Lines Matching refs:plc

92 	KMF_POLICY_RECORD oplc, plc;  in kc_modify_policy()  local
94 (void) memset(&plc, 0, sizeof (KMF_POLICY_RECORD)); in kc_modify_policy()
139 plc.name = get_string(optarg_av, &rv); in kc_modify_policy()
140 if (plc.name == NULL) { in kc_modify_policy()
146 plc.ignore_date = get_boolean(optarg_av); in kc_modify_policy()
147 if (plc.ignore_date == -1) { in kc_modify_policy()
156 plc.ignore_unknown_ekus = in kc_modify_policy()
158 if (plc.ignore_unknown_ekus == -1) { in kc_modify_policy()
167 plc.ignore_trust_anchor = in kc_modify_policy()
169 if (plc.ignore_trust_anchor == -1) { in kc_modify_policy()
178 plc.validity_adjusttime = in kc_modify_policy()
180 if (plc.validity_adjusttime == NULL) { in kc_modify_policy()
187 plc.validity_adjusttime, in kc_modify_policy()
199 plc.ta_name = get_string(optarg_av, &rv); in kc_modify_policy()
200 if (plc.ta_name == NULL) { in kc_modify_policy()
203 } else if (strcasecmp(plc.ta_name, "search")) { in kc_modify_policy()
206 if (kmf_dn_parser(plc.ta_name, in kc_modify_policy()
221 plc.ta_serial = get_string(optarg_av, &rv); in kc_modify_policy()
222 if (plc.ta_serial == NULL) { in kc_modify_policy()
230 (uchar_t *)plc.ta_serial, in kc_modify_policy()
248 plc.VAL_OCSP_RESPONDER_URI = in kc_modify_policy()
250 if (plc.VAL_OCSP_RESPONDER_URI == NULL) { in kc_modify_policy()
260 plc.VAL_OCSP_PROXY = get_string(optarg_av, &rv); in kc_modify_policy()
261 if (plc.VAL_OCSP_PROXY == NULL) { in kc_modify_policy()
270 plc.VAL_OCSP_URI_FROM_CERT = in kc_modify_policy()
272 if (plc.VAL_OCSP_URI_FROM_CERT == -1) { in kc_modify_policy()
282 plc.VAL_OCSP_RESP_LIFETIME = in kc_modify_policy()
284 if (plc.VAL_OCSP_RESP_LIFETIME == NULL) { in kc_modify_policy()
291 plc.VAL_OCSP_RESP_LIFETIME, in kc_modify_policy()
304 plc.VAL_OCSP_IGNORE_RESP_SIGN = in kc_modify_policy()
306 if (plc.VAL_OCSP_IGNORE_RESP_SIGN == -1) { in kc_modify_policy()
316 plc.VAL_OCSP_RESP_CERT_NAME = in kc_modify_policy()
318 if (plc.VAL_OCSP_RESP_CERT_NAME == NULL) { in kc_modify_policy()
325 plc.VAL_OCSP_RESP_CERT_NAME, in kc_modify_policy()
339 plc.VAL_OCSP_RESP_CERT_SERIAL = in kc_modify_policy()
341 if (plc.VAL_OCSP_RESP_CERT_SERIAL == NULL) { in kc_modify_policy()
349 plc.VAL_OCSP_RESP_CERT_SERIAL, in kc_modify_policy()
378 plc.VAL_CRL_BASEFILENAME = in kc_modify_policy()
380 if (plc.VAL_CRL_BASEFILENAME == NULL) { in kc_modify_policy()
389 plc.VAL_CRL_DIRECTORY = in kc_modify_policy()
391 if (plc.VAL_CRL_DIRECTORY == NULL) { in kc_modify_policy()
400 plc.VAL_CRL_GET_URI = get_boolean(optarg_av); in kc_modify_policy()
401 if (plc.VAL_CRL_GET_URI == -1) { in kc_modify_policy()
411 plc.VAL_CRL_PROXY = get_string(optarg_av, &rv); in kc_modify_policy()
412 if (plc.VAL_CRL_PROXY == NULL) { in kc_modify_policy()
