/barrelfish-master/lib/phoenix/ |
H A D | list.h | 102 static inline void list_insert_after(list_ent* chain, list_ent* toadd) argument 104 toadd->li_prev = chain; 105 toadd->li_next = chain->li_next; 106 chain->li_next->li_prev = toadd; 107 chain->li_next = toadd; 110 static inline void list_insert_before(list_ent* chain, list_ent* toadd) argument 112 toadd->li_next = chain; 113 toadd->li_prev = chain->li_prev; 114 chain->li_prev->li_next = toadd; 115 chain [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_vfy.c | 66 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigned long flags); 79 STACK_OF(X509) *chain = NULL; 117 chain = X509_STORE_CTX_get1_chain(&ctx); 132 /* At this point we have a valid certificate chain 135 ret = ocsp_check_issuer(bs, chain, flags); 145 x = sk_X509_value(chain, sk_X509_num(chain) - 1); 157 if(chain) sk_X509_pop_free(chain, X509_free); 212 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigne argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_vfy.c | 171 /* first we make sure the chain we are going to build is 173 if (ctx->chain == NULL) 175 if ( ((ctx->chain=sk_X509_new_null()) == NULL) || 176 (!sk_X509_push(ctx->chain,ctx->cert))) 193 num=sk_X509_num(ctx->chain); 194 x=sk_X509_value(ctx->chain,num-1); 211 /* If we were passed a cert chain, use it first */ 217 if (!sk_X509_push(ctx->chain,xtmp)) 227 /* reparse the full chain for 235 /* at this point, chain shoul 1783 X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) argument 2000 X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain) argument [all...] |
H A D | x509_vfy.h | 114 certificate chain. 181 * validation. Once we have a certificate chain, the 'verify' 182 * function is then called to actually check the cert chain. */ 199 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 228 * gathering of the cert chain can take some time (and have to be 237 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 248 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 258 int valid; /* if 0, rebuild chain */ 260 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_dd.c | 104 int cms_DigestedData_do_final(CMS_ContentInfo *cms, BIO *chain, int verify) argument 115 if (!cms_DigestAlgorithm_find_ctx(&mctx, chain, dd->digestAlgorithm))
|
H A D | cms_lib.c | 388 /* Locate a message digest content from a BIO chain based on SignerInfo */ 390 int cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, argument 401 chain = BIO_find_type(chain, BIO_TYPE_MD); 402 if (chain == NULL) 408 BIO_get_md_ctx(chain, &mtmp); 418 chain = BIO_next(chain);
|
H A D | cms_sd.c | 620 CMS_SignerInfo *si, BIO *chain) 633 if (!cms_DigestAlgorithm_find_ctx(&mctx, chain, si->digestAlgorithm)) 685 int cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain) argument 694 if (!cms_SignerInfo_content_sign(cms, si, chain)) 809 /* Create a chain of digest BIOs from a CMS ContentInfo */ 815 BIO *chain = NULL; local 829 if (chain) 830 BIO_push(chain, mdbio); 832 chain = mdbio; 834 return chain; 619 cms_SignerInfo_content_sign(CMS_ContentInfo *cms, CMS_SignerInfo *si, BIO *chain) argument 841 CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain) argument [all...] |
H A D | cms_lcl.h | 428 int cms_DigestedData_do_final(CMS_ContentInfo *cms, BIO *chain, int verify); 431 int cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain); 443 int cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain,
|
H A D | cms.h | 258 int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_rsp_verify.c | 68 X509 *signer, STACK_OF(X509) **chain); 69 static int TS_check_signing_certs(PKCS7_SIGNER_INFO *si, STACK_OF(X509) *chain); 147 STACK_OF(X509) *chain = NULL; 190 if (!TS_verify_cert(store, certs, signer, &chain)) goto err; 194 if (!TS_check_signing_certs(si, chain)) goto err; 221 sk_X509_pop_free(chain, X509_free); 228 * The certificate chain is returned in chain. Caller is responsible for 232 X509 *signer, STACK_OF(X509) **chain) 238 /* chain i 231 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument 262 TS_check_signing_certs(PKCS7_SIGNER_INFO *si, STACK_OF(X509) *chain) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_asid.c | 704 STACK_OF(X509) *chain, 711 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0); 718 * set up for walking up the chain. 725 x = sk_X509_value(chain, i); 754 * Now walk up the chain. Extensions must be in canonical form, no 757 for (i++; i < sk_X509_num(chain); i++) { 758 x = sk_X509_value(chain, i); 823 return v3_asid_validate_path_internal(ctx, ctx->chain, NULL); 828 * Test whether chain cover 703 v3_asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) argument [all...] |
