Home
last modified time | relevance | path

Searched refs:DN (Results 1 – 25 of 60) sorted by relevance

123

/freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/Utils/
H A DAMDGPUDelayedMCExpr.cpp15 static msgpack::DocNode getNode(msgpack::DocNode DN, msgpack::Type Type, in getNode() argument
17 msgpack::Document *Doc = DN.getDocument(); in getNode()
30 void DelayedMCExprs::assignDocNode(msgpack::DocNode &DN, msgpack::Type Type, in assignDocNode() argument
35 DN = getNode(DN, Type, Res); in assignDocNode()
40 DelayedExprs.emplace_back(DN, Type, ExprValue); in assignDocNode()
53 DE.DN = getNode(DE.DN, DE.Type, Res); in resolveDelayedExpressions()
H A DAMDGPUDelayedMCExpr.h20 msgpack::DocNode &DN; member
23 Expr(msgpack::DocNode &DN, msgpack::Type Type, const MCExpr *ExprValue) in Expr()
24 : DN(DN), Type(Type), ExprValue(ExprValue) {} in Expr()
31 void assignDocNode(msgpack::DocNode &DN, msgpack::Type Type,
/freebsd/contrib/bearssl/src/x509/
H A Dx509_minimal.t064 * -- Start of the issuer DN: the secondary hash engine is started,
65 * to process the encoded issuer DN.
67 * -- End of the issuer DN: the secondary hash engine is stopped. The
71 * -- Start of the subject DN: the secondary hash engine is started,
72 * to process the encoded subject DN.
77 * -- End of the subject DN: the secondary hash engine is stopped. The
84 * -- Otherwise, the hashed subject DN is compared with the saved
89 * contains the hash of the issuer DN for the current certificate,
90 * and current_dn_hash[] contains the hash of the subject DN for the
99 * DN are also compared with the "direct trust" keys; if the key
[all …]
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_cmp_hdr_init.pod65 is the NULL-DN.
72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings).
113 to the client it set to the NULL-DN. In this case for identification at least
128 ossl_cmp_general_name_is_NULL_DN() returns 1 given a NULL-DN, else 0.
/freebsd/crypto/openssl/doc/man3/
H A DX509_check_host.pod91 to consider the subject DN even if the certificate contains at least
93 address as appropriate); the default is to ignore the subject DN
97 consider the subject DN even if the certificate contains no subject alternative
99 is to use the subject DN when no corresponding subject alternative names are
103 precedence and the subject DN is not checked for matching names.
H A DX509V3_set_ctx.pod26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>.
H A DOSSL_CMP_validate_msg.pod34 where a candidate is acceptable only if has not expired, its subject DN matches
35 the I<msg> sender DN (as far as present), and its subject key identifier
H A DOSSL_CMP_CTX_new.pod427 OSSL_CMP_CTX_set1_expected_sender() sets the Distinguished Name (DN)
504 and no subject DN is set via OSSL_CMP_CTX_set1_subjectName()
505 then the sender field will contain the NULL-DN
521 as far as any of those is present, else the NULL-DN as last resort.
547 OSSL_CMP_CTX_set1_subjectName() sets the subject DN that will be used in
549 (KUR), it defaults to the subject DN of the reference certificate,
562 If set and the subject DN is not set with OSSL_CMP_CTX_set1_subjectName() then
564 subject DN from the reference certificate.
565 If a subject DN is desired it needs to be set explicitly with
581 deriving default subject DN, public key, Subject Alternative Names, and the
[all …]
H A DOSSL_CMP_MSG_get0_header.pod50 The subject DN included in the certificate template is
56 if it is the NULL-DN (i.e., any empty sequence of RDNs), no subject is included,
H A DX509_cmp.pod34 This procedure adheres to the matching rules for Distinguished Names (DN)
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-namedisplay-options.pod16 OpenSSL provides fine-grain control over how the subject and issuer DN's are
28 The DN output format can be fine tuned with the following flags.
145 Reverse the fields of the DN as required by RFC 2253.
H A Dopenssl-ca.pod.in259 Normally the DN order of a certificate is the same as the order of the
267 The DN of a certificate can contain the EMAIL field if present in the
268 request DN, however, it is good policy just having the e-mail set into
303 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
565 from the DN of the certificate simply set this to 'no'. If not present
566 the default is to allow for the EMAIL filed in the certificate's DN.
613 certificate DN fields. If the value is "match" then the field value
628 the SPKAC and also the required DN components as name value pairs.
