/illumos-gate/usr/src/cmd/cmd-crypto/kmfcfg/ |
H A D | util.c | 185 ekus->ekulist = realloc( 186 ekus->ekulist, ekus->eku_count * sizeof (KMF_OID)); 187 if (ekus->ekulist != NULL) { 188 ekus->ekulist[ekus->eku_count-1] = *newoid; 194 parseEKUNames(char *ekulist, KMF_POLICY_RECORD *plc) argument 201 if (ekulist == NULL || !strlen(ekulist)) 207 p = strtok(ekulist, ","); 211 newoid = kmf_ekuname_to_oid(ekulist); 239 parseEKUOIDs(char *ekulist, KMF_POLICY_RECOR argument [all...] |
H A D | list.c | 89 &plc->eku_set.ekulist[i]); 91 kmf_oid_to_string(&plc->eku_set.ekulist[i]),
|
H A D | modify.c | 894 oplc.eku_set.ekulist = NULL;
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | gencsr.c | 52 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, 102 if (ekulist != NULL) { 104 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) { 106 &ekulist->ekulist[i], 107 ekulist->critlist[i]), 173 char *outcsr, char *outkey, EKU_LIST *ekulist, 233 if (ekulist != NULL) { 235 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) { 237 &ekulist 46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 168 gencsr_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, char *outcsr, char *outkey, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg) argument 261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 398 EKU_LIST *ekulist = NULL; local [all...] |
H A D | gencert.c | 53 EKU_LIST *ekulist, KMF_OID *curveoid) 131 if (ekulist != NULL) { 133 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) { 135 &ekulist->ekulist[i], ekulist->critlist[i]), 252 EKU_LIST *ekulist) 337 if (ekulist != NULL) { 339 for (i = 0; kmfrv == KMF_OK && i < ekulist->eku_count; i++) { 341 &ekulist 46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 245 gencert_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, KMF_ENCODE_FORMAT fmt, uint32_t ltime, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, KMF_BIGINT *serial, uint16_t kubits, int kucrit, char *outcert, char *outkey, EKU_LIST *ekulist) argument 408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 604 EKU_LIST *ekulist = NULL; local [all...] |
H A D | signcsr.c | 114 EKU_LIST *ekulist) 189 if (ekulist != NULL) { 191 for (i = 0; rv == KMF_OK && i < ekulist->eku_count; i++) { 193 &ekulist->ekulist[i], 194 ekulist->critlist[i]), "Extended Key Usage"); 257 EKU_LIST *ekulist, 296 kucrit, ekulist); 360 EKU_LIST *ekulist, uint32_t ltime, 407 kucrit, ekulist); 104 build_cert_from_csr(KMF_CSR_DATA *csrdata, KMF_X509_CERTIFICATE *signedCert, KMF_BIGINT *serial, uint32_t ltime, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist) argument 245 pk_signcsr_files(KMF_HANDLE_T handle, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt) argument 352 pk_signcsr_pk11_nss(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE kstype, char *dir, char *prefix, char *token, KMF_CREDENTIAL *cred, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt, int store, char *outlabel) argument 547 EKU_LIST *ekulist = NULL; local [all...] |
H A D | common.h | 83 KMF_OID *ekulist; member in struct:__anon82
|
H A D | common.c | 1224 ekus->ekulist = realloc( 1225 ekus->ekulist, ekus->eku_count * sizeof (KMF_OID)); 1226 if (ekus->ekulist != NULL) 1227 ekus->ekulist[ekus->eku_count-1] = *newoid; 1240 kmf_free_data(&ekus->ekulist[i]); 1242 free(ekus->ekulist); 1274 verify_ekunames(char *ekuliststr, EKU_LIST **ekulist) argument 1308 *ekulist = ekus;
|
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmfpolicy.h | 70 KMF_OID *ekulist; member in struct:__anon3415
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | policy.c | 368 ekus->ekulist = realloc(ekus->ekulist, 370 if (ekus->ekulist != NULL) { 371 ekus->ekulist[ekus->eku_count-1].Length = 373 ekus->ekulist[ekus->eku_count-1].Data = 783 char *s = kmf_oid_to_string(&ekus->ekulist[i]); 816 kmf_free_data(&ekus->ekulist[i]); 818 free(ekus->ekulist);
|
H A D | certop.c | 2086 if (IsEqualOid(&policy->eku_set.ekulist[i], 2089 } else if (IsEqualOid(&policy->eku_set.ekulist[i], 2092 } else if (IsEqualOid(&policy->eku_set.ekulist[i], 2095 } else if (IsEqualOid(&policy->eku_set.ekulist[i], 2098 } else if (IsEqualOid(&policy->eku_set.ekulist[i], 2101 } else if (IsEqualOid(&policy->eku_set.ekulist[i],
|