Searched refs:ekulist (Results 1 - 11 of 11) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-crypto/kmfcfg/
H A Dutil.c185 ekus->ekulist = realloc(
186 ekus->ekulist, ekus->eku_count * sizeof (KMF_OID));
187 if (ekus->ekulist != NULL) {
188 ekus->ekulist[ekus->eku_count-1] = *newoid;
194 parseEKUNames(char *ekulist, KMF_POLICY_RECORD *plc) argument
201 if (ekulist == NULL || !strlen(ekulist))
207 p = strtok(ekulist, ",");
211 newoid = kmf_ekuname_to_oid(ekulist);
239 parseEKUOIDs(char *ekulist, KMF_POLICY_RECOR argument
[all...]
H A Dlist.c89 &plc->eku_set.ekulist[i]);
91 kmf_oid_to_string(&plc->eku_set.ekulist[i]),
H A Dmodify.c894 oplc.eku_set.ekulist = NULL;
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgencsr.c52 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist,
102 if (ekulist != NULL) {
104 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) {
106 &ekulist->ekulist[i],
107 ekulist->critlist[i]),
173 char *outcsr, char *outkey, EKU_LIST *ekulist,
233 if (ekulist != NULL) {
235 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) {
237 &ekulist
46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
168 gencsr_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, char *outcsr, char *outkey, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg) argument
261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
398 EKU_LIST *ekulist = NULL; local
[all...]
H A Dgencert.c53 EKU_LIST *ekulist, KMF_OID *curveoid)
131 if (ekulist != NULL) {
133 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) {
135 &ekulist->ekulist[i], ekulist->critlist[i]),
252 EKU_LIST *ekulist)
337 if (ekulist != NULL) {
339 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) {
341 &ekulist
46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
245 gencert_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, KMF_ENCODE_FORMAT fmt, uint32_t ltime, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, KMF_BIGINT *serial, uint16_t kubits, int kucrit, char *outcert, char *outkey, EKU_LIST *ekulist) argument
408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
604 EKU_LIST *ekulist = NULL; local
[all...]
H A Dsigncsr.c114 EKU_LIST *ekulist)
189 if (ekulist != NULL) {
191 for (i = 0; rv == KMF_OK && i < ekulist->eku_count; i++) {
193 &ekulist->ekulist[i],
194 ekulist->critlist[i]), "Extended Key Usage");
257 EKU_LIST *ekulist,
296 kucrit, ekulist);
360 EKU_LIST *ekulist, uint32_t ltime,
407 kucrit, ekulist);
104 build_cert_from_csr(KMF_CSR_DATA *csrdata, KMF_X509_CERTIFICATE *signedCert, KMF_BIGINT *serial, uint32_t ltime, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist) argument
245 pk_signcsr_files(KMF_HANDLE_T handle, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt) argument
352 pk_signcsr_pk11_nss(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE kstype, char *dir, char *prefix, char *token, KMF_CREDENTIAL *cred, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt, int store, char *outlabel) argument
547 EKU_LIST *ekulist = NULL; local
[all...]
H A Dcommon.h83 KMF_OID *ekulist; member in struct:__anon82
H A Dcommon.c1224 ekus->ekulist = realloc(
1225 ekus->ekulist, ekus->eku_count * sizeof (KMF_OID));
1226 if (ekus->ekulist != NULL)
1227 ekus->ekulist[ekus->eku_count-1] = *newoid;
1240 kmf_free_data(&ekus->ekulist[i]);
1242 free(ekus->ekulist);
1274 verify_ekunames(char *ekuliststr, EKU_LIST **ekulist) argument
1308 *ekulist = ekus;
/illumos-gate/usr/src/lib/libkmf/include/
H A Dkmfpolicy.h70 KMF_OID *ekulist; member in struct:__anon3415
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dpolicy.c368 ekus->ekulist = realloc(ekus->ekulist,
370 if (ekus->ekulist != NULL) {
371 ekus->ekulist[ekus->eku_count-1].Length =
373 ekus->ekulist[ekus->eku_count-1].Data =
783 char *s = kmf_oid_to_string(&ekus->ekulist[i]);
816 kmf_free_data(&ekus->ekulist[i]);
818 free(ekus->ekulist);
H A Dcertop.c2086 if (IsEqualOid(&policy->eku_set.ekulist[i],
2089 } else if (IsEqualOid(&policy->eku_set.ekulist[i],
2092 } else if (IsEqualOid(&policy->eku_set.ekulist[i],
2095 } else if (IsEqualOid(&policy->eku_set.ekulist[i],
2098 } else if (IsEqualOid(&policy->eku_set.ekulist[i],
2101 } else if (IsEqualOid(&policy->eku_set.ekulist[i],

Completed in 100 milliseconds