Go to the documentation of this file.
151 pols = sk_POLICYINFO_new_null();
162 for (
i = 0;
i < sk_CONF_VALUE_num(
vals);
i++) {
163 cnf = sk_CONF_VALUE_value(
vals,
i);
170 if (!strcmp(pstr,
"ia5org")) {
173 }
else if (*pstr ==
'@') {
182 pol = policy_section(
ctx, polsect, ia5org);
200 if (!sk_POLICYINFO_push(pols, pol)) {
223 for (
i = 0;
i < sk_CONF_VALUE_num(polstrs);
i++) {
224 cnf = sk_CONF_VALUE_value(polstrs,
i);
225 if (!strcmp(cnf->
name,
"policyIdentifier")) {
235 if (!pol->qualifiers)
236 pol->qualifiers = sk_POLICYQUALINFO_new_null();
239 if (!sk_POLICYQUALINFO_push(pol->qualifiers, qual))
255 if (*cnf->
value !=
'@') {
267 qual = notice_section(
ctx, unot, ia5org);
271 if (!pol->qualifiers)
272 pol->qualifiers = sk_POLICYQUALINFO_new_null();
273 if (!sk_POLICYQUALINFO_push(pol->qualifiers, qual))
316 for (
i = 0;
i < sk_CONF_VALUE_num(unot);
i++) {
317 cnf = sk_CONF_VALUE_value(unot,
i);
318 if (!strcmp(cnf->
name,
"explicitText")) {
325 }
else if (!strcmp(cnf->
name,
"organization")) {
340 }
else if (!strcmp(cnf->
name,
"noticeNumbers")) {
350 if (!nos || !sk_CONF_VALUE_num(nos)) {
355 ret = nref_nos(nref->noticenos, nos);
389 for (
i = 0;
i < sk_CONF_VALUE_num(nos);
i++) {
390 cnf = sk_CONF_VALUE_value(nos,
i);
395 if (!sk_ASN1_INTEGER_push(nnums, aint))
414 for (
i = 0;
i < sk_POLICYINFO_num(pol);
i++) {
415 pinfo = sk_POLICYINFO_value(pol,
i);
419 if (pinfo->qualifiers)
420 print_qualifiers(
out, pinfo->qualifiers,
indent + 2);
430 for (
i = 0;
i < sk_POLICYQUALINFO_num(quals);
i++) {
431 qualinfo = sk_POLICYQUALINFO_value(quals,
i);
460 ref->organization->length,
ref->organization->data);
462 sk_ASN1_INTEGER_num(
ref->noticenos) > 1 ?
"s" :
"");
463 for (
i = 0;
i < sk_ASN1_INTEGER_num(
ref->noticenos);
i++) {
466 num = sk_ASN1_INTEGER_value(
ref->noticenos,
i);
496 if (dat->qualifier_set)
497 print_qualifiers(
out, dat->qualifier_set,
indent + 2);
#define X509V3_R_NO_POLICY_IDENTIFIER
#define ASN1_OPT(stname, field, type)
#define X509V3_R_NEED_ORGANIZATION_AND_NUMBERS
OPENSSL_EXPORT ASN1_VISIBLESTRING * ASN1_VISIBLESTRING_new(void)
int(* X509V3_EXT_I2R)(const struct v3_ext_method *method, void *ext, BIO *out, int indent)
void *(* X509V3_EXT_R2I)(const struct v3_ext_method *method, struct v3_ext_ctx *ctx, const char *str)
#define OPENSSL_PUT_ERROR(library, reason)
#define X509V3_get_section
#define ASN1_ITEM_ref(name)
#define X509V3_conf_err(val)
#define X509V3_R_INVALID_OPTION
#define X509V3_R_INVALID_NUMBER
OPENSSL_EXPORT void X509_POLICY_NODE_print(BIO *out, X509_POLICY_NODE *node, int indent)
#define IMPLEMENT_ASN1_FUNCTIONS(stname)
#define ASN1_TFLG_SEQUENCE_OF
static STACK_OF(POLICYINFO)
const X509_POLICY_DATA * data
#define X509V3_R_INVALID_NUMBERS
ASN1_ITEM_TEMPLATE(CERTIFICATEPOLICIES)
ASN1_STRING * organization
#define NID_id_qt_unotice
#define V_ASN1_VISIBLESTRING
#define X509V3_section_free
#define ASN1_ADB_TEMPLATE(name)
#define ASN1_SEQUENCE_OF(stname, field, type)
#define ERR_R_INTERNAL_ERROR
#define ASN1_SEQUENCE(tname)
#define X509V3_R_INVALID_OBJECT_IDENTIFIER
OPENSSL_EXPORT void ASN1_INTEGER_free(ASN1_INTEGER *str)
static int i2r_certpol(X509V3_EXT_METHOD *method, STACK_OF(POLICYINFO) *pol, BIO *out, int indent)
#define ASN1_EX_TEMPLATE_TYPE(flags, tag, name, type)
#define node_data_critical(data)
ASN1_SEQUENCE_END(X509_NAME_ENTRY)
#define X509V3_parse_list
ASN1_OBJECT * valid_policy
#define X509V3_R_EXPECTED_A_SECTION_NAME
#define POLICYQUALINFO_new
UniquePtr< SSL_SESSION > ret
#define X509V3_R_INVALID_SECTION
union POLICYQUALINFO_st::@372 d
OPENSSL_EXPORT ASN1_IA5STRING * ASN1_IA5STRING_new(void)
#define ASN1_ADB_OBJECT(tblname)
#define POLICYQUALINFO_free
#define X509V3_R_INVALID_POLICY_IDENTIFIER
#define ASN1_SEQUENCE_OF_OPT(stname, field, type)
#define ASN1_ADB_END(name, flags, field, app_table, def, none)
#define NID_certificate_policies
#define ASN1_ITEM_TEMPLATE_END(tname)
#define ERR_R_MALLOC_FAILURE
#define ADB_ENTRY(val, template)
const X509V3_EXT_METHOD v3_cpols
#define ASN1_SIMPLE(stname, field, type)
grpc
Author(s):
autogenerated on Fri May 16 2025 03:00:50