707 email_in_dn = no # Don't add the email into cert DN
764 enforce the absence of the EMAIL field within the DN, as suggested by
H A Dopenssl-cmp.pod.in271 X509 Distinguished Name (DN) of subject to use in the requested certificate
273 If the NULL-DN (C<"/">) is given then no subject is placed in the template.
274 Default is the subject DN of any PKCS#10 CSR given with the B<-csr> option.
275 For KUR, a further fallback is the subject DN
280 the subject DN is used as fallback sender of outgoing CMP messages.
285 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
294 X509 issuer Distinguished Name (DN) of the CA server
296 If the NULL-DN (C<"/">) is given then no issuer is placed in the template.
299 the issuer DN is used as fallback recipient of outgoing CMP messages.
420 deriving default subject DN and Subject Alternative Names and the
[all …]
H A Dopenssl-storeutl.pod.in94 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
/freebsd/sys/contrib/device-tree/Bindings/phy/
H A Dmxs-usb-phy.txt20 that terminates the DN output signal. Default: 45
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/AsmPrinter/
H A DDwarfDebug.cpp1985 for (const DINode *DN : SP->getRetainedNodes()) { in collectEntityInfo() local
1986 const auto *LS = getRetainedNodeScope(DN); in collectEntityInfo()
1987 if (isa<DILocalVariable>(DN) || isa<DILabel>(DN)) { in collectEntityInfo()
1988 if (!Processed.insert(InlinedEntity(DN, nullptr)).second) in collectEntityInfo()
1992 createConcreteEntity(TheCU, *LexS, DN, nullptr); in collectEntityInfo()
1994 LocalDeclsPerLS[LS].insert(DN); in collectEntityInfo()
2314 for (const DINode *DN : SP->getRetainedNodes()) { in endFunctionImpl() local
2315 const auto *LS = getRetainedNodeScope(DN); in endFunctionImpl()
2319 if (isa<DILocalVariable>(DN) || isa<DILabel>(DN)) { in endFunctionImpl()
2321 if (!Processed.insert(InlinedEntity(DN, nullptr)).second || in endFunctionImpl()
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Passes/
H A DStandardInstrumentations.cpp1795 DotCfgDiffNode(const DotCfgDiffNode &DN) in DotCfgDiffNode() argument
1796 : Graph(DN.Graph), N(DN.N), Data{DN.Data[0], DN.Data[1]}, in DotCfgDiffNode()
1797 Colour(DN.Colour), EdgesMap(DN.EdgesMap), Children(DN.Children),
1798 Edges(DN.Edges) {}
/freebsd/usr.bin/tip/
H A DREADME11 DEC DN-11/Able Quadracall DN11
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Utils/
H A DDebugify.cpp325 for (const DINode *DN : SP->getRetainedNodes()) { in collectDebugInfoMetadata() local
326 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in collectDebugInfoMetadata()
571 for (const DINode *DN : SP->getRetainedNodes()) { in checkDebugInfoMetadata() local
572 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in checkDebugInfoMetadata()
/freebsd/crypto/heimdal/lib/hx509/
H A Docsp.asn124 issuerNameHash OCTET STRING, -- Hash of Issuer's DN
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/
H A DRDFLiveness.cpp521 NodeId DN = DA.Addr->getReachedDef(); in computePhiInfo() local
522 while (DN != 0) { in computePhiInfo()
523 NodeAddr<DefNode *> A = DFG.addr<DefNode *>(DN); in computePhiInfo()
532 DN = A.Addr->getSibling(); in computePhiInfo()
/freebsd/contrib/llvm-project/clang/lib/Sema/
H A DSemaCoroutine.cpp36 DeclarationName DN = S.PP.getIdentifierInfo(Name); in lookupMember() local
37 LookupResult LR(S, DN, Loc, Sema::LookupMemberName); in lookupMember()
1251 DeclarationName DN = in makeReturnOnAllocFailure() local
1253 LookupResult Found(S, DN, Loc, Sema::LookupMemberName); in makeReturnOnAllocFailure()
1275 << DN; in makeReturnOnAllocFailure()
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_hs_client.t0912 \ Client certificate: start a new anchor DN (length is 16-bit).
923 \ Client certificate: push some data for current anchor DN.
934 \ Client certificate: end current anchor DN.
942 \ Client certificate: end list of anchor DN.
1031 \ Parse list of anchor DN.
1038 \ We read the DN by chunks through the pad, so
/freebsd/crypto/openssl/test/
H A DCAtsa.cnf39 preserve = no # keep passed DN ordering
/freebsd/contrib/llvm-project/llvm/lib/Target/BPF/
H A DBTFDebug.cpp609 for (const DINode *DN : SP->getRetainedNodes()) { in processDISubprogram() local
610 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in processDISubprogram()
1202 for (const DINode *DN : SP->getRetainedNodes()) { in beginFunctionImpl() local
1203 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in beginFunctionImpl()

123