Searched refs:chain (Results 1 - 25 of 35) sorted by relevance

12

/barrelfish-master/lib/phoenix/
H A Dlist.h102 static inline void list_insert_after(list_ent* chain, list_ent* toadd) argument
104 toadd->li_prev = chain;
105 toadd->li_next = chain->li_next;
106 chain->li_next->li_prev = toadd;
107 chain->li_next = toadd;
110 static inline void list_insert_before(list_ent* chain, list_ent* toadd) argument
112 toadd->li_next = chain;
113 toadd->li_prev = chain->li_prev;
114 chain->li_prev->li_next = toadd;
115 chain
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/
H A Docsp_vfy.c66 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigned long flags);
79 STACK_OF(X509) *chain = NULL;
117 chain = X509_STORE_CTX_get1_chain(&ctx);
132 /* At this point we have a valid certificate chain
135 ret = ocsp_check_issuer(bs, chain, flags);
145 x = sk_X509_value(chain, sk_X509_num(chain) - 1);
157 if(chain) sk_X509_pop_free(chain, X509_free);
212 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigne argument
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/
H A Dx509_vfy.c171 /* first we make sure the chain we are going to build is
173 if (ctx->chain == NULL)
175 if ( ((ctx->chain=sk_X509_new_null()) == NULL) ||
176 (!sk_X509_push(ctx->chain,ctx->cert)))
193 num=sk_X509_num(ctx->chain);
194 x=sk_X509_value(ctx->chain,num-1);
211 /* If we were passed a cert chain, use it first */
217 if (!sk_X509_push(ctx->chain,xtmp))
227 /* reparse the full chain for
235 /* at this point, chain shoul
1783 X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) argument
2000 X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain) argument
[all...]
H A Dx509_vfy.h114 certificate chain.
181 * validation. Once we have a certificate chain, the 'verify'
182 * function is then called to actually check the cert chain. */
199 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */
228 * gathering of the cert chain can take some time (and have to be
237 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */
248 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */
258 int valid; /* if 0, rebuild chain */
260 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_dd.c104 int cms_DigestedData_do_final(CMS_ContentInfo *cms, BIO *chain, int verify) argument
115 if (!cms_DigestAlgorithm_find_ctx(&mctx, chain, dd->digestAlgorithm))
H A Dcms_lib.c388 /* Locate a message digest content from a BIO chain based on SignerInfo */
390 int cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, argument
401 chain = BIO_find_type(chain, BIO_TYPE_MD);
402 if (chain == NULL)
408 BIO_get_md_ctx(chain, &mtmp);
418 chain = BIO_next(chain);
H A Dcms_sd.c620 CMS_SignerInfo *si, BIO *chain)
633 if (!cms_DigestAlgorithm_find_ctx(&mctx, chain, si->digestAlgorithm))
685 int cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain) argument
694 if (!cms_SignerInfo_content_sign(cms, si, chain))
809 /* Create a chain of digest BIOs from a CMS ContentInfo */
815 BIO *chain = NULL; local
829 if (chain)
830 BIO_push(chain, mdbio);
832 chain = mdbio;
834 return chain;
619 cms_SignerInfo_content_sign(CMS_ContentInfo *cms, CMS_SignerInfo *si, BIO *chain) argument
841 CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain) argument
[all...]
H A Dcms_lcl.h428 int cms_DigestedData_do_final(CMS_ContentInfo *cms, BIO *chain, int verify);
431 int cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain);
443 int cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain,
H A Dcms.h258 int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain);
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/
H A Dts_rsp_verify.c68 X509 *signer, STACK_OF(X509) **chain);
69 static int TS_check_signing_certs(PKCS7_SIGNER_INFO *si, STACK_OF(X509) *chain);
147 STACK_OF(X509) *chain = NULL;
190 if (!TS_verify_cert(store, certs, signer, &chain)) goto err;
194 if (!TS_check_signing_certs(si, chain)) goto err;
221 sk_X509_pop_free(chain, X509_free);
228 * The certificate chain is returned in chain. Caller is responsible for
232 X509 *signer, STACK_OF(X509) **chain)
238 /* chain i
231 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument
262 TS_check_signing_certs(PKCS7_SIGNER_INFO *si, STACK_OF(X509) *chain) argument
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/
H A Dv3_asid.c704 STACK_OF(X509) *chain,
711 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0);
718 * set up for walking up the chain.
725 x = sk_X509_value(chain, i);
754 * Now walk up the chain. Extensions must be in canonical form, no
757 for (i++; i < sk_X509_num(chain); i++) {
758 x = sk_X509_value(chain, i);
823 return v3_asid_validate_path_internal(ctx, ctx->chain, NULL);
828 * Test whether chain cover
703 v3_asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) argument
[all...]
H A Dv3_addr.c1170 STACK_OF(X509) *chain,
