/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x509_vpm.c | 80 if (param->policies) 82 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 83 param->policies = NULL; 189 if (test_x509_verify_param_copy(policies, NULL)) 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 257 if (!param->policies) 259 param->policies = sk_ASN1_OBJECT_new_null(); 260 if (!param->policies) 263 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 269 STACK_OF(ASN1_OBJECT) *policies) 268 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
H A D | x509_vfy.h | 173 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 492 STACK_OF(ASN1_OBJECT) *policies);
|
H A D | x509_vfy.c | 323 /* If we get this far evaluate policies */ 858 ctx->param->policies, ctx->param->flags);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/ |
H A D | x509_vpm.c | 147 if (param->policies) { 148 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 149 param->policies = NULL; 300 if (test_x509_verify_param_copy(policies, NULL)) { 301 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 422 if (!param->policies) { 423 param->policies = sk_ASN1_OBJECT_new_null(); 424 if (!param->policies) 427 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 433 STACK_OF(ASN1_OBJECT) *policies) 432 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
H A D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 588 STACK_OF(ASN1_OBJECT) *policies);
|
H A D | x509_vfy.c | 502 /* If we get this far evaluate policies */ 1630 ctx->param->policies, ctx->param->flags);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/ |
H A D | x509_vpm.c | 147 if (param->policies) { 148 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 149 param->policies = NULL; 300 if (test_x509_verify_param_copy(policies, NULL)) { 301 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 422 if (!param->policies) { 423 param->policies = sk_ASN1_OBJECT_new_null(); 424 if (!param->policies) 427 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 433 STACK_OF(ASN1_OBJECT) *policies) 432 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
H A D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 588 STACK_OF(ASN1_OBJECT) *policies);
|
H A D | x509_vfy.c | 502 /* If we get this far evaluate policies */ 1630 ctx->param->policies, ctx->param->flags);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/miscutils/ |
H A D | chrt.c | 18 } policies[] = { variable in typeref:struct:__anon19860 31 printf(fmt, policies[pol].name, min, max); 34 printf(fmt, policies[pol].name); 99 pid, state, policies[pol].name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/ |
H A D | pcy_cache.c | 76 CERTIFICATEPOLICIES *policies, int crit) 83 if (sk_POLICYINFO_num(policies) == 0) 88 for (i = 0; i < sk_POLICYINFO_num(policies); i++) { 89 policy = sk_POLICYINFO_value(policies, i); 115 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 144 * don't have any policies. 168 * no point continuing because the valid policies will be NULL. 75 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | pcy_cache.c | 74 CERTIFICATEPOLICIES *policies, int crit) 81 if (sk_POLICYINFO_num(policies) == 0) 86 for (i = 0; i < sk_POLICYINFO_num(policies); i++) 88 policy = sk_POLICYINFO_value(policies, i); 119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 150 * even if we don't have any policies. 176 * there is no point continuing because the valid policies will be 73 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/ |
H A D | pcy_cache.c | 76 CERTIFICATEPOLICIES *policies, int crit) 83 if (sk_POLICYINFO_num(policies) == 0) 88 for (i = 0; i < sk_POLICYINFO_num(policies); i++) { 89 policy = sk_POLICYINFO_value(policies, i); 115 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 144 * don't have any policies. 168 * no point continuing because the valid policies will be NULL. 75 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_conf.c | 335 char *policies = NCONF_get_string(conf, section, local 338 if (policies && !(list = X509V3_parse_list(policies))) {
|
H A D | ts_rsp_sign.c | 194 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); 261 if (!ctx->policies && !(ctx->policies = sk_ASN1_OBJECT_new_null())) 265 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) 452 /* Checking acceptable policies. */ 564 /* Returns the TSA policy based on the requested and acceptable policies. */ 583 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { 584 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
|
H A D | ts.h | 268 policies SEQUENCE OF PolicyInformation OPTIONAL 502 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 503 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_conf.c | 335 char *policies = NCONF_get_string(conf, section, local 338 if (policies && !(list = X509V3_parse_list(policies))) {
|
H A D | ts_rsp_sign.c | 194 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); 261 if (!ctx->policies && !(ctx->policies = sk_ASN1_OBJECT_new_null())) 265 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) 452 /* Checking acceptable policies. */ 564 /* Returns the TSA policy based on the requested and acceptable policies. */ 583 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { 584 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
|
H A D | ts.h | 268 policies SEQUENCE OF PolicyInformation OPTIONAL 502 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 503 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | x509_vfy.h | 173 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 492 STACK_OF(ASN1_OBJECT) *policies);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/ |
H A D | jre-1_5_0_15-linux-i586.bin | 152 http://www.sun.com/policies/trademarks. Any use you make of [all...] |