Lines Matching +full:data +full:- +full:out

2  * Copyright (c) 2004 - 2007 Kungliga Tekniska Högskolan
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62 for (i = 0; i < attrs->len; i++) in find_attribute()
63 if (der_heim_oid_cmp(oid, &attrs->val[i].attrId) == 0) in find_attribute()
64 return &attrs->val[i]; in find_attribute()
71 const void *data, size_t length, in keyBag_parser() argument
81 os = &attr->attrValues; in keyBag_parser()
83 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); in keyBag_parser()
100 const void *data, size_t length, in ShroudedKeyBag_parser() argument
109 ret = decode_PKCS8EncryptedPrivateKeyInfo(data, length, &pk, NULL); in ShroudedKeyBag_parser()
122 ret = keyBag_parser(context, c, content.data, content.length, attrs); in ShroudedKeyBag_parser()
130 const void *data, size_t length, in certBag_parser() argument
138 ret = decode_PKCS12_CertBag(data, length, &cb, NULL); in certBag_parser()
147 ret = decode_PKCS12_OctetString(cb.certValue.data, in certBag_parser()
155 ret = hx509_cert_init_data(context, os.data, os.length, &cert); in certBag_parser()
178 &attr->attrValues); in certBag_parser()
206 sc.val[i].bagValue.data, in parse_safe_content()
217 const void *data, size_t length, in safeContent_parser() argument
223 ret = decode_PKCS12_OctetString(data, length, &os, NULL); in safeContent_parser()
226 ret = parse_safe_content(context, c, os.data, os.length); in safeContent_parser()
234 const void *data, size_t length, in encryptedData_parser() argument
245 data, length, in encryptedData_parser()
252 ret = parse_safe_content(context, c, content.data, content.length); in encryptedData_parser()
262 const void *data, size_t length, in envelopedData_parser() argument
277 data, length, in envelopedData_parser()
289 ret = parse_safe_content(context, c, content.data, content.length); in envelopedData_parser()
311 const void *data, size_t length, in parse_pkcs12_type() argument
318 (*bagtypes[i].func)(context, c, data, length, attrs); in parse_pkcs12_type()
323 hx509_certs certs, void **data, int flags, in p12_init() argument
335 *data = NULL; in p12_init()
347 hx509_set_error_string(context, 0, ret, "out of memory"); in p12_init()
348 goto out; in p12_init()
351 p12->fn = strdup(residue); in p12_init()
352 if (p12->fn == NULL) { in p12_init()
354 hx509_set_error_string(context, 0, ret, "out of memory"); in p12_init()
355 goto out; in p12_init()
359 ret = hx509_certs_init(context, "MEMORY:ks-file-create", in p12_init()
360 0, lock, &p12->certs); in p12_init()
362 *data = p12; in p12_init()
363 goto out; in p12_init()
369 goto out; in p12_init()
377 goto out; in p12_init()
384 "PKCS PFX isn't a pkcs7-data container"); in p12_init()
385 goto out; in p12_init()
392 "PKCS PFX missing data"); in p12_init()
393 goto out; in p12_init()
399 ret = decode_PKCS12_OctetString(pfx.authSafe.content->data, in p12_init()
400 pfx.authSafe.content->length, in p12_init()
406 goto out; in p12_init()
408 ret = decode_PKCS12_AuthenticatedSafe(asdata.data, in p12_init()
415 goto out; in p12_init()
423 as.val[i].content->data, in p12_init()
424 as.val[i].content->length, in p12_init()
429 ret = _hx509_collector_collect_certs(context, c, &p12->certs); in p12_init()
431 *data = p12; in p12_init()
433 out: in p12_init()
437 if (p12->fn) in p12_init()
438 free(p12->fn); in p12_init()
439 if (p12->certs) in p12_init()
