Searched refs:bag (Results 1 - 25 of 37) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/alsa-lib-1.0.26/src/mixer/
H A Dbag.c24 int bag_new(bag_t **bag) argument
30 *bag = b;
34 void bag_free(bag_t *bag) argument
36 assert(list_empty(bag));
37 free(bag);
40 int bag_empty(bag_t *bag) argument
42 return list_empty(bag);
45 int bag_add(bag_t *bag, void *ptr) argument
51 list_add_tail(&b->list, bag);
55 int bag_del(bag_t *bag, voi argument
69 bag_del_all(bag_t *bag) argument
[all...]
H A Dmixer_local.h32 int bag_new(bag_t **bag);
33 void bag_free(bag_t *bag);
34 int bag_add(bag_t *bag, void *ptr);
35 int bag_del(bag_t *bag, void *ptr);
36 int bag_empty(bag_t *bag);
37 void bag_del_all(bag_t *bag);
42 #define bag_for_each(pos, bag) list_for_each(pos, bag)
43 #define bag_for_each_safe(pos, next, bag) list_for_each_safe(pos, next, bag)
[all...]
H A DMakefile.am3 libmixer_la_SOURCES = bag.c mixer.c simple.c simple_none.c simple_abst.c
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/
H A Dp12_attr.c66 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument
69 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID,
91 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument
94 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument
104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) argument
113 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name,
138 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument
141 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam
[all...]
H A Dp12_crt.c65 PKCS12_SAFEBAG *bag);
67 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument
75 if (!X509at_add1_attr(&bag->attrib, attr))
87 PKCS12_SAFEBAG *bag = NULL; local
124 bag = PKCS12_add_cert(&bags, cert);
125 if (name && !PKCS12_add_friendlyname(bag, name, -1))
127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
146 if (!bag)
149 if (!copy_bag_attr(bag, pke
195 PKCS12_SAFEBAG *bag = NULL; local
238 PKCS12_SAFEBAG *bag = NULL; local
[all...]
H A Dp12_utl.c143 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument
145 if (M_PKCS12_bag_type(bag) != NID_certBag)
147 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate)
149 return ASN1_item_unpack(bag->value.bag->value.octet,
153 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument
155 if (M_PKCS12_bag_type(bag) != NID_crlBag)
157 if (M_PKCS12_cert_bag_type(bag) != NID_x509Crl)
159 return ASN1_item_unpack(bag->value.bag
[all...]
H A Dp12_add.c69 PKCS12_BAGS *bag; local
71 if (!(bag = PKCS12_BAGS_new())) {
75 bag->type = OBJ_nid2obj(nid1);
76 if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
84 safebag->value.bag = bag;
89 PKCS12_BAGS_free(bag);
97 PKCS12_SAFEBAG *bag; local
98 if (!(bag = PKCS12_SAFEBAG_new())) {
102 bag
114 PKCS12_SAFEBAG *bag; local
235 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
[all...]
H A Dp12_npas.c72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
143 /* Repack bag in same form with new password */
200 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
206 if (M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag)
209 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1)))
211 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen))
216 X509_SIG_free(bag->value.shkeybag);
217 bag->value.shkeybag = p8new;
H A Dp12_kiss.c72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
226 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument
235 if ((attrib = PKCS12_get_attr(bag, NID_friendlyName)))
238 if ((attrib = PKCS12_get_attr(bag, NID_localKeyID)))
241 switch (M_PKCS12_bag_type(bag)) {
245 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag)))
252 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
261 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate)
263 if (!(x509 = PKCS12_certbag2x509(bag)))
291 return parse_bags(bag
[all...]
H A Dpkcs12.h117 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon4925::__anon4926
119 X509_SIG *shkeybag; /* shrouded key bag */
137 ASN1_TYPE *other; /* Secret or other bag */
161 # define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
164 # define PKCS12_get_attr(bag, attr_nid) \
165 PKCS12_get_attr_gen(bag->attrib, attr_nid)
174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
182 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag,
202 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_attr.c65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument
68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID,
90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument
93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument
104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, argument
114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name,
137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument
140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam
[all...]
H A Dp12_add.c68 PKCS12_BAGS *bag; local
70 if (!(bag = PKCS12_BAGS_new())) {
74 bag->type = OBJ_nid2obj(nid1);
75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
83 safebag->value.bag = bag;
92 PKCS12_SAFEBAG *bag; local
93 if (!(bag = PKCS12_SAFEBAG_new())) {
97 bag->type = OBJ_nid2obj(NID_keyBag);
98 bag
108 PKCS12_SAFEBAG *bag; local
202 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
[all...]
