Home
last modified time | relevance | path

Searched refs:p12 (Results 1 – 25 of 281) sorted by relevance

12345678910>>...12

/third_party/openssl/crypto/pkcs12/
Dp12_mutl.c18 int PKCS12_mac_present(const PKCS12 *p12) in PKCS12_mac_present() argument
20 return p12->mac ? 1 : 0; in PKCS12_mac_present()
27 const PKCS12 *p12) in PKCS12_get0_mac() argument
29 if (p12->mac) { in PKCS12_get0_mac()
30 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); in PKCS12_get0_mac()
32 *psalt = p12->mac->salt; in PKCS12_get0_mac()
34 *piter = p12->mac->iter; in PKCS12_get0_mac()
70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument
91 if (!PKCS7_type_is_data(p12->authsafes)) { in pkcs12_gen_mac()
96 salt = p12->mac->salt->data; in pkcs12_gen_mac()
[all …]
Dp12_npas.c20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
32 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) in PKCS12_newpass() argument
36 if (!p12) { in PKCS12_newpass()
44 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass()
49 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass()
59 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) in newpass_p12() argument
70 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) in newpass_p12()
105 p12_data_tmp = p12->authsafes->d.data; in newpass_p12()
106 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) in newpass_p12()
108 if (!PKCS12_pack_authsafes(p12, newsafes)) in newpass_p12()
[all …]
Dp12_crt.c35 PKCS12 *p12 = NULL; in PKCS12_create() local
112 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create()
114 if (!p12) in PKCS12_create()
122 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create()
125 return p12; in PKCS12_create()
128 PKCS12_free(p12); in PKCS12_create()
277 PKCS12 *p12; in PKCS12_add_safes() local
280 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes()
282 if (!p12) in PKCS12_add_safes()
285 if (!PKCS12_pack_authsafes(p12, safes)) { in PKCS12_add_safes()
[all …]
Dp12_kiss.c16 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
32 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument
45 if (!p12) { in PKCS12_parse()
61 if (PKCS12_verify_mac(p12, NULL, 0)) in PKCS12_parse()
63 else if (PKCS12_verify_mac(p12, "", 0)) in PKCS12_parse()
69 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse()
82 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { in PKCS12_parse()
131 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument
139 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) in parse_pk12()
Dp12_utl.c222 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument
224 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio()
228 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument
230 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp()
234 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument
236 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio()
240 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument
242 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
Dp12_add.c147 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument
150 &p12->authsafes->d.data)) in PKCS12_pack_authsafes()
155 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12) in STACK_OF()
157 if (!PKCS7_type_is_data(p12->authsafes)) { in STACK_OF()
162 return ASN1_item_unpack(p12->authsafes->d.data, in STACK_OF()
/third_party/openssl/include/openssl/
Dpkcs12.h78 int PKCS12_mac_present(const PKCS12 *p12);
83 const PKCS12 *p12);
128 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
129 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12);
172 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
174 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
175 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
178 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
210 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
[all …]
/third_party/openssl/demos/pkcs12/
Dpkread.c18 static char *find_friendly_name(PKCS12 *p12) in find_friendly_name() argument
27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL) in find_friendly_name()
54 PKCS12 *p12 = NULL; in main() local
67 p12 = d2i_PKCS12_fp(fp, NULL); in main()
69 if (p12 == NULL) { in main()
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main()
79 name = find_friendly_name(p12); in main()
80 PKCS12_free(p12); in main()
Dpkwrite.c23 PKCS12 *p12; in main() local
38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); in main()
39 if (!p12) { in main()
