Lines Matching defs:context

393     pkiDebug("%s: initializing openssl crypto context at %p\n",
415 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx);
841 cms_signeddata_create(krb5_context context,
1064 retval = pkinit_sign_data(context, id_cryptoctx, digestInfo_buf,
1071 retval = pkinit_sign_data(context, id_cryptoctx, abuf, alen,
1087 krb5_set_error_message(context, retval, "%s\n",
1108 krb5_set_error_message(context, retval, "%s\n",
1125 krb5_set_error_message(context, retval, "%s\n",
1139 krb5_set_error_message(context, retval, "%s\n",
1190 cms_signeddata_verify(krb5_context context,
1235 krb5_set_error_message(context, retval, "%s\n",
1246 krb5_set_error_message(context, retval, "wrong oid\n");
1307 /* initialize x509 context with the received certificate and
1375 krb5_set_error_message(context, retval, "%s\n",
1426 krb5_set_error_message(context, retval, "wrong oid\n");
1441 krb5_set_error_message(context, retval, "%s\n",
1511 krb5_free_data(context, authz);
1517 cms_envelopeddata_create(krb5_context context,
1554 retval = cms_signeddata_create(context, plgctx, reqctx, idctx,
1647 cms_envelopeddata_verify(krb5_context context,
1676 krb5_set_error_message(context, retval, "%s\n",
1685 krb5_set_error_message(context, retval, "wrong oid\n");
1691 if (pkcs7_decrypt(context, id_cryptoctx, p7, out)) {
1696 krb5_set_error_message(context, retval, "%s\n",
1780 retval = cms_signeddata_verify(context, plg_cryptoctx, req_cryptoctx,
1811 crypto_retrieve_X509_sans(krb5_context context,
1907 ret = krb5_parse_name(context, name.data, &upns[u]);
1957 krb5_free_principal(context, princs[i]);
1962 krb5_free_principal(context, upns[i]);
1976 crypto_retrieve_cert_sans(krb5_context context,
1991 return crypto_retrieve_X509_sans(context, plgctx, reqctx,
1998 crypto_check_cert_eku(krb5_context context,
2081 pkinit_octetstring2key(krb5_context context,
2124 retval = krb5_c_keylengths(context, etype, &keybytes, &keylength);
2138 retval = krb5_c_random_to_key(context, etype, &random_data, key_block);
2153 client_create_dh(krb5_context context,
2274 client_process_dh(krb5_context context,
2344 server_check_dh(krb5_context context,
2405 server_process_dh(krb5_context context,
2624 krb5_context context,
2638 retval = create_krb5_trustedCertifiers(context, plg_cryptoctx,
2646 retval = create_krb5_invalidCertificates(context, plg_cryptoctx,
2718 pkinit_create_td_trusted_certifiers(krb5_context context,
2726 retval = pkinit_create_sequence_of_principal_identifiers(context,
2735 krb5_context context,
2743 retval = pkinit_create_sequence_of_principal_identifiers(context,
2752 pkinit_create_td_dh_parameters(krb5_context context,
2946 pkinit_check_kdc_pkid(krb5_context context,
3012 pkinit_process_td_dh_params(krb5_context context,
3411 pkinit_prompt_user(krb5_context context,
3433 k5int_set_prompt_types(context, &prompt_type);
3434 r = (*cctx->prompter)(context, cctx->prompter_data,
3436 k5int_set_prompt_types(context, NULL);
3445 pkinit_login(krb5_context context,
3473 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
3500 r = pkinit_prompt_user(context, id_cryptoctx, &rdat, prompt, 1);
3511 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
3548 pkinit_prompt_token(krb5_context context,
3560 return (pkinit_prompt_user(context, cctx, &reply, token_prompt, 0));
3585 pkinit_choose_tokens(krb5_context context,
3632 krb5_set_error_message(context, EINVAL,
3641 if ((r = pkinit_prompt_user(context, cctx, &reply, prompt, 0)) != 0 )
3663 krb5_set_error_message(context, EINVAL,
3672 if ((r = pkinit_prompt_user(context, cctx, &reply, prompt, 0)) != 0 )
3683 if ((r = pkinit_prompt_user(context, cctx, &reply, prompt, 0)) != 0 )
3730 check_load_certs(krb5_context context,
3779 krb5_set_error_message(context, EINVAL,
3815 krb5_set_error_message(context, EINVAL,
3843 krb5_set_error_message(context, EINVAL,
3883 r = pkinit_cert_matching(context, plg_cryptoctx, req_cryptoctx,
3895 (void) crypto_free_cert_info(context, plg_cryptoctx, req_cryptoctx,
3914 * context. This function fills out a pkinit_identity_crypto_context with a
3918 * client criteria the user is prompted to make a choice if in client context.