H A Dp12_crt.c64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag);
73 PKCS12_SAFEBAG *bag = NULL; variable
103 bag = PKCS12_add_cert(&bags, cert);
104 if(name && !PKCS12_add_friendlyname(bag, name, -1))
106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
128 if (!bag)
136 if (!X509at_add1_attr(&bag->attrib, cspattr))
140 if(name && !PKCS12_add_friendlyname(bag, name, -1))
142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyi
178 PKCS12_SAFEBAG *bag = NULL; local
221 PKCS12_SAFEBAG *bag = NULL; local
[all...]
H A Dp12_utl.c133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument
135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL;
136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL;
137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509));
140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument
142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL;
143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL;
144 return ASN1_item_unpack(bag->value.bag
[all...]
H A Dp12_npas.c71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
135 /* Repack bag in same form with new password */
187 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
193 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1;
195 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0;
196 alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen);
199 X509_SIG_free(bag->value.shkeybag);
200 bag->value.shkeybag = p8new;
H A Dp12_kiss.c73 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
199 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument
210 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName)))
213 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) {
230 switch (M_PKCS12_bag_type(bag))
234 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) return 0;
240 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
249 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate )
251 if (!(x509 = PKCS12_certbag2x509(bag))) return 0;
287 return parse_bags(bag
[all...]
H A Dpkcs12.h116 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon7143::__anon7144
118 X509_SIG *shkeybag; /* shrouded key bag */
136 ASN1_TYPE *other; /* Secret or other bag */
160 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
163 #define PKCS12_get_attr(bag, attr_nid) \
164 PKCS12_get_attr_gen(bag->attrib, attr_nid)
174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
201 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_attr.c66 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument
69 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID,
91 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument
94 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument
104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) argument
113 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name,
138 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument
141 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam
[all...]
H A Dp12_crt.c65 PKCS12_SAFEBAG *bag);
67 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument
75 if (!X509at_add1_attr(&bag->attrib, attr))
87 PKCS12_SAFEBAG *bag = NULL; local
124 bag = PKCS12_add_cert(&bags, cert);
125 if (name && !PKCS12_add_friendlyname(bag, name, -1))
127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
146 if (!bag)
149 if (!copy_bag_attr(bag, pke
195 PKCS12_SAFEBAG *bag = NULL; local
238 PKCS12_SAFEBAG *bag = NULL; local
[all...]
H A Dp12_utl.c143 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument
145 if (M_PKCS12_bag_type(bag) != NID_certBag)
147 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate)
149 return ASN1_item_unpack(bag->value.bag->value.octet,
153 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument
155 if (M_PKCS12_bag_type(bag) != NID_crlBag)
157 if (M_PKCS12_cert_bag_type(bag) != NID_x509Crl)
159 return ASN1_item_unpack(bag->value.bag
[all...]
H A Dp12_add.c69 PKCS12_BAGS *bag; local
71 if (!(bag = PKCS12_BAGS_new())) {
75 bag->type = OBJ_nid2obj(nid1);
76 if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
84 safebag->value.bag = bag;
89 PKCS12_BAGS_free(bag);
97 PKCS12_SAFEBAG *bag; local
98 if (!(bag = PKCS12_SAFEBAG_new())) {
102 bag
114 PKCS12_SAFEBAG *bag; local
235 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
[all...]
H A Dp12_npas.c72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
143 /* Repack bag in same form with new password */
200 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
206 if (M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag)
209 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1)))
211 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen))
216 X509_SIG_free(bag->value.shkeybag);
217 bag->value.shkeybag = p8new;
H A Dp12_kiss.c72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
226 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument
235 if ((attrib = PKCS12_get_attr(bag, NID_friendlyName)))
238 if ((attrib = PKCS12_get_attr(bag, NID_localKeyID)))
241 switch (M_PKCS12_bag_type(bag)) {
245 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag)))
252 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
261 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate)
263 if (!(x509 = PKCS12_certbag2x509(bag)))
291 return parse_bags(bag
[all...]
H A Dpkcs12.h117 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon4576::__anon4577
119 X509_SIG *shkeybag; /* shrouded key bag */
137 ASN1_TYPE *other; /* Secret or other bag */
161 # define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
164 # define PKCS12_get_attr(bag, attr_nid) \
165 PKCS12_get_attr_gen(bag->attrib, attr_nid)
174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
182 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag,
202 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dpkcs12.h116 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon7214::__anon7215
118 X509_SIG *shkeybag; /* shrouded key bag */
136 ASN1_TYPE *other; /* Secret or other bag */
160 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
163 #define PKCS12_get_attr(bag, attr_nid) \
164 PKCS12_get_attr_gen(bag->attrib, attr_nid)
174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
201 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne
[all...]

Completed in 267 milliseconds

12