A D | OSSL_CMP_MSG_get0_header.pod | 98 Finally, policies are overridden by any policies included in I<ctx> via
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 46 STACK_OF(ASN1_OBJECT) *policies); 106 by default) and sets the acceptable policy set to B<policies>. Any existing 107 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
|
H A D | X509_STORE_CTX_set_verify_cb.pod | 209 /* print out policies */
|
H A D | X509_STORE_set_verify_cb_func.pod | 191 X509_STORE_set_check_policy() sets the function to check the policies
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 48 policies). A certificate request is sent to a certificate authority 66 policies) and usually waits for payment from you. Once that is
|
H A D | documenting-functions-and-macros.md | 9 [documentation-policy]: https://www.openssl.org/policies/technical/documentation-policy.html
|
/openssl/doc/man7/ |
H A D | proxy-certificates.pod | 99 The string is then a filename. This is useful for policies that are 106 application to interpret and combine these policies.> 133 To interpret proxy policies, the application would normally start with
|
/openssl/test/certs/ |
H A D | setup.sh | 475 ./mkcert.sh geneeextra server.example ee-key ee-cert-policies ca-key ca-cert "certificatePolicies=1… 477 ./mkcert.sh geneeextra server.example ee-key ee-cert-policies-bad ca-key ca-cert "certificatePolici…
|
/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 196 L<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/>. 494 Use default verification policies like trust model and required certificate 495 policies identified by I<name>.
|
H A D | openssl-cmp.pod.in | 34 [B<-policies> I<name>] 363 =item B<-policies> I<name> 365 Name of section in OpenSSL config file defining policies to be set 373 to add as certificate policies request extension. 374 This option cannot be used together with B<-policies>. 378 Flag the policies given with B<-policy_oids> as critical.
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
H A D | openssl.cnf | 323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|