440 hx509_certs_free(&p12->certs); in p12_init()
451 void *data, in addBag() argument
457 ptr = realloc(as->val, sizeof(as->val[0]) * (as->len + 1)); in addBag()
459 hx509_set_error_string(context, 0, ENOMEM, "out of memory"); in addBag()
462 as->val = ptr; in addBag()
464 ret = der_copy_oid(oid, &as->val[as->len].contentType); in addBag()
466 hx509_set_error_string(context, 0, ret, "out of memory"); in addBag()
470 as->val[as->len].content = calloc(1, sizeof(*as->val[0].content)); in addBag()
471 if (as->val[as->len].content == NULL) { in addBag()
472 der_free_oid(&as->val[as->len].contentType); in addBag()
473 hx509_set_error_string(context, 0, ENOMEM, "malloc out of memory"); in addBag()
477 as->val[as->len].content->data = data; in addBag()
478 as->val[as->len].content->length = length; in addBag()
480 as->len++; in addBag()
497 os.data = NULL; in store_func()
505 cb.certValue.data,cb.certValue.length, in store_func()
507 free(os.data); in store_func()
509 goto out; in store_func()
513 goto out; in store_func()
515 ASN1_MALLOC_ENCODE(PKCS12_CertBag, os.data, os.length, in store_func()
519 goto out; in store_func()
521 ret = addBag(context, as, &asn1_oid_id_pkcs12_certBag, os.data, os.length); in store_func()
548 ASN1_MALLOC_ENCODE(PKCS8PrivateKeyInfo, os.data, os.length, in store_func()
554 ret = addBag(context, as, &asn1_oid_id_pkcs12_keyBag, os.data, os.length); in store_func()
559 out: in store_func()
565 hx509_certs certs, void *data, int flags, hx509_lock lock) in p12_store() argument
567 struct ks_pkcs12 *p12 = data; in p12_store()
577 ret = hx509_certs_iter_f(context, p12->certs, store_func, &as); in p12_store()
579 goto out; in p12_store()
581 ASN1_MALLOC_ENCODE(PKCS12_AuthenticatedSafe, asdata.data, asdata.length, in p12_store()
589 free(asdata.data); in p12_store()
590 goto out; in p12_store()
596 pfx.authSafe.content->data, in p12_store()
597 pfx.authSafe.content->length, in p12_store()
599 free(asdata.data); in p12_store()
601 goto out; in p12_store()
605 goto out; in p12_store()
607 ASN1_MALLOC_ENCODE(PKCS12_PFX, asdata.data, asdata.length, in p12_store()
610 goto out; in p12_store()
620 hx509_set_error_string(context, 0, ret, "malloc out of memory"); in p12_store()
624 free(asdata.data); in p12_store()
625 goto out; in p12_store()
631 rk_dumpdata(p12->fn, asdata.data, asdata.length); in p12_store()
632 free(asdata.data); in p12_store()
634 out: in p12_store()
643 p12_free(hx509_certs certs, void *data) in p12_free() argument
645 struct ks_pkcs12 *p12 = data; in p12_free()
646 hx509_certs_free(&p12->certs); in p12_free()
647 free(p12->fn); in p12_free()
653 p12_add(hx509_context context, hx509_certs certs, void *data, hx509_cert c) in p12_add() argument
655 struct ks_pkcs12 *p12 = data; in p12_add()
656 return hx509_certs_add(context, p12->certs, c); in p12_add()
662 void *data, in p12_iter_start() argument
665 struct ks_pkcs12 *p12 = data; in p12_iter_start()
666 return hx509_certs_start_seq(context, p12->certs, cursor); in p12_iter_start()
672 void *data, in p12_iter() argument
676 struct ks_pkcs12 *p12 = data; in p12_iter()
677 return hx509_certs_next_cert(context, p12->certs, cursor, cert); in p12_iter()
683 void *data, in p12_iter_end() argument
686 struct ks_pkcs12 *p12 = data; in p12_iter_end()
687 return hx509_certs_end_seq(context, p12->certs, cursor); in p12_iter_end()