Lines Matching refs:spi
238 char *spi = NULL; in slp_verify() local
299 if ((err = slp_get_string(authblocks, len, &off, &spi)) in slp_verify()
306 spi, authiov, authiov_len, timestamp, &inbytes, &inbytes_len); in slp_verify()
316 err = do_verify(inbytes, inbytes_len, bsd, sig, siglen, spi); in slp_verify()
318 free(spi); in slp_verify()
322 free(spi); in slp_verify()
531 static SLPError make_tbs(const char *spi, in make_tbs() argument
542 *buflen = 2 + strlen(spi); in make_tbs()
560 if ((err = slp_add_string(p, *buflen, spi, &off)) != SLP_OK) { in make_tbs()
729 char *spi = NULL; in do_verify() local
741 "Unsupported BSD %d for given SPI %s", bsd, spi); in do_verify()
745 if ((ami_err = dld_ami_init(&amih, spi, NULL, 0, 0, NULL)) != AMI_OK) { in do_verify()
752 if ((err = SLPUnescape(esc_spi, &spi, SLP_FALSE))) { in do_verify()
757 if ((ami_err = dld_ami_get_cert(amih, spi, &certs, &ccnt)) != AMI_OK) { in do_verify()
760 spi, dld_ami_strerror(amih, ami_err)); in do_verify()
780 err = check_spis(amih, certs, icert, spi); in do_verify()
791 if (spi) free(spi); in do_verify()
846 const char *spi) { in check_spis() argument
883 if (dncmp(amih, prop_spi, spi) == 0) { in check_spis()