Lines Matching refs:status

47 	int connectionActive, status;  in connectCertstoreServer()  local
52 status = cryptCreateSession( &cryptSession, CRYPT_UNUSED, in connectCertstoreServer()
54 if( status == CRYPT_ERROR_PARAM3 ) /* Certstore session access not available */ in connectCertstoreServer()
56 if( cryptStatusError( status ) ) in connectCertstoreServer()
59 status, __LINE__ ); in connectCertstoreServer()
68 status = cryptKeysetOpen( &cryptCertStore, CRYPT_UNUSED, in connectCertstoreServer()
71 if( status == CRYPT_ERROR_PARAM3 ) in connectCertstoreServer()
81 if( cryptStatusOK( status ) ) in connectCertstoreServer()
83 status = cryptSetAttribute( cryptSession, in connectCertstoreServer()
87 if( cryptStatusError( status ) ) in connectCertstoreServer()
89 status, __LINE__ ) ); in connectCertstoreServer()
92 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_ACTIVE, TRUE ); in connectCertstoreServer()
94 if( cryptStatusError( status ) ) in connectCertstoreServer()
97 "certstore server session", status, __LINE__ ); in connectCertstoreServer()
103 status = cryptGetAttribute( cryptSession, CRYPT_SESSINFO_CONNECTIONACTIVE, in connectCertstoreServer()
105 if( cryptStatusError( status ) || !connectionActive ) in connectCertstoreServer()
108 "closed, operation", status, __LINE__ ); in connectCertstoreServer()
113 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_ACTIVE, TRUE ); in connectCertstoreServer()
114 if( cryptStatusError( status ) ) in connectCertstoreServer()
117 "certstore server transaction", status, __LINE__ ); in connectCertstoreServer()
119 return( status ); in connectCertstoreServer()
121 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_ACTIVE, TRUE ); in connectCertstoreServer()
122 if( cryptStatusError( status ) ) in connectCertstoreServer()
125 "certstore server transaction", status, __LINE__ ); in connectCertstoreServer()
127 return( status ); in connectCertstoreServer()
131 status = cryptDestroySession( cryptSession ); in connectCertstoreServer()
132 if( cryptStatusError( status ) ) in connectCertstoreServer()
135 status, __LINE__ ); in connectCertstoreServer()
149 int status; in connectCertstoreClient() local
153 status = cryptKeysetOpen( &cryptKeyset, CRYPT_UNUSED, CRYPT_KEYSET_HTTP, in connectCertstoreClient()
155 if( status == CRYPT_ERROR_PARAM3 ) in connectCertstoreClient()
160 if( cryptStatusError( status ) ) in connectCertstoreClient()
163 status, __LINE__ ); in connectCertstoreClient()
169 status = cryptGetPublicKey( cryptKeyset, &cryptCert, CRYPT_KEYID_EMAIL, in connectCertstoreClient()
171 if( cryptStatusError( status ) ) in connectCertstoreClient()
172 return( extErrorExit( cryptKeyset, "cryptGetPublicKey()", status, in connectCertstoreClient()
178 status = cryptGetPublicKey( cryptKeyset, &cryptCert, CRYPT_KEYID_EMAIL, in connectCertstoreClient()
180 if( status == CRYPT_ERROR_NOTFOUND ) in connectCertstoreClient()
184 return( extErrorExit( cryptKeyset, "cryptGetPublicKey()", status, in connectCertstoreClient()
195 status = cryptGetPublicKey( cryptKeyset, &cryptCert, CRYPT_KEYID_EMAIL, in connectCertstoreClient()
197 if( cryptStatusError( status ) ) in connectCertstoreClient()
198 return( extErrorExit( cryptKeyset, "cryptGetPublicKey()", status, in connectCertstoreClient()
228 int status; in testSessionHTTPCertstoreClientServer() local
237 status = connectCertstoreClient(); in testSessionHTTPCertstoreClientServer()
240 return( status ); in testSessionHTTPCertstoreClientServer()
276 int status; in connectRTCS() local
290 status = cryptCreateSession( &cryptSession, CRYPT_UNUSED, sessionType ); in connectRTCS()
