Lines Matching defs:bag
146 { SUNW_R_PARSE_BAG_ERR, "error parsing PKCS12 bag" },
147 { SUNW_R_MAKE_BAG_ERR, "error making PKCS12 bag" },
153 { SUNW_R_BAD_BAGTYPE, "unsupported bag type" },
644 PKCS12_SAFEBAG *bag = NULL;
673 if ((bag = M_PKCS12_x5092certbag(cert)) == NULL) {
686 if (PKCS12_add_friendlyname_asc(bag,
700 PKCS12_add_localkeyid(bag, str, len) == 0) {
706 if (sk_PKCS12_SAFEBAG_push(bags, bag) == 0) {
712 bag = NULL;
721 if ((bag = M_PKCS12_x5092certbag(cert)) == NULL) {
736 bag, (char const *) str,
749 PKCS12_add_localkeyid(bag, str, len) == 0) {
755 if (sk_PKCS12_SAFEBAG_push(bags, bag) == 0) {
761 bag = NULL;
795 /* Make a shrouded key bag */
801 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0,
803 if (bag == NULL) {
814 if (PKCS12_add_friendlyname_asc(bag,
826 if (PKCS12_add_localkeyid(bag, str, len) == 0) {
834 if (sk_PKCS12_SAFEBAG_push(bags, bag) == 0) {
840 bag = NULL;
898 if (bag != NULL)
899 PKCS12_SAFEBAG_free(bag);
1779 * parse_one_bag - Parse an individual bag
1781 * i = parse_one_bag(bag, pass, kl, cl);
1784 * bag - pkcs12 safebag to parse.
1800 parse_one_bag(PKCS12_SAFEBAG *bag, const char *pass, STACK_OF(EVP_PKEY) *kl,
1813 keyid = PKCS12_get_attr(bag, NID_localKeyID);
1814 fname = PKCS12_get_attr(bag, NID_friendlyName);
1816 switch (M_PKCS12_bag_type(bag)) {
1818 if ((pkey = EVP_PKCS82PKEY(bag->value.keybag)) == NULL) {
1830 if ((p8 = M_PKCS12_decrypt_skey(bag, pass, -1)) == NULL) {
1844 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) {
1848 if ((x509 = M_PKCS12_certbag2x509(bag)) == NULL) {
1913 if (parse_all_bags(bag->value.safes, pass, kl, cl) == 0) {