Lines Matching refs:row

1469     OPENSSL_STRING row[DB_NUMBER];  in do_body()  local
1476 row[i] = NULL; in do_body()
1777 row[DB_name] = X509_NAME_oneline(X509_get_subject_name(ret), NULL, 0); in do_body()
1778 if (row[DB_name] == NULL) { in do_body()
1784 row[DB_serial] = OPENSSL_strdup("00"); in do_body()
1786 row[DB_serial] = BN_bn2hex(serial); in do_body()
1787 if (row[DB_serial] == NULL) { in do_body()
1792 if (row[DB_name][0] == '\0') { in do_body()
1798 OPENSSL_free(row[DB_name]); in do_body()
1799 row[DB_name] = OPENSSL_strdup(row[DB_serial]); in do_body()
1800 if (row[DB_name] == NULL) { in do_body()
1807 OPENSSL_STRING *crow = row; in do_body()
1813 row[DB_name]); in do_body()
1817 rrow = TXT_DB_get_by_index(db->db, DB_serial, row); in do_body()
1821 row[DB_serial]); in do_body()
1906 row[DB_type] = OPENSSL_strdup("V"); in do_body()
1908 row[DB_exp_date] = app_malloc(tm->length + 1, "row expdate"); in do_body()
1909 memcpy(row[DB_exp_date], tm->data, tm->length); in do_body()
1910 row[DB_exp_date][tm->length] = '\0'; in do_body()
1911 row[DB_rev_date] = NULL; in do_body()
1912 row[DB_file] = OPENSSL_strdup("unknown"); in do_body()
1913 if ((row[DB_type] == NULL) || (row[DB_file] == NULL) in do_body()
1914 || (row[DB_name] == NULL)) { in do_body()
1921 irow[i] = row[i]; in do_body()
1934 OPENSSL_free(row[i]); in do_body()
2099 char *row[DB_NUMBER], **rrow, **irow; in do_revoke() local
2105 row[i] = NULL; in do_revoke()
2106 row[DB_name] = X509_NAME_oneline(X509_get_subject_name(x509), NULL, 0); in do_revoke()
2111 row[DB_serial] = OPENSSL_strdup("00"); in do_revoke()
2113 row[DB_serial] = BN_bn2hex(bn); in do_revoke()
2115 if (row[DB_name] != NULL && row[DB_name][0] == '\0') { in do_revoke()
2117 OPENSSL_free(row[DB_name]); in do_revoke()
2118 row[DB_name] = OPENSSL_strdup(row[DB_serial]); in do_revoke()
2120 if ((row[DB_name] == NULL) || (row[DB_serial] == NULL)) { in do_revoke()
2128 rrow = TXT_DB_get_by_index(db->db, DB_serial, row); in do_revoke()
2132 row[DB_serial], row[DB_name]); in do_revoke()
2135 row[DB_type] = OPENSSL_strdup("V"); in do_revoke()
2137 row[DB_exp_date] = app_malloc(tm->length + 1, "row exp_data"); in do_revoke()
2138 memcpy(row[DB_exp_date], tm->data, tm->length); in do_revoke()
2139 row[DB_exp_date][tm->length] = '\0'; in do_revoke()
2140 row[DB_rev_date] = NULL; in do_revoke()
2141 row[DB_file] = OPENSSL_strdup("unknown"); in do_revoke()
2143 if (row[DB_type] == NULL || row[DB_file] == NULL) { in do_revoke()
2150 irow[i] = row[i]; in do_revoke()
2161 row[i] = NULL; in do_revoke()
2172 } else if (index_name_cmp_noconst(row, rrow)) { in do_revoke()
2173 BIO_printf(bio_err, "ERROR:name does not match %s\n", row[DB_name]); in do_revoke()
2177 row[DB_serial]); in do_revoke()
2181 row[DB_serial]); in do_revoke()
2197 OPENSSL_free(row[i]); in do_revoke()
2203 char *row[DB_NUMBER], **rrow; in get_certificate_status() local
2209 row[i] = NULL; in get_certificate_status()
2212 row[DB_serial] = app_malloc(serial_len + 2, "row serial#"); in get_certificate_status()
2218 row[DB_serial][0] = '0'; in get_certificate_status()
2221 memcpy(row[DB_serial] + 1, serial, serial_len); in get_certificate_status()
2222 row[DB_serial][serial_len + 1] = '\0'; in get_certificate_status()
2225 memcpy(row[DB_serial], serial, serial_len); in get_certificate_status()
2226 row[DB_serial][serial_len] = '\0'; in get_certificate_status()
2230 make_uppercase(row[DB_serial]); in get_certificate_status()
2235 rrow = TXT_DB_get_by_index(db->db, DB_serial, row); in get_certificate_status()
2237 BIO_printf(bio_err, "Serial %s not present in db.\n", row[DB_serial]); in get_certificate_status()
2242 row[DB_serial], rrow[DB_type][0]); in get_certificate_status()
2246 row[DB_serial], rrow[DB_type][0]); in get_certificate_status()
2250 row[DB_serial], rrow[DB_type][0]); in get_certificate_status()
2254 row[DB_serial], rrow[DB_type][0]); in get_certificate_status()
2258 row[DB_serial], rrow[DB_type][0]); in get_certificate_status()
2263 OPENSSL_free(row[i]); in get_certificate_status()