/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/alsa-lib-1.0.26/src/mixer/ |
H A D | bag.c | 24 int bag_new(bag_t **bag) argument 30 *bag = b; 34 void bag_free(bag_t *bag) argument 36 assert(list_empty(bag)); 37 free(bag); 40 int bag_empty(bag_t *bag) argument 42 return list_empty(bag); 45 int bag_add(bag_t *bag, void *ptr) argument 51 list_add_tail(&b->list, bag); 55 int bag_del(bag_t *bag, voi argument 69 bag_del_all(bag_t *bag) argument [all...] |
H A D | mixer_local.h | 32 int bag_new(bag_t **bag); 33 void bag_free(bag_t *bag); 34 int bag_add(bag_t *bag, void *ptr); 35 int bag_del(bag_t *bag, void *ptr); 36 int bag_empty(bag_t *bag); 37 void bag_del_all(bag_t *bag); 42 #define bag_for_each(pos, bag) list_for_each(pos, bag) 43 #define bag_for_each_safe(pos, next, bag) list_for_each_safe(pos, next, bag) [all...] |
H A D | Makefile.am | 3 libmixer_la_SOURCES = bag.c mixer.c simple.c simple_none.c simple_abst.c
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_attr.c | 66 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument 69 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 91 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument 94 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) argument 113 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 138 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument 141 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam [all...] |
H A D | p12_crt.c | 65 PKCS12_SAFEBAG *bag); 67 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 75 if (!X509at_add1_attr(&bag->attrib, attr)) 87 PKCS12_SAFEBAG *bag = NULL; local 124 bag = PKCS12_add_cert(&bags, cert); 125 if (name && !PKCS12_add_friendlyname(bag, name, -1)) 127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 146 if (!bag) 149 if (!copy_bag_attr(bag, pke 195 PKCS12_SAFEBAG *bag = NULL; local 238 PKCS12_SAFEBAG *bag = NULL; local [all...] |
H A D | p12_utl.c | 143 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument 145 if (M_PKCS12_bag_type(bag) != NID_certBag) 147 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) 149 return ASN1_item_unpack(bag->value.bag->value.octet, 153 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument 155 if (M_PKCS12_bag_type(bag) != NID_crlBag) 157 if (M_PKCS12_cert_bag_type(bag) != NID_x509Crl) 159 return ASN1_item_unpack(bag->value.bag [all...] |
H A D | p12_add.c | 69 PKCS12_BAGS *bag; local 71 if (!(bag = PKCS12_BAGS_new())) { 75 bag->type = OBJ_nid2obj(nid1); 76 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 84 safebag->value.bag = bag; 89 PKCS12_BAGS_free(bag); 97 PKCS12_SAFEBAG *bag; local 98 if (!(bag = PKCS12_SAFEBAG_new())) { 102 bag 114 PKCS12_SAFEBAG *bag; local 235 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
H A D | p12_npas.c | 72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 143 /* Repack bag in same form with new password */ 200 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument 206 if (M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) 209 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) 211 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen)) 216 X509_SIG_free(bag->value.shkeybag); 217 bag->value.shkeybag = p8new;
|
H A D | p12_kiss.c | 72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 226 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 235 if ((attrib = PKCS12_get_attr(bag, NID_friendlyName))) 238 if ((attrib = PKCS12_get_attr(bag, NID_localKeyID))) 241 switch (M_PKCS12_bag_type(bag)) { 245 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) 252 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 261 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) 263 if (!(x509 = PKCS12_certbag2x509(bag))) 291 return parse_bags(bag [all...] |
H A D | pkcs12.h | 117 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon4925::__anon4926 119 X509_SIG *shkeybag; /* shrouded key bag */ 137 ASN1_TYPE *other; /* Secret or other bag */ 161 # define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 164 # define PKCS12_get_attr(bag, attr_nid) \ 165 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 182 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, 202 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_attr.c | 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument 68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument 93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, argument 114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument 140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam [all...] |
H A D | p12_add.c | 68 PKCS12_BAGS *bag; local 70 if (!(bag = PKCS12_BAGS_new())) { 74 bag->type = OBJ_nid2obj(nid1); 75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 83 safebag->value.bag = bag; 92 PKCS12_SAFEBAG *bag; local 93 if (!(bag = PKCS12_SAFEBAG_new())) { 97 bag->type = OBJ_nid2obj(NID_keyBag); 98 bag 108 PKCS12_SAFEBAG *bag; local 202 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
H A D | p12_crt.c | 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag); 73 PKCS12_SAFEBAG *bag = NULL; variable 103 bag = PKCS12_add_cert(&bags, cert); 104 if(name && !PKCS12_add_friendlyname(bag, name, -1)) 106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 128 if (!bag) 136 if (!X509at_add1_attr(&bag->attrib, cspattr)) 140 if(name && !PKCS12_add_friendlyname(bag, name, -1)) 142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyi 178 PKCS12_SAFEBAG *bag = NULL; local 221 PKCS12_SAFEBAG *bag = NULL; local [all...] |