291 if( status == CRYPT_ERROR_PARAM3 ) /* RTCS session access not available */ in connectRTCS()
293 if( cryptStatusError( status ) ) in connectRTCS()
296 status, __LINE__ ); in connectRTCS()
313 status = getPrivateKey( &cryptPrivateKey, fileNamePtr, in connectRTCS()
315 if( cryptStatusOK( status ) ) in connectRTCS()
317 status = cryptSetAttribute( cryptSession, in connectRTCS()
321 if( cryptStatusError( status ) ) in connectRTCS()
323 status, __LINE__ ) ); in connectRTCS()
327 status = cryptKeysetOpen( &cryptCertStore, CRYPT_UNUSED, in connectRTCS()
330 if( status == CRYPT_ERROR_PARAM3 ) in connectRTCS()
340 if( status == CRYPT_ERROR_OPEN ) in connectRTCS()
349 if( cryptStatusOK( status ) ) in connectRTCS()
351 status = cryptSetAttribute( cryptSession, in connectRTCS()
355 if( cryptStatusError( status ) ) in connectRTCS()
357 status, __LINE__ ) ); in connectRTCS()
369 status = cryptKeysetOpen( &cryptKeyset, CRYPT_UNUSED, in connectRTCS()
372 if( cryptStatusOK( status ) ) in connectRTCS()
374 status = cryptGetPublicKey( cryptKeyset, &cryptCert, in connectRTCS()
379 if( cryptStatusError( status ) ) in connectRTCS()
382 "code %d, line %d.\n", status, __LINE__ ); in connectRTCS()
399 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_REQUEST, in connectRTCS()
401 if( cryptStatusError( status ) ) in connectRTCS()
403 status, __LINE__ ) ); in connectRTCS()
412 status = cryptSetAttributeString( cryptSession, in connectRTCS()
415 if( cryptStatusError( status ) ) in connectRTCS()
417 "cryptSetAttributeString()", status, in connectRTCS()
430 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_ACTIVE, TRUE ); in connectRTCS()
433 if( cryptStatusError( status ) ) in connectRTCS()
437 "Attempt to activate RTCS client session", status, in connectRTCS()
439 if( !isServer && isServerDown( cryptSession, status ) ) in connectRTCS()
454 status = cryptGetAttribute( cryptSession, CRYPT_SESSINFO_RESPONSE, in connectRTCS()
456 if( cryptStatusError( status ) ) in connectRTCS()
459 "%d.\n", status, __LINE__ ); in connectRTCS()
467 status = cryptDestroySession( cryptSession ); in connectRTCS()
468 if( cryptStatusError( status ) ) in connectRTCS()
471 status, __LINE__ ); in connectRTCS()
484 int status; in connectRTCSDirect() local
489 status = importCertFromTemplate( &cryptCert, RTCS_FILE_TEMPLATE, in connectRTCSDirect()
491 if( cryptStatusError( status ) ) in connectRTCSDirect()
494 status, __LINE__ ); in connectRTCSDirect()
499 status = cryptCreateSession( &cryptSession, CRYPT_UNUSED, in connectRTCSDirect()
501 if( status == CRYPT_ERROR_PARAM3 ) /* RTCS session access not available */ in connectRTCSDirect()
504 status = cryptSetAttributeString( cryptSession, in connectRTCSDirect()
507 if( cryptStatusError( status ) ) in connectRTCSDirect()
509 status, __LINE__ ) ); in connectRTCSDirect()
513 status = cryptCheckCert( cryptCert, cryptSession ); in connectRTCSDirect()
514 printf( "Certificate status check returned %d.\n", status ); in connectRTCSDirect()
538 int status; in testSessionRTCSServer() local
542 status = connectRTCS( CRYPT_SESSION_RTCS_SERVER, FALSE, FALSE ); in testSessionRTCSServer()
545 return( status ); in testSessionRTCSServer()
564 int status; in testSessionRTCSClientServer() local
573 status = connectRTCS( CRYPT_SESSION_RTCS, FALSE, TRUE ); in testSessionRTCSClientServer()
576 return( status ); in testSessionRTCSClientServer()
651 int status; in connectOCSP() local
665 status = cryptCreateSession( &cryptSession, CRYPT_UNUSED, sessionType ); in connectOCSP()
