/freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/Utils/ |
H A D | AMDGPUDelayedMCExpr.cpp | 15 static msgpack::DocNode getNode(msgpack::DocNode DN, msgpack::Type Type, in getNode() argument 17 msgpack::Document *Doc = DN.getDocument(); in getNode() 30 void DelayedMCExprs::assignDocNode(msgpack::DocNode &DN, msgpack::Type Type, in assignDocNode() argument 35 DN = getNode(DN, Type, Res); in assignDocNode() 40 DelayedExprs.emplace_back(DN, Type, ExprValue); in assignDocNode() 53 DE.DN = getNode(DE.DN, DE.Type, Res); in resolveDelayedExpressions()
|
H A D | AMDGPUDelayedMCExpr.h | 20 msgpack::DocNode &DN; member 23 Expr(msgpack::DocNode &DN, msgpack::Type Type, const MCExpr *ExprValue) in Expr() 24 : DN(DN), Type(Type), ExprValue(ExprValue) {} in Expr() 31 void assignDocNode(msgpack::DocNode &DN, msgpack::Type Type,
|
/freebsd/contrib/bearssl/src/x509/ |
H A D | x509_minimal.t0 | 64 * -- Start of the issuer DN: the secondary hash engine is started, 65 * to process the encoded issuer DN. 67 * -- End of the issuer DN: the secondary hash engine is stopped. The 71 * -- Start of the subject DN: the secondary hash engine is started, 72 * to process the encoded subject DN. 77 * -- End of the subject DN: the secondary hash engine is stopped. The 84 * -- Otherwise, the hashed subject DN is compared with the saved 89 * contains the hash of the issuer DN for the current certificate, 90 * and current_dn_hash[] contains the hash of the subject DN for the 99 * DN are also compared with the "direct trust" keys; if the key [all …]
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | ossl_cmp_hdr_init.pod | 65 is the NULL-DN. 72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings). 113 to the client it set to the NULL-DN. In this case for identification at least 128 ossl_cmp_general_name_is_NULL_DN() returns 1 given a NULL-DN, else 0.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_check_host.pod | 91 to consider the subject DN even if the certificate contains at least 93 address as appropriate); the default is to ignore the subject DN 97 consider the subject DN even if the certificate contains no subject alternative 99 is to use the subject DN when no corresponding subject alternative names are 103 precedence and the subject DN is not checked for matching names.
|
H A D | X509V3_set_ctx.pod | 26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>.
|
H A D | OSSL_CMP_validate_msg.pod | 34 where a candidate is acceptable only if has not expired, its subject DN matches 35 the I<msg> sender DN (as far as present), and its subject key identifier
|
H A D | OSSL_CMP_CTX_new.pod | 427 OSSL_CMP_CTX_set1_expected_sender() sets the Distinguished Name (DN) 504 and no subject DN is set via OSSL_CMP_CTX_set1_subjectName() 505 then the sender field will contain the NULL-DN 521 as far as any of those is present, else the NULL-DN as last resort. 547 OSSL_CMP_CTX_set1_subjectName() sets the subject DN that will be used in 549 (KUR), it defaults to the subject DN of the reference certificate, 562 If set and the subject DN is not set with OSSL_CMP_CTX_set1_subjectName() then 564 subject DN from the reference certificate. 565 If a subject DN is desired it needs to be set explicitly with 581 deriving default subject DN, public key, Subject Alternative Names, and the [all …]
|
H A D | OSSL_CMP_MSG_get0_header.pod | 50 The subject DN included in the certificate template is 56 if it is the NULL-DN (i.e., any empty sequence of RDNs), no subject is included,
|
H A D | X509_cmp.pod | 34 This procedure adheres to the matching rules for Distinguished Names (DN)
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-namedisplay-options.pod | 16 OpenSSL provides fine-grain control over how the subject and issuer DN's are 28 The DN output format can be fine tuned with the following flags. 145 Reverse the fields of the DN as required by RFC 2253.