H A D | v3_addr.c | 1170 STACK_OF(X509) *chain, 1177 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0); 1184 * set up for walking up the chain. 1191 x = sk_X509_value(chain, i); 1206 * Now walk up the chain. No cert may list resources that its 1209 for (i++; i < sk_X509_num(chain); i++) { 1210 x = sk_X509_value(chain, i); 1273 return v3_addr_validate_path_internal(ctx, ctx->chain, NULL); 1278 * Test whether chain cover 1169 v3_addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, IPAddrBlocks *ext) argument [all...] |
H A D | x509v3.h | 850 int v3_asid_validate_resource_set(STACK_OF(X509) *chain, 853 int v3_addr_validate_resource_set(STACK_OF(X509) *chain,
|
/barrelfish-master/usr/eclipseclp/documents/internal/kernel/ |
H A D | gc.tex | 145 are linked into a chain starting at this target object (cf. figure \ref{relch}). 146 The chain pointer of course overwrites at least a part of the original 149 is the last cell of the relocation chain. It originally contained a pointer, and 155 own relocation chain and at the same time be a member of its target's 156 chain. Morris' algorithm \cite{morris} solves this problem by 164 objects's relocation chain, linking all references to this object. 165 \item the {\em value} cell may be the member of another chain, starting 172 At the end of the Mark\&Link phase there is a relocation chain 175 The last cell of the relocation chain preserves the original tag 185 \caption{Building a relocation chain} [all...] |
H A D | umscmacros.tex | 107 chain, if there is any. 118 the whole reference chain and changes the value of {\tt ref} 119 so that it points to the chain end. 120 If {\tt ref} or the end of the reference chain is a free variable,
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | ts.c | 99 char *signer, char *chain, const char *policy, 105 char *signer, char *chain, const char *policy); 148 char *chain = NULL; local 263 else if (strcmp(*argv, "-chain") == 0) 266 chain = *++argv; 351 password, inkey, signer, chain, policy, 379 "[-chain certs_file.pem] [-policy object_id] " 675 char *signer, char *chain, const char *policy, 706 passin, inkey, signer, chain, 802 char *signer, char *chain, cons 673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 109 int chain = 0; local 152 else if (!strcmp (*args, "-chain")) chain = 1; 281 BIO_printf (bio_err, "-chain add certificate chain\n"); 436 chain = 0; 514 CRYPTO_push_info("building chain"); 517 /* If chaining get chain from user cert */ 518 if (chain) { 827 get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument [all...] |
/barrelfish-master/usr/eclipseclp/Kernel/src/ |
H A D | proc_desc.c | 335 * Add/delete a descriptor from a general-purpose descriptor chain 339 add_proc_to_chain(pri *p, proc_duet **chain) argument 346 gd->next = *chain; 347 *chain = gd; 351 delete_proc_from_chain(pri *p, proc_duet **chain) argument 356 current_gd = *chain; 360 { /* found, so delete it from the chain */ 361 *chain = current_gd->next; 365 chain = ¤t_gd->next; 1186 else /* else chain i [all...] |
H A D | bip_module.c | 733 Add 'module' to the chain of module pointed to by '*scan'. 734 The module is added at the beginning of the chain. 901 delete_duet_from_chain(dident the_name, didlist **chain) argument 905 current_duet = *chain; 910 *chain = current_duet->next; 914 chain = &(current_duet->next);
|
/barrelfish-master/include/openssl/ |
H A D | x509_vfy.h | 114 certificate chain. 181 * validation. Once we have a certificate chain, the 'verify' 182 * function is then called to actually check the cert chain. */ 199 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 228 * gathering of the cert chain can take some time (and have to be 237 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 248 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 258 int valid; /* if 0, rebuild chain */ 260 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st [all...] |
H A D | cms.h | 258 int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain);
|
H A D | x509v3.h | 850 int v3_asid_validate_resource_set(STACK_OF(X509) *chain, 853 int v3_addr_validate_resource_set(STACK_OF(X509) *chain,
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | s3_both.c | 331 /* TLSv1 sends a chain with nothing in it, instead of an alert */ 357 for (i=0; i < sk_X509_num(xs_ctx.chain); i++) 359 x = sk_X509_value(xs_ctx.chain, i);
|
H A D | d1_both.c | 1020 /* TLSv1 sends a chain with nothing in it, instead of an alert */ 1040 for (i=0; i < sk_X509_num(xs_ctx.chain); i++) 1042 x = sk_X509_value(xs_ctx.chain, i);
|
/barrelfish-master/usr/eclipseclp/documents/embedding/ |
H A D | umscmacros.tex | 95 chain, if there is any. 106 the whole reference chain and changes the value of {\tt ref} 107 so that it points to the chain end. 108 If {\tt ref} or the end of the reference chain is a free variable,
|