Loading crypto/x509/x509_vfy.c +5 −0 Original line number Diff line number Diff line Loading @@ -2343,6 +2343,11 @@ STACK_OF(X509) *X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) return ctx->untrusted; } void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) { ctx->untrusted = sk; } void X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) { sk_X509_pop_free(ctx->chain, X509_free); Loading doc/crypto/X509_STORE_CTX_new.pod +5 −1 Original line number Diff line number Diff line Loading @@ -8,7 +8,7 @@ X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_chain, X509_STORE_CTX_set0_verified_chain, X509_STORE_CTX_get0_param, X509_STORE_CTX_set0_param, X509_STORE_CTX_get0_cert, X509_STORE_CTX_get0_untrusted, X509_STORE_CTX_get0_untrusted, X509_STORE_CTX_set0_untrusted, X509_STORE_CTX_get_num_untrusted, X509_STORE_CTX_set_default, X509_STORE_CTX_get_verify_cb, Loading Loading @@ -39,6 +39,7 @@ X509_STORE_CTX_get_verify - X509_STORE_CTX initialisation X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx); STACK_OF(X509)* X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx); void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); int X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx); Loading Loading @@ -101,6 +102,9 @@ certificate being verified by the B<ctx>. X509_STORE_CTX_get0_untrusted() retrieves an internal pointer to the stack of untrusted certifieds associated with B<ctx>. X509_STORE_CTX_set0_untrusted() sets the internal point to the stack of unstrusted certificates associated with B<ctx> to B<sk>. X509_STORE_CTX_set0_param() sets the internal verification parameter pointer to B<param>. After this call B<param> should not be used. Loading include/openssl/x509_vfy.h +1 −0 Original line number Diff line number Diff line Loading @@ -306,6 +306,7 @@ void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx); X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx); X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx); STACK_OF(X509)* X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx); void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); typedef int (*X509_STORE_CTX_verify_cb)(int, X509_STORE_CTX *); typedef int (*X509_STORE_CTX_verify)(X509_STORE_CTX *); void X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, Loading util/libcrypto.num +1 −0 Original line number Diff line number Diff line Loading @@ -4206,3 +4206,4 @@ X509_STORE_CTX_get_verify 4079 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_get_verify_cb 4080 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_get_cert 4081 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_set0_verified_chain 4082 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_set0_untrusted 4083 1_1_0 EXIST::FUNCTION: Loading
crypto/x509/x509_vfy.c +5 −0 Original line number Diff line number Diff line Loading @@ -2343,6 +2343,11 @@ STACK_OF(X509) *X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) return ctx->untrusted; } void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) { ctx->untrusted = sk; } void X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) { sk_X509_pop_free(ctx->chain, X509_free); Loading
doc/crypto/X509_STORE_CTX_new.pod +5 −1 Original line number Diff line number Diff line Loading @@ -8,7 +8,7 @@ X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_chain, X509_STORE_CTX_set0_verified_chain, X509_STORE_CTX_get0_param, X509_STORE_CTX_set0_param, X509_STORE_CTX_get0_cert, X509_STORE_CTX_get0_untrusted, X509_STORE_CTX_get0_untrusted, X509_STORE_CTX_set0_untrusted, X509_STORE_CTX_get_num_untrusted, X509_STORE_CTX_set_default, X509_STORE_CTX_get_verify_cb, Loading Loading @@ -39,6 +39,7 @@ X509_STORE_CTX_get_verify - X509_STORE_CTX initialisation X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx); STACK_OF(X509)* X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx); void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); int X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx); Loading Loading @@ -101,6 +102,9 @@ certificate being verified by the B<ctx>. X509_STORE_CTX_get0_untrusted() retrieves an internal pointer to the stack of untrusted certifieds associated with B<ctx>. X509_STORE_CTX_set0_untrusted() sets the internal point to the stack of unstrusted certificates associated with B<ctx> to B<sk>. X509_STORE_CTX_set0_param() sets the internal verification parameter pointer to B<param>. After this call B<param> should not be used. Loading
include/openssl/x509_vfy.h +1 −0 Original line number Diff line number Diff line Loading @@ -306,6 +306,7 @@ void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx); X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx); X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx); STACK_OF(X509)* X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx); void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); typedef int (*X509_STORE_CTX_verify_cb)(int, X509_STORE_CTX *); typedef int (*X509_STORE_CTX_verify)(X509_STORE_CTX *); void X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, Loading
util/libcrypto.num +1 −0 Original line number Diff line number Diff line Loading @@ -4206,3 +4206,4 @@ X509_STORE_CTX_get_verify 4079 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_get_verify_cb 4080 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_get_cert 4081 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_set0_verified_chain 4082 1_1_0 EXIST::FUNCTION: X509_STORE_CTX_set0_untrusted 4083 1_1_0 EXIST::FUNCTION: