Home
last modified time | relevance | path

Searched refs:policy (Results 1 – 25 of 68) sorted by relevance

123

/openssl/crypto/x509/
H A Dv3_pci.c78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci()
141 memcpy(&(*policy)->data[(*policy)->length], in process_pci_value()
144 (*policy)->data[(*policy)->length] = '\0'; in process_pci_value()
185 memcpy(&(*policy)->data[(*policy)->length], buf, n); in process_pci_value()
187 (*policy)->data[(*policy)->length] = '\0'; in process_pci_value()
202 memcpy(&(*policy)->data[(*policy)->length], in process_pci_value()
205 (*policy)->data[(*policy)->length] = '\0'; in process_pci_value()
231 *policy = NULL; in process_pci_value()
302 pci->proxyPolicy->policy = policy; in r2i_pci()
303 policy = NULL; in r2i_pci()
[all …]
H A Dpcy_data.c38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument
44 if (policy == NULL && cid == NULL) in ossl_policy_data_new()
71 ret->valid_policy = policy->policyid; in ossl_policy_data_new()
72 policy->policyid = NULL; in ossl_policy_data_new()
75 if (policy) { in ossl_policy_data_new()
76 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new()
77 policy->qualifiers = NULL; in ossl_policy_data_new()
H A Dpcy_cache.c32 POLICYINFO *policy; in policy_cache_create() local
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
43 data = ossl_policy_data_new(policy, NULL, crit); in policy_cache_create()
H A Dv3_pcia.c52 ASN1_OPT(PROXY_POLICY, policy, ASN1_OCTET_STRING)
/openssl/doc/man3/
H A DSSL_set_incoming_stream_policy.pod8 policy
18 int SSL_set_incoming_stream_policy(SSL *conn, int policy,
23 SSL_set_incoming_stream_policy() policy changes the incoming stream policy for a
24 QUIC connection. Depending on the policy configured, OpenSSL QUIC may
31 B<STOP_SENDING> or B<RESET_STREAM> frames generated to implement the policy. The
34 The valid values for I<policy> are:
H A DX509_VERIFY_PARAM_set_flags.pod44 ASN1_OBJECT *policy);
101 X509_VERIFY_PARAM_add0_policy() adds B<policy> to the acceptable policy set.
103 policy checking.
105 X509_VERIFY_PARAM_set1_policies() enables policy checking (it is disabled
107 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
108 an existing policy set.
267 no policy checking is performed. Additional information is sent to the
268 verification callback relating to policy checking.
272 policy> and B<inhibit policy mapping> flags respectively as defined in
278 to examine the valid policy tree and perform additional checks or simply
[all …]
H A DCT_POLICY_EVAL_CTX_new.pod11 Encapsulates the data required to evaluate whether SCTs meet a Certificate Transparency policy
34 Certificate Timestamps (SCTs) fulfil a Certificate Transparency (CT) policy.
35 This policy may be, for example, that at least one valid SCT is available. To
61 CT_POLICY_EVAL_CTX_new_ex() creates an empty policy evaluation context
H A DSSL_CTX_set_ct_validation_callback.pod9 control Certificate Transparency policy
60 Therefore, in applications that delay SCT policy enforcement until after
65 register a custom callback that may implement a different policy than either of
/openssl/crypto/ts/
H A Dts_verify_ctx.c123 ASN1_OBJECT_free(ctx->policy); in TS_VERIFY_CTX_cleanup()
140 ASN1_OBJECT *policy; in TS_REQ_to_TS_VERIFY_CTX() local
154 if ((policy = req->policy_id) != NULL) { in TS_REQ_to_TS_VERIFY_CTX()
155 if ((ret->policy = OBJ_dup(policy)) == NULL) in TS_REQ_to_TS_VERIFY_CTX()
H A Dts_rsp_sign.c33 ASN1_OBJECT *policy);
194 if ((copy = OBJ_dup(policy)) == NULL) { in TS_RESP_CTX_add_policy()
371 ASN1_OBJECT *policy; in TS_RESP_create_response() local
391 if ((policy = ts_RESP_get_policy(ctx)) == NULL) in TS_RESP_create_response()
499 ASN1_OBJECT *policy = NULL; in ts_RESP_get_policy() local
507 policy = ctx->default_policy; in ts_RESP_get_policy()
513 policy = current; in ts_RESP_get_policy()
515 if (policy == NULL) { in ts_RESP_get_policy()
521 return policy; in ts_RESP_get_policy()
526 ASN1_OBJECT *policy) in ts_RESP_create_tst_info() argument
[all …]
H A Dts_req_utils.c79 int TS_REQ_set_policy_id(TS_REQ *a, const ASN1_OBJECT *policy) in TS_REQ_set_policy_id() argument
83 if (a->policy_id == policy) in TS_REQ_set_policy_id()
85 new_policy = OBJ_dup(policy); in TS_REQ_set_policy_id()
H A Dts_conf.c288 const char *policy, TS_RESP_CTX *ctx) in TS_CONF_set_def_policy() argument
293 if (policy == NULL) in TS_CONF_set_def_policy()
294 policy = NCONF_get_string(conf, section, ENV_DEFAULT_POLICY); in TS_CONF_set_def_policy()
295 if (policy == NULL) { in TS_CONF_set_def_policy()