666 if( status == CRYPT_ERROR_PARAM3 ) /* OCSP session access not available */ in connectOCSP()
668 if( cryptStatusError( status ) ) in connectOCSP()
671 status, __LINE__ ); in connectOCSP()
688 status = getPrivateKey( &cryptPrivateKey, fileNamePtr, in connectOCSP()
690 if( cryptStatusOK( status ) ) in connectOCSP()
692 status = cryptSetAttribute( cryptSession, in connectOCSP()
696 if( cryptStatusError( status ) ) in connectOCSP()
698 status, __LINE__ ) ); in connectOCSP()
702 status = cryptKeysetOpen( &cryptCertStore, CRYPT_UNUSED, in connectOCSP()
705 if( status == CRYPT_ERROR_PARAM3 ) in connectOCSP()
715 if( status == CRYPT_ERROR_OPEN ) in connectOCSP()
724 return( status ); in connectOCSP()
726 if( cryptStatusOK( status ) ) in connectOCSP()
728 status = cryptSetAttribute( cryptSession, in connectOCSP()
732 if( cryptStatusError( status ) ) in connectOCSP()
734 status, __LINE__ ) ); in connectOCSP()
755 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_REQUEST, in connectOCSP()
757 if( cryptStatusError( status ) ) in connectOCSP()
759 status, __LINE__ ) ); in connectOCSP()
768 status = cryptSetAttributeString( cryptSession, in connectOCSP()
771 if( cryptStatusError( status ) ) in connectOCSP()
774 "cryptSetAttributeString()", status, in connectOCSP()
782 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_VERSION, in connectOCSP()
784 if( cryptStatusError( status ) ) in connectOCSP()
787 status, __LINE__ ) ); in connectOCSP()
807 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_ACTIVE, TRUE ); in connectOCSP()
818 if( cryptStatusError( status ) ) in connectOCSP()
822 "Attempt to activate OCSP client session", status, in connectOCSP()
825 if( status == CRYPT_ERROR_SIGNATURE ) in connectOCSP()
830 status = cryptGetAttributeString( cryptSession, in connectOCSP()
833 if( cryptStatusOK( status ) && errorMessageLength >= 29 && \ in connectOCSP()
846 if( !isServer && isServerDown( cryptSession, status ) ) in connectOCSP()
865 status = cryptGetAttribute( cryptSession, CRYPT_SESSINFO_RESPONSE, in connectOCSP()
867 if( cryptStatusError( status ) ) in connectOCSP()
870 "%d.\n", status, __LINE__ ); in connectOCSP()
878 status = cryptCheckCert( cryptCert1, cryptOCSPResponse ); in connectOCSP()
880 "status %d.\n", status ); in connectOCSP()
883 status = cryptCheckCert( cryptCert2, cryptOCSPResponse ); in connectOCSP()
885 "response reports status %d.\n", status ); in connectOCSP()
901 status = cryptCheckCert( cryptOCSPResponse , CRYPT_UNUSED ); in connectOCSP()
902 if( cryptStatusError( status ) ) in connectOCSP()
904 status, __LINE__ ) ); in connectOCSP()
908 status = cryptDestroySession( cryptSession ); in connectOCSP()
909 if( cryptStatusError( status ) ) in connectOCSP()
912 status, __LINE__ ); in connectOCSP()
925 int status; in connectOCSPDirect() local
930 status = importCertFromTemplate( &cryptCert, OCSP_EEOK_FILE_TEMPLATE, in connectOCSPDirect()
932 if( cryptStatusError( status ) ) in connectOCSPDirect()
935 status, __LINE__ ); in connectOCSPDirect()
940 status = cryptCreateSession( &cryptSession, CRYPT_UNUSED, in connectOCSPDirect()
942 if( status == CRYPT_ERROR_PARAM3 ) /* OCSP session access not available */ in connectOCSPDirect()
945 status = cryptSetAttributeString( cryptSession, in connectOCSPDirect()
948 if( cryptStatusError( status ) ) in connectOCSPDirect()
950 status, __LINE__ ) ); in connectOCSPDirect()
958 status = cryptCheckCert( cryptCert, cryptSession ); in connectOCSPDirect()
959 printf( "Certificate status check returned %d.\n", status ); in connectOCSPDirect()
1004 int status; in testSessionOCSPClientServer() local