H A D | p12_utl.c | 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument 135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; 136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); 140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument 142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; 143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; 144 return ASN1_item_unpack(bag->value.bag [all...] |
H A D | p12_npas.c | 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 135 /* Repack bag in same form with new password */ 187 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument 193 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; 195 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; 196 alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen); 199 X509_SIG_free(bag->value.shkeybag); 200 bag->value.shkeybag = p8new;
|
H A D | p12_kiss.c | 73 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 199 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 210 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName))) 213 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) { 230 switch (M_PKCS12_bag_type(bag)) 234 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) return 0; 240 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 249 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) 251 if (!(x509 = PKCS12_certbag2x509(bag))) return 0; 287 return parse_bags(bag [all...] |
H A D | pkcs12.h | 116 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon7143::__anon7144 118 X509_SIG *shkeybag; /* shrouded key bag */ 136 ASN1_TYPE *other; /* Secret or other bag */ 160 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 163 #define PKCS12_get_attr(bag, attr_nid) \ 164 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 201 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_attr.c | 66 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument 69 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 91 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument 94 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) argument 113 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 138 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument 141 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam [all...] |
H A D | p12_crt.c | 65 PKCS12_SAFEBAG *bag); 67 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 75 if (!X509at_add1_attr(&bag->attrib, attr)) 87 PKCS12_SAFEBAG *bag = NULL; local 124 bag = PKCS12_add_cert(&bags, cert); 125 if (name && !PKCS12_add_friendlyname(bag, name, -1)) 127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 146 if (!bag) 149 if (!copy_bag_attr(bag, pke 195 PKCS12_SAFEBAG *bag = NULL; local 238 PKCS12_SAFEBAG *bag = NULL; local [all...] |
H A D | p12_utl.c | 143 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument 145 if (M_PKCS12_bag_type(bag) != NID_certBag) 147 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) 149 return ASN1_item_unpack(bag->value.bag->value.octet, 153 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument 155 if (M_PKCS12_bag_type(bag) != NID_crlBag) 157 if (M_PKCS12_cert_bag_type(bag) != NID_x509Crl) 159 return ASN1_item_unpack(bag->value.bag [all...] |
H A D | p12_add.c | 69 PKCS12_BAGS *bag; local 71 if (!(bag = PKCS12_BAGS_new())) { 75 bag->type = OBJ_nid2obj(nid1); 76 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 84 safebag->value.bag = bag; 89 PKCS12_BAGS_free(bag); 97 PKCS12_SAFEBAG *bag; local 98 if (!(bag = PKCS12_SAFEBAG_new())) { 102 bag 114 PKCS12_SAFEBAG *bag; local 235 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
H A D | p12_npas.c | 72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 143 /* Repack bag in same form with new password */ 200 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument 206 if (M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) 209 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) 211 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen)) 216 X509_SIG_free(bag->value.shkeybag); 217 bag->value.shkeybag = p8new;
|
H A D | p12_kiss.c | 72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 226 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 235 if ((attrib = PKCS12_get_attr(bag, NID_friendlyName))) 238 if ((attrib = PKCS12_get_attr(bag, NID_localKeyID))) 241 switch (M_PKCS12_bag_type(bag)) { 245 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) 252 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 261 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) 263 if (!(x509 = PKCS12_certbag2x509(bag))) 291 return parse_bags(bag [all...] |
H A D | pkcs12.h | 117 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon4576::__anon4577 119 X509_SIG *shkeybag; /* shrouded key bag */ 137 ASN1_TYPE *other; /* Secret or other bag */ 161 # define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 164 # define PKCS12_get_attr(bag, attr_nid) \ 165 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 182 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, 202 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 116 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon7214::__anon7215 118 X509_SIG *shkeybag; /* shrouded key bag */ 136 ASN1_TYPE *other; /* Secret or other bag */ 160 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 163 #define PKCS12_get_attr(bag, attr_nid) \ 164 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 201 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |