2N/A * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
2N/A * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
2N/A#include <cryptoutil.h>
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A int, KMF_KEY_HANDLE *, char *);
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A KMF_PRINTABLE_ITEM, char *);
2N/A if (!ssl_initialized) {
2N/A for (i = 0; i < CRYPTO_num_locks(); i++) {
2N/A lock_count[i] = 0;
2N/A return (&openssl_plugin_table);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A if (findSerial) {
2N/A if (findIssuer) {
2N/A if (findSubject) {
2N/A if (findIssuer) {
2N/A if (findSubject) {
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_ENCODING);
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A BN_clear_free(D);
2N/A BN_clear_free(P);
2N/A BN_clear_free(Q);
2N/A (void) readAltFormatPrivateKey(
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A for (i = 0; i < loaded_certs; i++)
2N/A for (i = 0; i < loaded_certs &&
2N/A for (; i < loaded_certs; i++)
2N/A for (i = 0; i < loaded_certs; i++)
2N/A n += loaded_certs;
2N/A for (; i < loaded_certs; i++)
2N/A for (i = 0; i < loaded_certs; i++)
2N/A n = loaded_certs;
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_CERTFILE);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_ENCODING);
2N/A return (KMF_ERR_ENCODING);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A case KMF_FORMAT_RAWKEY:
2N/A case KMF_FORMAT_ASN1:
2N/A case KMF_FORMAT_PEM:
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_MEMORY);
2N/A if (sslPrivKey)
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_ALGORITHM);
2N/A return (KMF_ERR_BAD_ALGORITHM);
2N/A RSA_PKCS1_PADDING)) <= 0) {
2N/A return (KMF_ERR_BAD_ALGORITHM);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_KEY_CLASS);
2N/A return (KMF_ERR_KEY_NOT_FOUND);
2N/A case KMF_X509_EXT_KEY_USAGE:
2N/A return (NID_key_usage);
2N/A return (NID_private_key_usage_period);
2N/A return (NID_certificate_policies);
2N/A return (NID_subject_alt_name);
2N/A return (NID_issuer_alt_name);
2N/A return (NID_basic_constraints);
2N/A return (NID_ext_key_usage);
2N/A case KMF_X509_EXT_AUTH_KEY_ID:
2N/A return (NID_authority_key_identifier);
2N/A return (NID_crl_distribution_points);
2N/A case KMF_X509_EXT_SUBJ_KEY_ID:
2N/A return (NID_subject_key_identifier);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_MEMORY);
2N/A case KMF_CERT_ISSUER:
2N/A case KMF_CERT_SUBJECT:
2N/A case KMF_CERT_VERSION:
2N/A case KMF_CERT_SERIALNUM:
2N/A case KMF_CERT_NOTBEFORE:
2N/A case KMF_CERT_NOTAFTER:
2N/A case KMF_CERT_PUBKEY_DATA:
2N/A case KMF_CERT_SIGNATURE_ALG:
2N/A case KMF_CERT_PUBKEY_ALG:
2N/A case KMF_CERT_EMAIL:
2N/A case KMF_X509_EXT_KEY_USAGE:
2N/A case KMF_X509_EXT_AUTH_KEY_ID:
2N/A case KMF_X509_EXT_SUBJ_KEY_ID:
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_KEY_NOT_FOUND);
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_KEY_NOT_FOUND);
2N/A return (KMF_ERR_KEY_NOT_FOUND);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_KEY_CLASS);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (cert_authsafe);
2N/A return (key_authsafe);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A key_authsafe)) {
2N/A if (authsafe_stack)
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_AMBIGUOUS_PATHNAME);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_AMBIGUOUS_PATHNAME);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_OPEN_FILE);
2N/A return (KMF_ERR_ENCODING);
2N/A matchcerts = 0;
2N/A for (j = 0; j < matchcerts; j++)
2N/A if (x509_info_stack)
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_MEMORY);
2N/A X509_ATTRIBUTE *a;
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_MEMORY);
2N/Astatic KMF_RETURN
2N/A case NID_keyBag:
2N/A case NID_pkcs8ShroudedKeyBag:
2N/A return (KMF_ERR_AUTH_FAILED);
2N/A case NID_certBag:
2N/A return (KMF_ERR_PKCS12_FORMAT);
2N/A case NID_safeContentsBag:
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_MEMORY);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_AUTH_FAILED);
2N/A return (KMF_ERR_AUTH_FAILED);
2N/A return (KMF_ERR_PKCS12_FORMAT);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/A goto end_extract_pkcs12;
2N/A return (KMF_ERR_PKCS12_FORMAT);
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_PKCS12_FORMAT);
2N/A else if (cacertlist)
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/Astatic X509_ATTRIBUTE *
2N/A X509_ATTRIBUTE *a;
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A case EVP_PKEY_RSA:
2N/A case EVP_PKEY_DSA:
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_MEMORY);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_ENCODING);
2N/A sizeof (KMF_X509_DER_CERT));
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_KEYGEN_FAILED);
2N/Astatic KMF_RETURN
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_UNINITIALIZED);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_DUPLICATE_KEYFILE);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_UNINITIALIZED);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_KEY_CLASS);
2N/A return (KMF_ERR_BAD_KEYHANDLE);
2N/A return (KMF_ERR_MEMORY);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_DUPLICATE_KEYFILE);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_CERTFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A if (openssl_ret > 0) {
2N/A if (openssl_ret <= 0) {
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A X509_CRL_free(x);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_CRLFILE);
2N/A return (KMF_ERR_BAD_PARAMETER);
2N/A return (KMF_ERR_BAD_PARAMETER);