49 i2d_PKCS12_fp(fp, p12); in main()
50 PKCS12_free(p12); in main()
/third_party/openssl/doc/man3/
DPKCS12_newpass.pod11 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass);
17 B<p12> is a pointer to a PKCS12 structure. B<oldpass> is the existing password
51 PKCS12 *p12;
61 p12 = d2i_PKCS12_fp(fp, NULL);
63 if (p12 == NULL) {
68 if (PKCS12_newpass(p12, argv[2], argv[3]) == 0) {
71 PKCS12_free(p12);
76 PKCS12_free(p12);
79 i2d_PKCS12_fp(fp, p12);
80 PKCS12_free(p12);
/third_party/ffmpeg/tests/ref/vsynth/
Dvsynth_lena-vc2-420p121 98c9ce4afcbedb6634b10dcba9e5d8ec *tests/data/fate/vsynth_lena-vc2-420p12.mov
2 1516759 tests/data/fate/vsynth_lena-vc2-420p12.mov
3 b1c660113acab8eb4075f3d9fbb9cee9 *tests/data/fate/vsynth_lena-vc2-420p12.out.rawvideo
Dvsynth_lena-vc2-422p121 c2ec3fa0b1faf0cfdbee4410655037a0 *tests/data/fate/vsynth_lena-vc2-422p12.mov
2 1768027 tests/data/fate/vsynth_lena-vc2-422p12.mov
3 bd374304997834410a69ee6c6e047d19 *tests/data/fate/vsynth_lena-vc2-422p12.out.rawvideo
Dvsynth1-vc2-420p121 9e482c1b03d49cfec89c6515888bc735 *tests/data/fate/vsynth1-vc2-420p12.mov
2 1746007 tests/data/fate/vsynth1-vc2-420p12.mov
3 387696707c79cf1a6c9aeff4024226b9 *tests/data/fate/vsynth1-vc2-420p12.out.rawvideo
Dvsynth2-vc2-420p121 8ff2cd721eae2e95d91568dde88a9970 *tests/data/fate/vsynth2-vc2-420p12.mov
2 1525079 tests/data/fate/vsynth2-vc2-420p12.mov
3 01389f7ae4f2a3dc0d7b8384d435fd83 *tests/data/fate/vsynth2-vc2-420p12.out.rawvideo
Dvsynth1-vc2-444p121 f5ef425d9d29829e8dc4287ef253d3c7 *tests/data/fate/vsynth1-vc2-444p12.mov
2 2755159 tests/data/fate/vsynth1-vc2-444p12.mov
3 55998114d7386d219a49011c8b804a58 *tests/data/fate/vsynth1-vc2-444p12.out.rawvideo
Dvsynth2-vc2-422p121 ef1f1484a569008ba64803f25b06df54 *tests/data/fate/vsynth2-vc2-422p12.mov
2 1752535 tests/data/fate/vsynth2-vc2-422p12.mov
3 7241b922e7c17d14701567db6c743a9e *tests/data/fate/vsynth2-vc2-422p12.out.rawvideo
Dvsynth1-vc2-422p121 4dd111ed0272534faa258cb6a2dab13d *tests/data/fate/vsynth1-vc2-422p12.mov
2 2135131 tests/data/fate/vsynth1-vc2-422p12.mov
3 1b56b3d127320c0e6c643e3430b7ffd1 *tests/data/fate/vsynth1-vc2-422p12.out.rawvideo
Dvsynth_lena-vc2-444p121 effbd39862492bb3f81973ddce70a1d7 *tests/data/fate/vsynth_lena-vc2-444p12.mov
2 2134875 tests/data/fate/vsynth_lena-vc2-444p12.mov
3 a505434ec95362772a57d274f63a3f5a *tests/data/fate/vsynth_lena-vc2-444p12.out.rawvideo
Dvsynth2-vc2-444p121 1b535238247c0cdca338f2927e2c8c37 *tests/data/fate/vsynth2-vc2-444p12.mov
2 2145499 tests/data/fate/vsynth2-vc2-444p12.mov
3 38836be5c12b951c9b280d15fe3b31ce *tests/data/fate/vsynth2-vc2-444p12.out.rawvideo
/third_party/typescript/tests/baselines/reference/
DthisTypeInObjectLiterals2.js182 let p12 = defineProps(p1, { variable
195 p12.foo = p12.foo + 1;
196 p12.bar = p12.bar + 1;
365 var p12 = defineProps(p1, {
378 p12.foo = p12.foo + 1;
379 p12.bar = p12.bar + 1;
464 declare let p12: Point & {
DtransformsElideNullUndefinedType.js42 constructor(p12: null) { }
50 var C6 = class { constructor(p12: null) { } }
93 constructor(p12) { } argument
99 constructor(p12) { } argument
DtransformsElideNullUndefinedType.types126 constructor(p12: null) { }
127 >p12 : null
141 var C6 = class { constructor(p12: null) { } }
143 >class { constructor(p12: null) { } } : typeof C6
144 >p12 : null
/third_party/mindspore/mindspore/ccsrc/ps/core/communicator/
Dssl_http.cc75 PKCS12 *p12 = d2i_PKCS12_bio(bio, nullptr); in InitSSL() local
76 MS_EXCEPTION_IF_NULL(p12); in InitSSL()
78 if (!PKCS12_parse(p12, server_password.c_str(), &pkey, &cert, &ca_stack)) { in InitSSL()
81 PKCS12_free(p12); in InitSSL()
/third_party/openssl/apps/
Dpkcs12.c31 int dump_certs_keys_p12(BIO *out, const PKCS12 *p12,
140 PKCS12 *p12 = NULL; in pkcs12_main() local
461 p12 = PKCS12_create(cpass, name, key, ucert, certs, in pkcs12_main()
464 if (!p12) { in pkcs12_main()
475 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in pkcs12_main()
483 i2d_PKCS12_bio(out, p12); in pkcs12_main()
504 if ((p12 = d2i_PKCS12_bio(in, NULL)) == NULL) { in pkcs12_main()
527 if ((options & INFO) && PKCS12_mac_present(p12)) { in pkcs12_main()
534 PKCS12_get0_mac(&tmac, &macalgid, &tsalt, &tmaciter, p12); in pkcs12_main()
548 if (!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in pkcs12_main()
[all …]
/third_party/typescript/tests/cases/conformance/types/thisType/
DthisTypeInObjectLiterals2.ts185 let p12 = defineProps(p1, { variable
198 p12.foo = p12.foo + 1;
199 p12.bar = p12.bar + 1;

12345678910>>...12