421 plc.VAL_CRL_IGNORE_SIGN = in kc_modify_policy()
423 if (plc.VAL_CRL_IGNORE_SIGN == -1) { in kc_modify_policy()
433 plc.VAL_CRL_IGNORE_DATE = in kc_modify_policy()
435 if (plc.VAL_CRL_IGNORE_DATE == -1) { in kc_modify_policy()
455 plc.ku_bits = parseKUlist(optarg_av); in kc_modify_policy()
456 if (plc.ku_bits == 0) { in kc_modify_policy()
475 if (parseEKUNames(optarg_av, &plc) != 0) { in kc_modify_policy()
484 if (parseEKUOIDs(optarg_av, &plc) != 0) { in kc_modify_policy()
527 plc.mapper.options = get_string(optarg_av, &rv); in kc_modify_policy()
562 if (plc.name == NULL) { in kc_modify_policy()
568 strcmp(plc.name, KMF_DEFAULT_POLICY_NAME) == 0) { in kc_modify_policy()
587 ret = kmf_get_policy(filename, plc.name, &oplc); in kc_modify_policy()
591 plc.name); in kc_modify_policy()
597 oplc.ignore_date = plc.ignore_date; in kc_modify_policy()
600 oplc.ignore_unknown_ekus = plc.ignore_unknown_ekus; in kc_modify_policy()
603 oplc.ignore_trust_anchor = plc.ignore_trust_anchor; in kc_modify_policy()
609 plc.validity_adjusttime; in kc_modify_policy()
615 oplc.ta_name = plc.ta_name; in kc_modify_policy()
620 oplc.ta_serial = plc.ta_serial; in kc_modify_policy()
638 ((plc.mapper.options != NULL || oplc.mapper.options != NULL) && in kc_modify_policy()
649 if (flags & KC_MAPPER_OPTIONS && plc.mapper.options != NULL) in kc_modify_policy()
650 free(plc.mapper.options); in kc_modify_policy()
655 plc.mapper.mapname = mapper_name; in kc_modify_policy()
657 plc.mapper.pathname = mapper_pathname; in kc_modify_policy()
659 plc.mapper.dir = mapper_dir; in kc_modify_policy()
662 UPDATE_IF_DIFFERENT(oplc.mapper.mapname, plc.mapper.mapname); in kc_modify_policy()
663 UPDATE_IF_DIFFERENT(oplc.mapper.pathname, plc.mapper.pathname); in kc_modify_policy()
664 UPDATE_IF_DIFFERENT(oplc.mapper.dir, plc.mapper.dir); in kc_modify_policy()
669 oplc.mapper.options = plc.mapper.options; in kc_modify_policy()
729 plc.VAL_OCSP_RESPONDER_URI; in kc_modify_policy()
735 oplc.VAL_OCSP_PROXY = plc.VAL_OCSP_PROXY; in kc_modify_policy()
740 plc.VAL_OCSP_URI_FROM_CERT; in kc_modify_policy()
746 plc.VAL_OCSP_RESP_LIFETIME; in kc_modify_policy()
751 plc.VAL_OCSP_IGNORE_RESP_SIGN; in kc_modify_policy()
757 plc.VAL_OCSP_RESP_CERT_NAME; in kc_modify_policy()
764 plc.VAL_OCSP_RESP_CERT_SERIAL; in kc_modify_policy()
824 plc.VAL_CRL_BASEFILENAME; in kc_modify_policy()
830 oplc.VAL_CRL_DIRECTORY = plc.VAL_CRL_DIRECTORY; in kc_modify_policy()
834 oplc.VAL_CRL_GET_URI = plc.VAL_CRL_GET_URI; in kc_modify_policy()
840 oplc.VAL_CRL_PROXY = plc.VAL_CRL_PROXY; in kc_modify_policy()
845 plc.VAL_CRL_IGNORE_SIGN; in kc_modify_policy()
850 plc.VAL_CRL_IGNORE_DATE; in kc_modify_policy()
876 oplc.ku_bits = plc.ku_bits; in kc_modify_policy()
905 oplc.eku_set = plc.eku_set; in kc_modify_policy()