• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/heimdal/lib/hx509/

Lines Matching refs:ret

81     int ret;
86 ret = der_copy_oid(oid, &ci.contentType);
87 if (ret)
88 return ret;
104 ASN1_MALLOC_ENCODE(ContentInfo, res->data, res->length, &ci, &size, ret);
106 if (ret)
107 return ret;
136 int ret;
141 ret = decode_ContentInfo(in->data, in->length, &ci, &size);
142 if (ret)
143 return ret;
145 ret = der_copy_oid(&ci.contentType, oid);
146 if (ret) {
148 return ret;
151 ret = der_copy_octet_string(ci.content, out);
152 if (ret) {
155 return ret;
176 int ret;
181 ret = _hx509_find_extension_subject_key_id(_hx509_get_cert(cert),
183 if (ret == 0)
190 ret = hx509_cert_get_issuer(cert, &name);
191 if (ret)
192 return ret;
193 ret = hx509_name_to_Name(name, &id->u.issuerAndSerialNumber.issuer);
195 if (ret)
196 return ret;
198 ret = hx509_cert_get_serialnumber(cert, &id->u.issuerAndSerialNumber.serialNumber);
204 return ret;
212 int ret;
222 ret = _hx509_Name_to_string(&iasn->issuer, &name);
223 if(ret)
224 return ret;
225 ret = der_print_hex_heim_integer(&iasn->serialNumber, &serial);
226 if (ret) {
228 return ret;
269 int ret;
300 ret = hx509_certs_find(context, certs, &q, &cert);
301 if (ret == HX509_CERT_NOT_FOUND) {
304 ret = unparse_CMSIdentifier(context, client, &str);
305 if (ret == 0) {
312 } else if (ret) {
365 int ret, matched = 0, findflags = 0;
378 ret = decode_EnvelopedData(data, length, &ed, &size);
379 if (ret) {
380 hx509_set_error_string(context, 0, ret,
382 return ret;
386 ret = HX509_CMS_NO_RECIPIENT_CERTIFICATE;
387 hx509_set_error_string(context, 0, ret,
395 ret = HX509_CMS_NO_DATA_AVAILABLE;
396 hx509_set_error_string(context, 0, ret,
402 ret = HX509_CMS_NO_DATA_AVAILABLE;
403 hx509_set_error_string(context, 0, ret,
416 ret = find_CMSIdentifier(context, &ri->rid, certs,
419 if (ret)
424 ret = _hx509_cert_private_decrypt(context,
430 if (ret == 0)
435 hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
442 ret = HX509_CMS_NO_RECIPIENT_CERTIFICATE;
443 hx509_set_error_string(context, 0, ret,
449 ret = HX509_CMS_NO_RECIPIENT_CERTIFICATE;
450 hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
455 ret = der_copy_oid(&ed.encryptedContentInfo.contentType, contentType);
456 if (ret) {
457 hx509_set_error_string(context, 0, ret,
473 ret = hx509_crypto_init(context, NULL, &ai->algorithm, &crypto);
474 if (ret)
481 ret = hx509_crypto_set_params(context, crypto, params, &ivec);
482 if (ret) {
488 ret = hx509_crypto_set_key_data(crypto, key.data, key.length);
489 if (ret) {
491 hx509_set_error_string(context, 0, ret,
497 ret = hx509_crypto_decrypt(crypto,
503 if (ret) {
504 hx509_set_error_string(context, 0, ret,
516 if (ret) {
521 return ret;
564 int ret, cmsidflag;
577 ret = _hx509_check_key_usage(context, cert, 1 << 2, TRUE);
578 if (ret)
582 ret = hx509_crypto_init(context, NULL, encryption_type, &crypto);
583 if (ret)
589 ret = hx509_crypto_set_random_key(crypto, &key);
590 if (ret) {
591 hx509_set_error_string(context, 0, ret,
596 ret = hx509_crypto_random_iv(crypto, &ivec);
597 if (ret) {
598 hx509_set_error_string(context, 0, ret,
603 ret = hx509_crypto_encrypt(crypto,
608 if (ret) {
609 hx509_set_error_string(context, 0, ret,
617 ret = der_copy_oid(encryption_type, &enc_alg->algorithm);
618 if (ret) {
619 hx509_set_error_string(context, 0, ret,
626 ret = ENOMEM;
627 hx509_set_error_string(context, 0, ret,
633 ret = hx509_crypto_get_params(context,
637 if (ret) {
644 ret = ENOMEM;
645 hx509_set_error_string(context, 0, ret,
661 ret = fill_CMSIdentifier(cert, cmsidflag, &ri->rid);
662 if (ret) {
663 hx509_set_error_string(context, 0, ret,
669 ret = hx509_cert_public_encrypt(context,
673 if (ret) {
674 hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
687 ret = der_copy_oid(contentType, &ed.encryptedContentInfo.contentType);
688 if (ret) {
689 hx509_set_error_string(context, 0, ret,
698 &ed, &size, ret);
699 if (ret) {
700 hx509_set_error_string(context, 0, ret,
710 if (ret)
716 return ret;
722 int ret;
731 ret = hx509_cert_init_data(context,
735 if (ret)
736 return ret;
737 ret = hx509_certs_add(context, certs, c);
739 if (ret)
740 return ret;
795 int ret, found_valid_sig;
806 ret = decode_SignedData(data, length, &sd, &size);
807 if (ret) {
808 hx509_set_error_string(context, 0, ret,
814 ret = HX509_CMS_NO_DATA_AVAILABLE;
815 hx509_set_error_string(context, 0, ret,
