• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/

Lines Matching refs:param

133 static void x509_verify_param_zero(X509_VERIFY_PARAM *param)
136 if (!param)
138 param->name = NULL;
139 param->purpose = 0;
140 param->trust = 0;
142 * param->inh_flags = X509_VP_FLAG_DEFAULT;
144 param->inh_flags = 0;
145 param->flags = 0;
146 param->depth = -1;
147 if (param->policies) {
148 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
149 param->policies = NULL;
151 paramid = param->id;
173 X509_VERIFY_PARAM *param;
176 param = OPENSSL_malloc(sizeof *param);
177 if (!param)
179 memset(param, 0, sizeof(*param));
183 OPENSSL_free(param);
193 param->id = paramid;
194 x509_verify_param_zero(param);
195 return param;
198 void X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param)
200 if (param == NULL)
202 x509_verify_param_zero(param);
203 OPENSSL_free(param->id);
204 OPENSSL_free(param);
368 int X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name)
370 if (param->name)
371 OPENSSL_free(param->name);
372 param->name = BUF_strdup(name);
373 if (param->name)
378 int X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags)
380 param->flags |= flags;
382 param->flags |= X509_V_FLAG_POLICY_CHECK;
386 int X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param,
389 param->flags &= ~flags;
393 unsigned long X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param)
395 return param->flags;
398 int X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose)
400 return X509_PURPOSE_set(&param->purpose, purpose);
403 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust)
405 return X509_TRUST_set(&param->trust, trust);
408 void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth)
410 param->depth = depth;
413 void X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t)
415 param->check_time = t;
416 param->flags |= X509_V_FLAG_USE_CHECK_TIME;
419 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param,
422 if (!param->policies) {
423 param->policies = sk_ASN1_OBJECT_new_null();
424 if (!param->policies)
427 if (!sk_ASN1_OBJECT_push(param->policies, policy))
432 int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param,
437 if (!param)
439 if (param->policies)
440 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
443 param->policies = NULL;
447 param->policies = sk_ASN1_OBJECT_new_null();
448 if (!param->policies)
456 if (!sk_ASN1_OBJECT_push(param->policies, doid)) {
461 param->flags |= X509_V_FLAG_POLICY_CHECK;
465 int X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param,
468 return int_x509_param_set_hosts(param->id, SET_HOST, name, namelen);
471 int X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param,
474 return int_x509_param_set_hosts(param->id, ADD_HOST, name, namelen);
477 void X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param,
480 param->id->hostflags = flags;
483 char *X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param)
485 return param->id->peername;
488 int X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param,
491 return int_x509_param_set1(&param->id->email, &param->id->emaillen,
495 int X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param,
500 return int_x509_param_set1((char **)&param->id->ip, &param->id->iplen,
504 int X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc)
512 return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen);
515 int X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param)
517 return param->depth;
520 const char *X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param)
522 return param->name;
604 int X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param)
613 idx = sk_X509_VERIFY_PARAM_find(param_table, param);
620 if (!sk_X509_VERIFY_PARAM_push(param_table, param))