299 if ((policy_obj = OBJ_txt2obj(policy, 0)) == NULL) { in TS_CONF_set_def_policy()
H A Dts_rsp_utils.c68 int TS_TST_INFO_set_policy_id(TS_TST_INFO *a, ASN1_OBJECT *policy) in TS_TST_INFO_set_policy_id() argument
72 if (a->policy_id == policy) in TS_TST_INFO_set_policy_id()
74 new_policy = OBJ_dup(policy); in TS_TST_INFO_set_policy_id()
/openssl/apps/
H A Dts.c40 const EVP_MD *md, const char *policy, int no_nonce,
43 const char *policy, int no_nonce, int cert);
52 const char *policy, const char *in, int token_in,
58 const char *chain, const char *policy);
167 char *data = NULL, *digest = NULL, *policy = NULL; in ts_main() local
229 policy = opt_arg(); in ts_main()
323 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main()
398 const char *policy, int no_nonce, in query_command() argument
479 if (policy && (policy_obj = txt2obj(policy)) == NULL) in create_query()
701 const char *chain, const char *policy) in create_response() argument
[all …]
H A Dca.c98 STACK_OF(CONF_VALUE) *policy, CA_DB *db,
110 STACK_OF(CONF_VALUE) *policy, CA_DB *db,
119 STACK_OF(CONF_VALUE) *policy, CA_DB *db,
282 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local
381 policy = opt_arg(); in ca_main()
830 if (policy == NULL in ca_main()
835 BIO_printf(bio_err, "policy is %s\n", policy); in ca_main()
921 if ((attribs = NCONF_get_section(conf, policy)) == NULL) { in ca_main()
1339 STACK_OF(CONF_VALUE) *policy, CA_DB *db, in certify()
1397 STACK_OF(CONF_VALUE) *policy, CA_DB *db, in certify_cert()
[all …]
H A Dopenssl-vms.cnf50 # Refer to the OpenSSL security policy for more information.
120 policy = policy_match
122 # For the CA policy
131 # For the 'anything' policy
302 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
H A Dopenssl.cnf50 # Refer to the OpenSSL security policy for more information.
120 policy = policy_match
122 # For the CA policy
131 # For the 'anything' policy
302 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
/openssl/doc/man7/
H A Dproxy-certificates.pod66 proxyCertInfo = critical,language:id-ppl-anyLanguage,pathlen:1,policy:text:AB
75 policy = text:BC
77 The policy value has a specific syntax, I<syntag>:I<string>, where the
87 policy=text:räksmörgås
94 policy=hex:72:E4:6B:73:6D:F6:72:67:E5:73
98 indicates that the text of the policy should be taken from a file.
104 Note that the proxy policy value is what determines the rights granted
149 so you must be careful to do the proxy policy interpretation at the
212 * It's REALLY important you keep the proxy policy check
272 process_rights((char *) pci->proxyPolicy->policy->data,
[all …]
/openssl/test/
H A Dtest.cnf27 policy = policy_match
29 # For the CA policy
38 # For the 'anything' policy
H A Dproxy.cnf28 proxyCertInfo = critical,language:id-ppl-anyLanguage,pathlen:1,policy:text:AB
60 policy = text:BC
/openssl/test/recipes/90-test_includes_data/conf-includes/
H A Dincludes2.cnf1 # For the CA policy
10 # For the 'anything' policy
/openssl/doc/HOWTO/
H A Ddocumenting-functions-and-macros.md6 turned into an official [documentation-policy]. This policy is actively
9 [documentation-policy]: https://www.openssl.org/policies/technical/documentation-policy.html
/openssl/include/openssl/
H A Dx509_vfy.h.in335 /* Enable policy checking */
337 /* Policy variable require-explicit-policy */
339 /* Policy variable inhibit-any-policy */
341 /* Policy variable inhibit-policy-mapping */
343 /* Notify callback that policy is OK */
376 /* Internal use: mask of policy related options */
724 ASN1_OBJECT *policy);
762 #define X509_PCY_TREE_FAILURE -2 /* Failure to satisfy explicit policy */
770 #define X509_PCY_TREE_VALID 1 /* The policy tree is valid */
771 #define X509_PCY_TREE_EMPTY 2 /* The policy tree is empty */
[all …]
/openssl/
H A DCONTRIBUTING.md70 4. Code provided should follow our [coding style] and [documentation policy]
81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
/openssl/doc/man1/
H A Dopenssl-verification-options.pod26 and ending in a certificate that due to some policy is trusted.
430 =item B<-policy> I<arg>
432 Enable policy processing and add I<arg> to the user-initial-policy-set (see
433 RFC5280). The policy I<arg> can be an object name or an OID in numeric form.
438 Set policy variable require-explicit-policy (see RFC5280).
442 Enables certificate policy processing.
446 Print out diagnostics related to policy processing.
450 Set policy variable inhibit-any-policy (see RFC5280).
454 Set policy variable inhibit-policy-mapping (see RFC5280).
500 Supported policy names include: B<default>, B<pkcs7>, B<smime_sign>,

Completed in 53 milliseconds

123