820 ret = HX509_CMS_NO_DATA_AVAILABLE;
821 hx509_set_error_string(context, 0, ret,
827 ret = der_copy_octet_string(sd.encapContentInfo.eContent, content);
829 ret = der_copy_octet_string(signedContent, content);
830 if (ret) {
831 hx509_set_error_string(context, 0, ret, "malloc: out of memory");
835 ret = hx509_certs_init(context, "MEMORY:cms-cert-buffer",
837 if (ret)
840 ret = hx509_certs_init(context, "MEMORY:cms-signer-certs",
842 if (ret)
847 ret = any_to_certs(context, &sd, certs);
848 if (ret)
852 ret = hx509_certs_merge(context, certs, pool);
853 if (ret)
866 ret = HX509_CMS_MISSING_SIGNER_DATA;
867 hx509_set_error_string(context, 0, ret,
873 ret = find_CMSIdentifier(context, &signer_info->sid, certs,
876 if (ret) {
885 ret = find_CMSIdentifier(context, &signer_info->sid, certs,
888 if (ret)
905 ret = HX509_CRYPTO_SIGNATURE_MISSING;
906 hx509_set_error_string(context, 0, ret,
913 ret = HX509_CRYPTO_SIGNATURE_MISSING;
914 hx509_set_error_string(context, 0, ret,
920 ret = decode_MessageDigest(attr->value.val[0].data,
924 if (ret) {
925 hx509_set_error_string(context, 0, ret,
931 ret = _hx509_verify_signature(context,
937 if (ret) {
938 hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
952 ret = HX509_CMS_DATA_OID_MISMATCH;
953 hx509_set_error_string(context, 0, ret,
958 ret = decode_ContentType(attr->value.val[0].data,
962 if (ret) {
963 hx509_set_error_string(context, 0, ret,
975 &size, ret);
976 if (ret) {
1001 ret = HX509_CMS_DATA_OID_MISMATCH;
1002 hx509_set_error_string(context, 0, ret,
1008 if (ret == 0) {
1009 ret = hx509_verify_signature(context,
1014 if (ret)
1015 hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
1021 if (ret)
1030 ret = hx509_verify_path(context, ctx, cert, certs);
1031 if (ret)
1035 ret = hx509_certs_add(context, *signer_certs, cert);
1036 if (ret)
1058 if (ret == 0) {
1059 ret = HX509_CMS_SIGNER_NOT_FOUND;
1060 hx509_set_error_string(context, 0, ret,
1066 ret = der_copy_oid(&sd.encapContentInfo.eContentType, contentType);
1067 if (ret) {
1076 if (ret) {
1085 return ret;
1095 int ret;
1102 ret = der_copy_oid(oid, &(*attr)[*len].type);
1103 if (ret)
1104 return ret;
1156 int ret = 0;
1161 ret = hx509_certs_init(context, "MEMORY:certs", 0, NULL, &certs);
1162 if (ret)
1163 return ret;
1164 ret = hx509_certs_add(context, certs, cert);
1165 if (ret)
1168 ret = hx509_cms_create_signed(context, flags, eContentType, data, length,
1174 return ret;
1199 int ret;
1213 ret = copy_AlgorithmIdentifier(sigctx->digest_alg, &digest);
1214 if (ret)
1217 ret = hx509_crypto_select(context, HX509_SELECT_DIGEST,
1221 if (ret)
1231 ret = ENOMEM;
1242 ret = fill_CMSIdentifier(cert, sigctx->cmsidflag, &signer_info->sid);
1243 if (ret) {
1251 ret = copy_AlgorithmIdentifier(&digest, &signer_info->digestAlgorithm);
1252 if (ret) {
1267 ret = ENOMEM;
1271 ret = _hx509_create_signature(context,
1277 if (ret)
1285 ret);
1287 if (ret) {
1294 ret = add_one_attribute(&signer_info->signedAttrs->val,
1298 if (ret) {
1310 ret);
1311 if (ret)
1316 ret = add_one_attribute(&signer_info->signedAttrs->val,
1320 if (ret) {
1334 ret);
1335 if (ret) {
1349 ret = hx509_crypto_select(context, HX509_SELECT_PUBLIC_SIG,
1352 if (ret)
1355 ret = _hx509_create_signature(context,
1362 if (ret)
1389 ret = hx509_certs_add(context, sigctx->certs, path.val[i]);
1390 if (ret) {
1405 return ret;
1414 int ret;
1422 ret = hx509_cert_binary(context, cert,
1424 if (ret == 0)
1427 return ret;
1450 int ret;
1487 ret = hx509_certs_init(context, "MEMORY:certs", 0, NULL, &sigctx.certs);
1488 if (ret)
1489 return ret;
1506 ret = ENOMEM;
1513 ret = ENOMEM;
1525 ret = hx509_certs_iter_f(context, certs, sig_process, &sigctx);
1526 if (ret)
1543 ret = add_DigestAlgorithmIdentifiers(&sigctx.sd.digestAlgorithms, di);
1544 if (ret) {
1559 ret = ENOMEM;
1563 ret = hx509_certs_iter_f(context, sigctx.certs, cert_process, &sigctx);
1564 if (ret)
1570 &sigctx.sd, &size, ret);
1571 if (ret) {
1582 return ret;
1596 int ret;
1601 ret = decode_CMSEncryptedData(data, length, &ed, NULL);
1602 if (ret) {
1603 hx509_set_error_string(context, 0, ret,
1605 return ret;
1609 ret = HX509_CMS_NO_DATA_AVAILABLE;
1610 hx509_set_error_string(context, 0, ret,
1615 ret = der_copy_oid(&ed.encryptedContentInfo.contentType, contentType);
1616 if (ret) {
1623 ret = HX509_ALG_NOT_SUPP;
1628 ret = _hx509_pbe_decrypt(context,
1633 if (ret)
1639 if (ret) {
1644 return ret;