/openbsd/usr.sbin/rpki-client/ |
H A D | cert.c | 37 int certid = TALSZ_MAX; variable 1243 io_simple_buffer(b, &p->certid, sizeof(p->certid)); in cert_buffer() 1277 io_read_buf(b, &p->certid, sizeof(p->certid)); in cert_read() 1311 if (a->cert->certid > b->cert->certid) in authcmp() 1313 if (a->cert->certid < b->cert->certid) in authcmp() 1338 c.certid = id; in auth_find() 1355 cert->certid = cert->talid; in auth_insert() 1357 cert->certid = ++certid; in auth_insert() 1358 if (certid > CERTID_MAX) { in auth_insert() 1359 if (certid == CERTID_MAX + 1) in auth_insert()
|
H A D | parser.c | 41 extern int certid; 105 if (certid <= CERTID_MAX) in find_issuer() 179 a = find_issuer(file, entp->certid, roa->aki, entp->mftaki); in proc_parser_roa() 221 a = find_issuer(file, entp->certid, spl->aki, entp->mftaki); in proc_parser_spl() 392 a = find_issuer(file, entp->certid, mft->aki, NULL); in proc_parser_mft_pre() 402 mft->certid = entp->certid; in proc_parser_mft_pre() 527 if (certid <= CERTID_MAX) in proc_parser_mft() 575 a = find_issuer(file, entp->certid, cert->aki, entp->mftaki); in proc_parser_cert() 721 a = find_issuer(file, entp->certid, gbr->aki, entp->mftaki); in proc_parser_gbr() 801 a = find_issuer(file, entp->certid, tak->aki, entp->mftaki); in proc_parser_tak() [all …]
|
H A D | main.c | 158 io_read_buf(b, &ent->certid, sizeof(ent->certid)); in entity_read_req() 179 io_simple_buffer(b, &ent->certid, sizeof(ent->certid)); in entity_write_req() 195 int talid = 0, certid = 0; in entity_write_repo() local 205 io_simple_buffer(b, &certid, sizeof(certid)); in entity_write_repo() 238 struct repo *rp, unsigned char *data, size_t datasz, int talid, int certid, in entityq_add() argument 249 p->certid = certid; in entityq_add() 425 mft->talid, mft->certid, mftaki); in queue_add_from_mft() 553 cert->talid, cert->certid, NULL); in queue_add_from_cert()
|
H A D | mft.c | 545 io_simple_buffer(b, &p->certid, sizeof(p->certid)); in mft_buffer() 579 io_read_buf(b, &p->certid, sizeof(p->certid)); in mft_read()
|
H A D | extern.h | 130 int certid; member 223 int certid; member 574 int certid; member
|
H A D | filemode.c | 195 a = auth_find(&auths, cert->certid); in parse_load_certchain()
|
/openbsd/sbin/iked/ |
H A D | eap.c | 94 struct iked_id *id, *certid; in eap_identity_request() local 114 certid = &sa->sa_rcert; in eap_identity_request() 125 (certid->id_type != IKEV2_CERT_NONE)) { in eap_identity_request() 134 cert->cert_type = certid->id_type; in eap_identity_request() 135 if (ibuf_add_ibuf(e, certid->id_buf) != 0) in eap_identity_request() 137 len = ibuf_size(certid->id_buf) + sizeof(*cert); in eap_identity_request()
|
H A D | ikev2_pld.c | 814 struct iked_id *certid; in ikev2_pld_cert() local 841 certid = &msg->msg_parent->msg_cert; in ikev2_pld_cert() 842 if (certid->id_type) { in ikev2_pld_cert() 845 certid = &msg->msg_parent->msg_scert[i]; in ikev2_pld_cert() 846 if (!certid->id_type) in ikev2_pld_cert() 849 if (certid->id_type) { in ikev2_pld_cert() 856 if ((certid->id_buf = ibuf_new(buf, len)) == NULL) { in ikev2_pld_cert() 860 certid->id_type = cert.cert_type; in ikev2_pld_cert() 861 certid->id_offset = 0; in ikev2_pld_cert()
|
H A D | ikev2.c | 1604 struct iked_id *id, *certid, peerid; in ikev2_init_ike_auth() local 1624 certid = &sa->sa_icert; in ikev2_init_ike_auth() 1651 (certid->id_type != IKEV2_CERT_NONE)) { in ikev2_init_ike_auth() 1659 cert->cert_type = certid->id_type; in ikev2_init_ike_auth() 1660 if (ibuf_add_ibuf(e, certid->id_buf) != 0) in ikev2_init_ike_auth() 3903 struct iked_id *id, *certid; in ikev2_resp_ike_auth() local 3938 certid = &sa->sa_icert; in ikev2_resp_ike_auth() 3941 certid = &sa->sa_rcert; in ikev2_resp_ike_auth() 3964 cert->cert_type = certid->id_type; in ikev2_resp_ike_auth() 7734 certid->id_buf == NULL) in ikev2_log_cert_info() [all …]
|