3919 * If do_matching is false (KDC context) then the first token matching all
3923 pkinit_open_session(krb5_context context,
3955 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
3980 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
3990 krb5_set_error_message(context, r,
3998 krb5_set_error_message(context, ENOMEM,
4004 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
4018 krb5_set_error_message(context, r,
4031 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
4045 if ((r = pkinit_prompt_token(context, cctx)) == 0) {
4050 krb5_set_error_message(context, r,
4059 krb5_set_error_message(context, r,
4071 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
4080 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
4092 krb5_set_error_message(context, r,
4110 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
4120 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
4140 if ((r = check_load_certs(context, tmpsession, plg_cryptoctx,
4176 if ((r = check_load_certs(context, tmpsession, plg_cryptoctx,
4216 if ((r = pkinit_prompt_token(context, cctx)) == 0) {
4221 krb5_set_error_message(context, r,
4228 krb5_set_error_message(context, r,
4237 if ((r = pkinit_choose_tokens(context, cctx, &token_choices, &choice)) != 0) {
4240 krb5_set_error_message(context, r,
4267 if ((r = pkinit_choose_tokens(context, cctx, &token_choices, &choice)) != 0) {
4270 krb5_set_error_message(context, r,
4307 r = pkinit_login(context, cctx, &token_choices.token_array[choice].token_info);
4312 r = check_load_certs(context, cctx->session, plg_cryptoctx,
4502 pkinit_decode_data_fs(krb5_context context,
4539 pkinit_decode_data_pkcs11(krb5_context context,
4566 r = pkinit_login(context, id_cryptoctx, &tinfo);
4613 pkinit_decode_data(krb5_context context,
4623 retval = pkinit_decode_data_fs(context, id_cryptoctx, data, data_len,
4627 retval = pkinit_decode_data_pkcs11(context, id_cryptoctx, data,
4636 pkinit_sign_data_fs(krb5_context context,
4653 pkinit_sign_data_pkcs11(krb5_context context,
4680 r = pkinit_login(context, id_cryptoctx, &tinfo);
4730 pkinit_sign_data(krb5_context context,
4740 retval = pkinit_sign_data_fs(context, id_cryptoctx, data, data_len,
4744 retval = pkinit_sign_data_pkcs11(context, id_cryptoctx, data, data_len,
4829 pkinit_get_kdc_cert(krb5_context context,
4845 pkinit_get_certs_pkcs12(krb5_context context,
4861 krb5_set_error_message(context, retval,
4869 krb5_set_error_message(context, retval,
4878 krb5_set_error_message(context, retval,
4889 krb5_set_error_message(context, retval,
4935 k5int_set_prompt_types(context, &prompt_type);
4936 r = (*id_cryptoctx->prompter)(context, id_cryptoctx->prompter_data,
4938 k5int_set_prompt_types(context, NULL);
4944 krb5_set_error_message(context, retval,
4977 pkinit_load_fs_cert_and_key(krb5_context context,
4991 krb5_set_error_message(context, retval,
5000 krb5_set_error_message(context, retval,
5034 pkinit_get_certs_fs(krb5_context context,
5054 retval = pkinit_load_fs_cert_and_key(context, id_cryptoctx,
5063 pkinit_get_certs_dir(krb5_context context,
5093 krb5_set_error_message(context, errno,
5131 retval = pkinit_load_fs_cert_and_key(context, id_cryptoctx,
5144 krb5_set_error_message(context, ENOENT,
5165 pkinit_get_certs_pkcs11(krb5_context context,
5271 return (pkinit_open_session(context, plg_cryptoctx, req_cryptoctx,
5278 free_cred_info(krb5_context context,
5297 crypto_free_cert_info(krb5_context context,
5309 free_cred_info(context, id_cryptoctx, id_cryptoctx->creds[i]);
5317 crypto_load_certs(krb5_context context,
5329 retval = pkinit_get_certs_fs(context, plg_cryptoctx,
5334 retval = pkinit_get_certs_dir(context, plg_cryptoctx,
5340 retval = pkinit_get_certs_pkcs11(context, plg_cryptoctx,
5346 retval = pkinit_get_certs_pkcs12(context, plg_cryptoctx,
5363 crypto_cert_get_count(krb5_context context,
5387 crypto_cert_iteration_begin(krb5_context context,
5417 crypto_cert_iteration_end(krb5_context context,
5433 crypto_cert_iteration_next(krb5_context context,
5473 crypto_cert_release(krb5_context context,
5488 crypto_retieve_X509_key_usage(krb5_context context,
5594 crypto_cert_get_matching_data(krb5_context context,
5636 retval = crypto_retrieve_X509_sans(context, cd->plgctx, cd->reqctx,
5674 retval = crypto_retieve_X509_key_usage(context, cd->plgctx, cd->reqctx,
5685 crypto_cert_free_matching_data(context, md);
5694 crypto_cert_free_matching_data(krb5_context context,
5708 krb5_free_principal(context, p);
5720 crypto_cert_select(krb5_context context,
5758 crypto_cert_select_default(krb5_context context,
5766 retval = crypto_cert_get_count(context, plg_cryptoctx, req_cryptoctx,
5776 krb5_set_error_message(context, retval,
5813 load_cas_and_crls(krb5_context context,
5828 /* If there isn't already a stack in the context,
5922 * context before, add the temporary stack to the context.
5974 load_cas_and_crls_dir(krb5_context context,
6008 retval = load_cas_and_crls(context, plg_cryptoctx, req_cryptoctx,
6025 crypto_load_cas_and_crls(krb5_context context,
6039 return load_cas_and_crls(context, plg_cryptoctx, req_cryptoctx,
6042 return load_cas_and_crls_dir(context, plg_cryptoctx, req_cryptoctx,
6161 create_krb5_invalidCertificates(krb5_context context,
6190 create_krb5_supportedCMSTypes(krb5_context context,
6229 create_krb5_trustedCertifiers(krb5_context context,
6249 create_krb5_trustedCas(krb5_context context,
6336 create_issuerAndSerial(krb5_context context,
6374 pkcs7_decrypt(krb5_context context,
6392 if(!(tmpmem = pkcs7_dataDecode(context, id_cryptoctx, p7))) {
6412 krb5_context context,
6489 pkcs7_dataDecode(krb5_context context,
6564 jj = pkinit_decode_data(context, id_cryptoctx,
6588 jj = pkinit_decode_data(context, id_cryptoctx,