|
H A D | openssl-ca.pod.in | 259 Normally the DN order of a certificate is the same as the order of the 267 The DN of a certificate can contain the EMAIL field if present in the 268 request DN, however, it is good policy just having the e-mail set into 303 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN). 565 from the DN of the certificate simply set this to 'no'. If not present 566 the default is to allow for the EMAIL filed in the certificate's DN. 613 certificate DN fields. If the value is "match" then the field value 628 the SPKAC and also the required DN components as name value pairs. 707 email_in_dn = no # Don't add the email into cert DN 764 enforce the absence of the EMAIL field within the DN, as suggested by
|
H A D | openssl-cmp.pod.in | 271 X509 Distinguished Name (DN) of subject to use in the requested certificate 273 If the NULL-DN (C<"/">) is given then no subject is placed in the template. 274 Default is the subject DN of any PKCS#10 CSR given with the B<-csr> option. 275 For KUR, a further fallback is the subject DN 280 the subject DN is used as fallback sender of outgoing CMP messages. 285 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN). 294 X509 issuer Distinguished Name (DN) of the CA server 296 If the NULL-DN (C<"/">) is given then no issuer is placed in the template. 299 the issuer DN is used as fallback recipient of outgoing CMP messages. 420 deriving default subject DN and Subject Alternative Names and the [all …]
|
H A D | openssl-storeutl.pod.in | 94 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
|
/freebsd/sys/contrib/device-tree/Bindings/phy/ |
H A D | mxs-usb-phy.txt | 20 that terminates the DN output signal. Default: 45
|
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/AsmPrinter/ |
H A D | DwarfDebug.cpp | 1985 for (const DINode *DN : SP->getRetainedNodes()) { in collectEntityInfo() local 1986 const auto *LS = getRetainedNodeScope(DN); in collectEntityInfo() 1987 if (isa<DILocalVariable>(DN) || isa<DILabel>(DN)) { in collectEntityInfo() 1988 if (!Processed.insert(InlinedEntity(DN, nullptr)).second) in collectEntityInfo() 1992 createConcreteEntity(TheCU, *LexS, DN, nullptr); in collectEntityInfo() 1994 LocalDeclsPerLS[LS].insert(DN); in collectEntityInfo() 2314 for (const DINode *DN : SP->getRetainedNodes()) { in endFunctionImpl() local 2315 const auto *LS = getRetainedNodeScope(DN); in endFunctionImpl() 2319 if (isa<DILocalVariable>(DN) || isa<DILabel>(DN)) { in endFunctionImpl() 2321 if (!Processed.insert(InlinedEntity(DN, nullptr)).second || in endFunctionImpl() [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Passes/ |
H A D | StandardInstrumentations.cpp | 1795 DotCfgDiffNode(const DotCfgDiffNode &DN) in DotCfgDiffNode() argument 1796 : Graph(DN.Graph), N(DN.N), Data{DN.Data[0], DN.Data[1]}, in DotCfgDiffNode() 1797 Colour(DN.Colour), EdgesMap(DN.EdgesMap), Children(DN.Children), 1798 Edges(DN.Edges) {}
|
/freebsd/usr.bin/tip/ |
H A D | README | 11 DEC DN-11/Able Quadracall DN11
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Utils/ |
H A D | Debugify.cpp | 325 for (const DINode *DN : SP->getRetainedNodes()) { in collectDebugInfoMetadata() local 326 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in collectDebugInfoMetadata() 571 for (const DINode *DN : SP->getRetainedNodes()) { in checkDebugInfoMetadata() local 572 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in checkDebugInfoMetadata()
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ocsp.asn1 | 24 issuerNameHash OCTET STRING, -- Hash of Issuer's DN
|
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/ |
H A D | RDFLiveness.cpp | 521 NodeId DN = DA.Addr->getReachedDef(); in computePhiInfo() local 522 while (DN != 0) { in computePhiInfo() 523 NodeAddr<DefNode *> A = DFG.addr<DefNode *>(DN); in computePhiInfo() 532 DN = A.Addr->getSibling(); in computePhiInfo()
|
/freebsd/contrib/llvm-project/clang/lib/Sema/ |
H A D | SemaCoroutine.cpp | 36 DeclarationName DN = S.PP.getIdentifierInfo(Name); in lookupMember() local 37 LookupResult LR(S, DN, Loc, Sema::LookupMemberName); in lookupMember() 1251 DeclarationName DN = in makeReturnOnAllocFailure() local 1253 LookupResult Found(S, DN, Loc, Sema::LookupMemberName); in makeReturnOnAllocFailure() 1275 << DN; in makeReturnOnAllocFailure()
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.t0 | 912 \ Client certificate: start a new anchor DN (length is 16-bit). 923 \ Client certificate: push some data for current anchor DN. 934 \ Client certificate: end current anchor DN. 942 \ Client certificate: end list of anchor DN. 1031 \ Parse list of anchor DN. 1038 \ We read the DN by chunks through the pad, so
|
/freebsd/crypto/openssl/test/ |
H A D | CAtsa.cnf | 39 preserve = no # keep passed DN ordering
|
/freebsd/contrib/llvm-project/llvm/lib/Target/BPF/ |
H A D | BTFDebug.cpp | 609 for (const DINode *DN : SP->getRetainedNodes()) { in processDISubprogram() local 610 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in processDISubprogram() 1202 for (const DINode *DN : SP->getRetainedNodes()) { in beginFunctionImpl() local 1203 if (const auto *DV = dyn_cast<DILocalVariable>(DN)) { in beginFunctionImpl()
|