Searched refs:policies (Results 1 - 21 of 21) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/
H A Dx509_vpm.c80 if (param->policies)
82 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
83 param->policies = NULL;
189 if (test_x509_verify_param_copy(policies, NULL))
191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
257 if (!param->policies)
259 param->policies = sk_ASN1_OBJECT_new_null();
260 if (!param->policies)
263 if (!sk_ASN1_OBJECT_push(param->policies, policy))
269 STACK_OF(ASN1_OBJECT) *policies)
268 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument
[all...]
H A Dx509_vfy.h173 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
492 STACK_OF(ASN1_OBJECT) *policies);
H A Dx509_vfy.c323 /* If we get this far evaluate policies */
858 ctx->param->policies, ctx->param->flags);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/
H A Dx509_vpm.c147 if (param->policies) {
148 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
149 param->policies = NULL;
300 if (test_x509_verify_param_copy(policies, NULL)) {
301 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
422 if (!param->policies) {
423 param->policies = sk_ASN1_OBJECT_new_null();
424 if (!param->policies)
427 if (!sk_ASN1_OBJECT_push(param->policies, policy))
433 STACK_OF(ASN1_OBJECT) *policies)
432 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument
[all...]
H A Dx509_vfy.h175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
588 STACK_OF(ASN1_OBJECT) *policies);
H A Dx509_vfy.c502 /* If we get this far evaluate policies */
1630 ctx->param->policies, ctx->param->flags);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/
H A Dx509_vpm.c147 if (param->policies) {
148 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
149 param->policies = NULL;
300 if (test_x509_verify_param_copy(policies, NULL)) {
301 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
422 if (!param->policies) {
423 param->policies = sk_ASN1_OBJECT_new_null();
424 if (!param->policies)
427 if (!sk_ASN1_OBJECT_push(param->policies, policy))
433 STACK_OF(ASN1_OBJECT) *policies)
432 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument
[all...]
H A Dx509_vfy.h175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
588 STACK_OF(ASN1_OBJECT) *policies);
H A Dx509_vfy.c502 /* If we get this far evaluate policies */
1630 ctx->param->policies, ctx->param->flags);
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/miscutils/
H A Dchrt.c18 } policies[] = { variable in typeref:struct:__anon19860
31 printf(fmt, policies[pol].name, min, max);
34 printf(fmt, policies[pol].name);
99 pid, state, policies[pol].name);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/
H A Dpcy_cache.c76 CERTIFICATEPOLICIES *policies, int crit)
83 if (sk_POLICYINFO_num(policies) == 0)
88 for (i = 0; i < sk_POLICYINFO_num(policies); i++) {
89 policy = sk_POLICYINFO_value(policies, i);
115 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
144 * don't have any policies.
168 * no point continuing because the valid policies will be NULL.
75 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/
H A Dpcy_cache.c74 CERTIFICATEPOLICIES *policies, int crit)
81 if (sk_POLICYINFO_num(policies) == 0)
86 for (i = 0; i < sk_POLICYINFO_num(policies); i++)
88 policy = sk_POLICYINFO_value(policies, i);
119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
150 * even if we don't have any policies.
176 * there is no point continuing because the valid policies will be
73 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/
H A Dpcy_cache.c76 CERTIFICATEPOLICIES *policies, int crit)
83 if (sk_POLICYINFO_num(policies) == 0)
88 for (i = 0; i < sk_POLICYINFO_num(policies); i++) {
89 policy = sk_POLICYINFO_value(policies, i);
115 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
144 * don't have any policies.
168 * no point continuing because the valid policies will be NULL.
75 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_conf.c335 char *policies = NCONF_get_string(conf, section, local
338 if (policies && !(list = X509V3_parse_list(policies))) {
H A Dts_rsp_sign.c194 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free);
261 if (!ctx->policies && !(ctx->policies = sk_ASN1_OBJECT_new_null()))
265 if (!sk_ASN1_OBJECT_push(ctx->policies, copy))
452 /* Checking acceptable policies. */
564 /* Returns the TSA policy based on the requested and acceptable policies. */
583 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) {
584 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
H A Dts.h268 policies SEQUENCE OF PolicyInformation OPTIONAL
502 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx
503 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts_conf.c335 char *policies = NCONF_get_string(conf, section, local
338 if (policies && !(list = X509V3_parse_list(policies))) {
H A Dts_rsp_sign.c194 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free);
261 if (!ctx->policies && !(ctx->policies = sk_ASN1_OBJECT_new_null()))
265 if (!sk_ASN1_OBJECT_push(ctx->policies, copy))
452 /* Checking acceptable policies. */
564 /* Returns the TSA policy based on the requested and acceptable policies. */
583 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) {
584 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
H A Dts.h268 policies SEQUENCE OF PolicyInformation OPTIONAL
502 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx
503 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dx509_vfy.h173 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
492 STACK_OF(ASN1_OBJECT) *policies);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/
H A Djre-1_5_0_15-linux-i586.bin152 http://www.sun.com/policies/trademarks. Any use you make of
[all...]

Completed in 254 milliseconds