1177 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0);
1184 * set up for walking up the chain.
1191 x = sk_X509_value(chain, i);
1206 * Now walk up the chain. No cert may list resources that its
1209 for (i++; i < sk_X509_num(chain); i++) {
1210 x = sk_X509_value(chain, i);
1273 return v3_addr_validate_path_internal(ctx, ctx->chain, NULL);
1278 * Test whether chain cover
1169 v3_addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, IPAddrBlocks *ext) argument
[all...]
H A Dx509v3.h850 int v3_asid_validate_resource_set(STACK_OF(X509) *chain,
853 int v3_addr_validate_resource_set(STACK_OF(X509) *chain,
/barrelfish-master/usr/eclipseclp/documents/internal/kernel/
H A Dgc.tex145 are linked into a chain starting at this target object (cf. figure \ref{relch}).
146 The chain pointer of course overwrites at least a part of the original
149 is the last cell of the relocation chain. It originally contained a pointer, and
155 own relocation chain and at the same time be a member of its target's
156 chain. Morris' algorithm \cite{morris} solves this problem by
164 objects's relocation chain, linking all references to this object.
165 \item the {\em value} cell may be the member of another chain, starting
172 At the end of the Mark\&Link phase there is a relocation chain
175 The last cell of the relocation chain preserves the original tag
185 \caption{Building a relocation chain}
[all...]
H A Dumscmacros.tex107 chain, if there is any.
118 the whole reference chain and changes the value of {\tt ref}
119 so that it points to the chain end.
120 If {\tt ref} or the end of the reference chain is a free variable,
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Dts.c99 char *signer, char *chain, const char *policy,
105 char *signer, char *chain, const char *policy);
148 char *chain = NULL; local
263 else if (strcmp(*argv, "-chain") == 0)
266 chain = *++argv;
351 password, inkey, signer, chain, policy,
379 "[-chain certs_file.pem] [-policy object_id] "
675 char *signer, char *chain, const char *policy,
706 passin, inkey, signer, chain,
802 char *signer, char *chain, cons
673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A Dpkcs12.c82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
109 int chain = 0; local
152 else if (!strcmp (*args, "-chain")) chain = 1;
281 BIO_printf (bio_err, "-chain add certificate chain\n");
436 chain = 0;
514 CRYPTO_push_info("building chain");
517 /* If chaining get chain from user cert */
518 if (chain) {
827 get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument
[all...]
/barrelfish-master/usr/eclipseclp/Kernel/src/
H A Dproc_desc.c335 * Add/delete a descriptor from a general-purpose descriptor chain
339 add_proc_to_chain(pri *p, proc_duet **chain) argument
346 gd->next = *chain;
347 *chain = gd;
351 delete_proc_from_chain(pri *p, proc_duet **chain) argument
356 current_gd = *chain;
360 { /* found, so delete it from the chain */
361 *chain = current_gd->next;
365 chain = &current_gd->next;
1186 else /* else chain i
[all...]
H A Dbip_module.c733 Add 'module' to the chain of module pointed to by '*scan'.
734 The module is added at the beginning of the chain.
901 delete_duet_from_chain(dident the_name, didlist **chain) argument
905 current_duet = *chain;
910 *chain = current_duet->next;
914 chain = &(current_duet->next);
/barrelfish-master/include/openssl/
H A Dx509_vfy.h114 certificate chain.
181 * validation. Once we have a certificate chain, the 'verify'
182 * function is then called to actually check the cert chain. */
199 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */
228 * gathering of the cert chain can take some time (and have to be
237 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */
248 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */
258 int valid; /* if 0, rebuild chain */
260 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st
[all...]
H A Dcms.h258 int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain);
H A Dx509v3.h850 int v3_asid_validate_resource_set(STACK_OF(X509) *chain,
853 int v3_addr_validate_resource_set(STACK_OF(X509) *chain,
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Ds3_both.c331 /* TLSv1 sends a chain with nothing in it, instead of an alert */
357 for (i=0; i < sk_X509_num(xs_ctx.chain); i++)
359 x = sk_X509_value(xs_ctx.chain, i);
H A Dd1_both.c1020 /* TLSv1 sends a chain with nothing in it, instead of an alert */
1040 for (i=0; i < sk_X509_num(xs_ctx.chain); i++)
1042 x = sk_X509_value(xs_ctx.chain, i);
/barrelfish-master/usr/eclipseclp/documents/embedding/
H A Dumscmacros.tex95 chain, if there is any.
106 the whole reference chain and changes the value of {\tt ref}
107 so that it points to the chain end.
108 If {\tt ref} or the end of the reference chain is a free variable,

Completed in 221 milliseconds

12