Home
last modified time | relevance | path

Searched refs:policies (Results 1 – 25 of 35) sorted by relevance

12

/openssl/crypto/x509/
H A Dx509_vpm.c188 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit()
333 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy()
334 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy()
335 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy()
339 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy()
356 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies()
357 param->policies = NULL; in X509_VERIFY_PARAM_set1_policies()
361 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_set1_policies()
362 if (param->policies == NULL) in X509_VERIFY_PARAM_set1_policies()
365 for (i = 0; i < sk_ASN1_OBJECT_num(policies); i++) { in X509_VERIFY_PARAM_set1_policies()
[all …]
H A Dpcy_cache.c27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument
34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create()
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
75 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
H A Dx509_local.h30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
/openssl/crypto/ts/
H A Dts_rsp_sign.c130 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free()
189 if (ctx->policies == NULL in TS_RESP_CTX_add_policy()
190 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) { in TS_RESP_CTX_add_policy()
198 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) { in TS_RESP_CTX_add_policy()
510 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy()
511 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
H A Dts_conf.c317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local
320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
/openssl/
H A DCONTRIBUTING.md43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html>
80 [coding style]: https://openssl-library.org/policies/technical/coding-style/
81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
/openssl/test/
H A DCAtsa.cnf137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
/openssl/crypto/cmp/
H A Dcmp_ctx.c240 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free()
511 if (ctx->policies == NULL in DEFINE_OSSL_set1_certs()
512 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in DEFINE_OSSL_set1_certs()
515 return sk_POLICYINFO_push(ctx->policies, pinfo); in DEFINE_OSSL_set1_certs()
H A Dcmp_msg.c340 if (ctx->policies != NULL in OSSL_CMP_CTX_setup_CRM()
342 ctx->setPoliciesCritical, ctx->policies)) in OSSL_CMP_CTX_setup_CRM()
H A Dcmp_local.h117 CERTIFICATEPOLICIES *policies; /* policies to be included in extensions */ member
/openssl/test/recipes/80-test_cmp_http_data/Mock/
H A Dtest.cnf11 policies = certificatePolicies
/openssl/.github/workflows/
H A Dinterop-tests.yml32 fips-mode-setup crypto-policies-scripts
/openssl/doc/man3/
H A DOSSL_CMP_MSG_get0_header.pod98 Finally, policies are overridden by any policies included in I<ctx> via
H A DX509_VERIFY_PARAM_set_flags.pod46 STACK_OF(ASN1_OBJECT) *policies);
106 by default) and sets the acceptable policy set to B<policies>. Any existing
107 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
H A DX509_STORE_CTX_set_verify_cb.pod209 /* print out policies */
H A DX509_STORE_set_verify_cb_func.pod191 X509_STORE_set_check_policy() sets the function to check the policies
/openssl/doc/HOWTO/
H A Dcertificates.txt48 policies). A certificate request is sent to a certificate authority
66 policies) and usually waits for payment from you. Once that is
H A Ddocumenting-functions-and-macros.md9 [documentation-policy]: https://www.openssl.org/policies/technical/documentation-policy.html
/openssl/doc/man7/
H A Dproxy-certificates.pod99 The string is then a filename. This is useful for policies that are
106 application to interpret and combine these policies.>
133 To interpret proxy policies, the application would normally start with
/openssl/test/certs/
H A Dsetup.sh475 ./mkcert.sh geneeextra server.example ee-key ee-cert-policies ca-key ca-cert "certificatePolicies=1…
477 ./mkcert.sh geneeextra server.example ee-key ee-cert-policies-bad ca-key ca-cert "certificatePolici…
/openssl/doc/man1/
H A Dopenssl-verification-options.pod196 L<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/>.
494 Use default verification policies like trust model and required certificate
495 policies identified by I<name>.
H A Dopenssl-cmp.pod.in34 [B<-policies> I<name>]
363 =item B<-policies> I<name>
365 Name of section in OpenSSL config file defining policies to be set
373 to add as certificate policies request extension.
374 This option cannot be used together with B<-policies>.
378 Flag the policies given with B<-policy_oids> as critical.
/openssl/apps/
H A Dopenssl-vms.cnf323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
H A Dopenssl.cnf323 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)

Completed in 139 milliseconds

12