1013 status = connectOCSP( CRYPT_SESSION_OCSP, FALSE, FALSE, TRUE ); in testSessionOCSPClientServer()
1016 return( status ); in testSessionOCSPClientServer()
1023 int status; in testSessionOCSPMulticertClientServer() local
1032 status = connectOCSP( CRYPT_SESSION_OCSP, FALSE, TRUE, TRUE ); in testSessionOCSPMulticertClientServer()
1035 return( status ); in testSessionOCSPMulticertClientServer()
1115 int status; in testTSP() local
1131 status = cryptCreateContext( &hashContext, CRYPT_UNUSED, in testTSP()
1134 if( cryptStatusError( status ) ) in testTSP()
1142 status = cryptDeleteAttribute( cryptSession, in testTSP()
1144 if( cryptStatusError( status ) ) in testTSP()
1147 "line %d.\n", status, __LINE__ ); in testTSP()
1151 status = cryptSetAttribute( cryptSession, in testTSP()
1154 if( cryptStatusError( status ) ) in testTSP()
1157 "%d.\n", status, __LINE__ ); in testTSP()
1183 status = cryptSetAttribute( cryptSession, CRYPT_SESSINFO_ACTIVE, TRUE ); in testTSP()
1186 if( cryptStatusError( status ) ) in testTSP()
1190 "Attempt to activate TSP client session", status, in testTSP()
1192 if( !isServer && isServerDown( cryptSession, status ) ) in testTSP()
1211 status = cryptGetAttribute( cryptSession, CRYPT_SESSINFO_RESPONSE, in testTSP()
1213 if( cryptStatusError( status ) ) in testTSP()
1216 "timestamp", status, __LINE__ ); in testTSP()
1219 status = cryptPopData( cryptEnvelope, buffer, BUFFER_SIZE, in testTSP()
1221 if( cryptStatusError( status ) ) in testTSP()
1224 status, __LINE__ ); in testTSP()
1244 int status; in connectTSP() local
1258 status = cryptCreateSession( &cryptSession, CRYPT_UNUSED, sessionType ); in connectTSP()
1259 if( status == CRYPT_ERROR_PARAM3 ) /* TSP session access not available */ in connectTSP()
1261 if( cryptStatusError( status ) ) in connectTSP()
1264 "%d.\n", isServer ? "SVR: " : "", status, __LINE__ ); in connectTSP()
1279 status = getPrivateKey( &privateKey, TSA_PRIVKEY_FILE, in connectTSP()
1282 if( cryptStatusOK( status ) ) in connectTSP()
1284 status = cryptSetAttribute( cryptSession, in connectTSP()
1299 status = cryptSetAttributeString( cryptSession, in connectTSP()
1304 if( cryptStatusError( status ) ) in connectTSP()
1307 "error code %d, line %d.\n", status, __LINE__ ); in connectTSP()
1310 status = testTSP( cryptSession, isServer, FALSE, useAltHash, localSession ); in connectTSP()
1311 if( status <= 0 ) in connectTSP()
1312 return( status ); in connectTSP()
1319 status = cryptGetAttribute( cryptSession, CRYPT_SESSINFO_CONNECTIONACTIVE, in connectTSP()
1321 if( cryptStatusError( status ) || !connectionActive ) in connectTSP()
1327 status, __LINE__ ); in connectTSP()
1332 status = testTSP( cryptSession, isServer, TRUE, FALSE, FALSE ); in connectTSP()
1333 if( status <= 0 ) in connectTSP()
1334 return( status ); in connectTSP()
1335 status = testTSP( cryptSession, isServer, TRUE, FALSE, FALSE ); in connectTSP()
1336 if( status <= 0 ) in connectTSP()
1337 return( status ); in connectTSP()
1341 status = cryptDestroySession( cryptSession ); in connectTSP()
1342 if( cryptStatusError( status ) ) in connectTSP()
1345 status, __LINE__ ); in connectTSP()
1384 int status; in testSessionTSPClientServer() local
1393 status = connectTSP( CRYPT_SESSION_TSP, CRYPT_UNUSED, FALSE, TRUE ); in testSessionTSPClientServer()
1396 return( status ); in testSessionTSPClientServer()
1411 int status; in testSessionTSPClientServerPersistent() local
1420 status = connectTSP( CRYPT_SESSION_TSP, CRYPT_UNUSED, TRUE, TRUE ); in testSessionTSPClientServerPersistent()
1423 return( status ); in testSessionTSPClientServerPersistent()