Lines Matching defs:plc

92 	KMF_POLICY_RECORD oplc, plc;
94 (void) memset(&plc, 0, sizeof (KMF_POLICY_RECORD));
139 plc.name = get_string(optarg_av, &rv);
140 if (plc.name == NULL) {
146 plc.ignore_date = get_boolean(optarg_av);
147 if (plc.ignore_date == -1) {
156 plc.ignore_unknown_ekus =
158 if (plc.ignore_unknown_ekus == -1) {
167 plc.ignore_trust_anchor =
169 if (plc.ignore_trust_anchor == -1) {
178 plc.validity_adjusttime =
180 if (plc.validity_adjusttime == NULL) {
187 plc.validity_adjusttime,
199 plc.ta_name = get_string(optarg_av, &rv);
200 if (plc.ta_name == NULL) {
203 } else if (strcasecmp(plc.ta_name, "search")) {
206 if (kmf_dn_parser(plc.ta_name,
221 plc.ta_serial = get_string(optarg_av, &rv);
222 if (plc.ta_serial == NULL) {
230 (uchar_t *)plc.ta_serial,
248 plc.VAL_OCSP_RESPONDER_URI =
250 if (plc.VAL_OCSP_RESPONDER_URI == NULL) {
260 plc.VAL_OCSP_PROXY = get_string(optarg_av, &rv);
261 if (plc.VAL_OCSP_PROXY == NULL) {
270 plc.VAL_OCSP_URI_FROM_CERT =
272 if (plc.VAL_OCSP_URI_FROM_CERT == -1) {
282 plc.VAL_OCSP_RESP_LIFETIME =
284 if (plc.VAL_OCSP_RESP_LIFETIME == NULL) {
291 plc.VAL_OCSP_RESP_LIFETIME,
304 plc.VAL_OCSP_IGNORE_RESP_SIGN =
306 if (plc.VAL_OCSP_IGNORE_RESP_SIGN == -1) {
316 plc.VAL_OCSP_RESP_CERT_NAME =
318 if (plc.VAL_OCSP_RESP_CERT_NAME == NULL) {
325 plc.VAL_OCSP_RESP_CERT_NAME,
339 plc.VAL_OCSP_RESP_CERT_SERIAL =
341 if (plc.VAL_OCSP_RESP_CERT_SERIAL == NULL) {
349 plc.VAL_OCSP_RESP_CERT_SERIAL,
378 plc.VAL_CRL_BASEFILENAME =
380 if (plc.VAL_CRL_BASEFILENAME == NULL) {
389 plc.VAL_CRL_DIRECTORY =
391 if (plc.VAL_CRL_DIRECTORY == NULL) {
400 plc.VAL_CRL_GET_URI = get_boolean(optarg_av);
401 if (plc.VAL_CRL_GET_URI == -1) {
411 plc.VAL_CRL_PROXY = get_string(optarg_av, &rv);
412 if (plc.VAL_CRL_PROXY == NULL) {
421 plc.VAL_CRL_IGNORE_SIGN =
423 if (plc.VAL_CRL_IGNORE_SIGN == -1) {
433 plc.VAL_CRL_IGNORE_DATE =
435 if (plc.VAL_CRL_IGNORE_DATE == -1) {
455 plc.ku_bits = parseKUlist(optarg_av);
456 if (plc.ku_bits == 0) {
475 if (parseEKUNames(optarg_av, &plc) != 0) {
484 if (parseEKUOIDs(optarg_av, &plc) != 0) {
527 plc.mapper.options = get_string(optarg_av, &rv);
562 if (plc.name == NULL) {
568 strcmp(plc.name, KMF_DEFAULT_POLICY_NAME) == 0) {
587 ret = kmf_get_policy(filename, plc.name, &oplc);
591 plc.name);
597 oplc.ignore_date = plc.ignore_date;
600 oplc.ignore_unknown_ekus = plc.ignore_unknown_ekus;
603 oplc.ignore_trust_anchor = plc.ignore_trust_anchor;
609 plc.validity_adjusttime;
615 oplc.ta_name = plc.ta_name;
620 oplc.ta_serial = plc.ta_serial;
638 ((plc.mapper.options != NULL || oplc.mapper.options != NULL) &&
649 if (flags & KC_MAPPER_OPTIONS && plc.mapper.options != NULL)
650 free(plc.mapper.options);
655 plc.mapper.mapname = mapper_name;
657 plc.mapper.pathname = mapper_pathname;
659 plc.mapper.dir = mapper_dir;
662 UPDATE_IF_DIFFERENT(oplc.mapper.mapname, plc.mapper.mapname);
663 UPDATE_IF_DIFFERENT(oplc.mapper.pathname, plc.mapper.pathname);
664 UPDATE_IF_DIFFERENT(oplc.mapper.dir, plc.mapper.dir);
669 oplc.mapper.options = plc.mapper.options;
729 plc.VAL_OCSP_RESPONDER_URI;
735 oplc.VAL_OCSP_PROXY = plc.VAL_OCSP_PROXY;
740 plc.VAL_OCSP_URI_FROM_CERT;
746 plc.VAL_OCSP_RESP_LIFETIME;
751 plc.VAL_OCSP_IGNORE_RESP_SIGN;
757 plc.VAL_OCSP_RESP_CERT_NAME;
764 plc.VAL_OCSP_RESP_CERT_SERIAL;
824 plc.VAL_CRL_BASEFILENAME;
830 oplc.VAL_CRL_DIRECTORY = plc.VAL_CRL_DIRECTORY;
834 oplc.VAL_CRL_GET_URI = plc.VAL_CRL_GET_URI;
840 oplc.VAL_CRL_PROXY = plc.VAL_CRL_PROXY;
845 plc.VAL_CRL_IGNORE_SIGN;
850 plc.VAL_CRL_IGNORE_DATE;
876 oplc.ku_bits = plc.ku_bits;
905 oplc.eku_set = plc.eku_set;