Loading crypto/x509v3/pcy_cache.c +2 −0 Original line number Diff line number Diff line Loading @@ -232,6 +232,7 @@ static int policy_cache_new(X509 *x) } #if 0 void policy_cache_free(X509_POLICY_CACHE *cache) { if (!cache) Loading @@ -242,6 +243,7 @@ void policy_cache_free(X509_POLICY_CACHE *cache) sk_X509_POLICY_DATA_pop_free(cache->data, policy_data_free); OPENSSL_free(cache); } #endif const X509_POLICY_CACHE *policy_cache_set(X509 *x) { Loading crypto/x509v3/pcy_lib.c +2 −0 Original line number Diff line number Diff line Loading @@ -139,12 +139,14 @@ const ASN1_OBJECT *X509_policy_node_get0_policy(const X509_POLICY_NODE *node) return node->data->valid_policy; } #if 0 int X509_policy_node_get_critical(const X509_POLICY_NODE *node) { if (node_critical(node)) return 1; return 0; } #endif STACK_OF(POLICYQUALIFIER) * X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) Loading crypto/x509v3/pcy_map.c +1 −1 Original line number Diff line number Diff line Loading @@ -75,7 +75,7 @@ static void policy_map_free(X509_POLICY_REF *map) OPENSSL_free(map); } X509_POLICY_REF *policy_map_find(X509_POLICY_CACHE *cache, ASN1_OBJECT *id) static X509_POLICY_REF *policy_map_find(X509_POLICY_CACHE *cache, ASN1_OBJECT *id) { X509_POLICY_REF tmp; int idx; Loading crypto/x509v3/pcy_tree.c +2 −2 Original line number Diff line number Diff line Loading @@ -81,11 +81,11 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, X509 *x; int ret = 1; int i, n; *ptree = NULL; n = sk_X509_num(certs); int explicit_policy; int any_skip; int map_skip; *ptree = NULL; n = sk_X509_num(certs); /* Disable policy mapping for now... */ flags |= X509_V_FLAG_INHIBIT_MAP; Loading Loading
crypto/x509v3/pcy_cache.c +2 −0 Original line number Diff line number Diff line Loading @@ -232,6 +232,7 @@ static int policy_cache_new(X509 *x) } #if 0 void policy_cache_free(X509_POLICY_CACHE *cache) { if (!cache) Loading @@ -242,6 +243,7 @@ void policy_cache_free(X509_POLICY_CACHE *cache) sk_X509_POLICY_DATA_pop_free(cache->data, policy_data_free); OPENSSL_free(cache); } #endif const X509_POLICY_CACHE *policy_cache_set(X509 *x) { Loading
crypto/x509v3/pcy_lib.c +2 −0 Original line number Diff line number Diff line Loading @@ -139,12 +139,14 @@ const ASN1_OBJECT *X509_policy_node_get0_policy(const X509_POLICY_NODE *node) return node->data->valid_policy; } #if 0 int X509_policy_node_get_critical(const X509_POLICY_NODE *node) { if (node_critical(node)) return 1; return 0; } #endif STACK_OF(POLICYQUALIFIER) * X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) Loading
crypto/x509v3/pcy_map.c +1 −1 Original line number Diff line number Diff line Loading @@ -75,7 +75,7 @@ static void policy_map_free(X509_POLICY_REF *map) OPENSSL_free(map); } X509_POLICY_REF *policy_map_find(X509_POLICY_CACHE *cache, ASN1_OBJECT *id) static X509_POLICY_REF *policy_map_find(X509_POLICY_CACHE *cache, ASN1_OBJECT *id) { X509_POLICY_REF tmp; int idx; Loading
crypto/x509v3/pcy_tree.c +2 −2 Original line number Diff line number Diff line Loading @@ -81,11 +81,11 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, X509 *x; int ret = 1; int i, n; *ptree = NULL; n = sk_X509_num(certs); int explicit_policy; int any_skip; int map_skip; *ptree = NULL; n = sk_X509_num(certs); /* Disable policy mapping for now... */ flags |= X509_V_FLAG_INHIBIT_MAP; Loading