/third_party/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 24 int PKCS12_mac_present(const PKCS12 *p12) in PKCS12_mac_present() argument 26 return p12->mac ? 1 : 0; in PKCS12_mac_present() 33 const PKCS12 *p12) in PKCS12_get0_mac() argument 35 if (p12->mac) { in PKCS12_get0_mac() 36 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); in PKCS12_get0_mac() 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 40 *piter = p12->mac->iter; in PKCS12_get0_mac() 76 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 96 if (!PKCS7_type_is_data(p12->authsafes)) { in pkcs12_gen_mac() 101 salt = p12->mac->salt->data; in pkcs12_gen_mac() [all …]
|
D | p12_npas.c | 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 32 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) in PKCS12_newpass() argument 36 if (p12 == NULL) { in PKCS12_newpass() 43 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass() 48 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass() 58 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) in newpass_p12() argument 69 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) in newpass_p12() 104 p12_data_tmp = p12->authsafes->d.data; in newpass_p12() 105 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) in newpass_p12() 107 if (!PKCS12_pack_authsafes(p12, newsafes)) in newpass_p12() [all …]
|
D | p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 46 if (p12 == NULL) { in PKCS12_parse() 61 if (!PKCS12_mac_present(p12) in PKCS12_parse() 62 || PKCS12_verify_mac(p12, NULL, 0)) in PKCS12_parse() 64 else if (PKCS12_verify_mac(p12, "", 0)) in PKCS12_parse() 70 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 82 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { in PKCS12_parse() 136 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 144 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) in parse_pk12()
|
D | p12_crt.c | 36 PKCS12 *p12 = NULL; in PKCS12_create_ex() local 111 p12 = PKCS12_add_safes_ex(safes, 0, ctx, propq); in PKCS12_create_ex() 113 if (p12 == NULL) in PKCS12_create_ex() 121 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create_ex() 124 return p12; in PKCS12_create_ex() 127 PKCS12_free(p12); in PKCS12_create_ex() 317 PKCS12 *p12; in PKCS12_add_safes_ex() local 321 p12 = PKCS12_init_ex(nid_p7, ctx, propq); in PKCS12_add_safes_ex() 322 if (p12 == NULL) in PKCS12_add_safes_ex() 325 if (!PKCS12_pack_authsafes(p12, safes)) { in PKCS12_add_safes_ex() [all …]
|
D | p12_utl.c | 227 int i2d_PKCS12_bio(BIO *bp, const PKCS12 *p12) in i2d_PKCS12_bio() argument 229 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio() 233 int i2d_PKCS12_fp(FILE *fp, const PKCS12 *p12) in i2d_PKCS12_fp() argument 235 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp() 239 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument 241 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio() 245 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument 247 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
|
D | p12_add.c | 173 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument 176 &p12->authsafes->d.data)) in PKCS12_pack_authsafes() 181 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12) in STACK_OF() 187 if (!PKCS7_type_is_data(p12->authsafes)) { in STACK_OF() 191 p7s = ASN1_item_unpack(p12->authsafes->d.data, in STACK_OF() 196 if (!ossl_pkcs7_ctx_propagate(p12->authsafes, p7)) in STACK_OF()
|
/third_party/openssl/test/helpers/ |
D | pkcs12.c | 39 static int write_p12(PKCS12 *p12, const char *outfile); 43 static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac); 148 PKCS12 *p12; in generate_p12() local 160 p12 = PKCS12_add_safes(pb->safes, 0); in generate_p12() 162 p12 = PKCS12_add_safes_ex(pb->safes, 0, test_ctx, test_propq); in generate_p12() 163 if (!TEST_ptr(p12)) { in generate_p12() 175 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass), in generate_p12() 181 i2d_PKCS12_bio(pb->p12bio, p12); in generate_p12() 185 write_p12(p12, pb->filename); in generate_p12() 189 PKCS12_free(p12); in generate_p12() [all …]
|
/third_party/openssl/test/recipes/80-test_cmp_http_data/ |
D | test_credentials.csv | 3 …-section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.crt, -key,signer.p12, -keypass,pass:1234… 6 … cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.p12, -keypass,pass:1234… 9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp… 10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key… 12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,… 13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL… 15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,… 16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,… 17 1,keypass no prefix, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,12345,BLA… 18 0,keypass prefix wrong, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,:12345… [all …]
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | pkcs12.h | 78 int PKCS12_mac_present(const PKCS12 *p12); 83 const PKCS12 *p12); 128 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 129 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12); 172 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 174 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 175 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 178 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 210 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); [all …]
|
/third_party/openssl/demos/pkcs12/ |
D | pkread.c | 18 static char *find_friendly_name(PKCS12 *p12) in find_friendly_name() argument 27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL) in find_friendly_name() 54 PKCS12 *p12 = NULL; in main() local 67 p12 = d2i_PKCS12_fp(fp, NULL); in main() 69 if (p12 == NULL) { in main() 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 79 name = find_friendly_name(p12); in main() 80 PKCS12_free(p12); in main()
|
D | pkwrite.c | 23 PKCS12 *p12; in main() local 38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); in main() 39 if (!p12) { in main() 49 i2d_PKCS12_fp(fp, p12); in main() 50 PKCS12_free(p12); in main()
|
/third_party/openssl/doc/man3/ |
D | PKCS12_newpass.pod | 11 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass); 17 B<p12> is a pointer to a PKCS12 structure. B<oldpass> is the existing password 58 PKCS12 *p12; 68 p12 = d2i_PKCS12_fp(fp, NULL); 70 if (p12 == NULL) { 75 if (PKCS12_newpass(p12, argv[2], argv[3]) == 0) { 78 PKCS12_free(p12); 83 PKCS12_free(p12); 86 i2d_PKCS12_fp(fp, p12); 87 PKCS12_free(p12);
|
/third_party/typescript/tests/baselines/reference/ |
D | thisTypeInObjectLiterals2.js | 182 let p12 = defineProps(p1, { variable 195 p12.foo = p12.foo + 1; 196 p12.bar = p12.bar + 1; 365 var p12 = defineProps(p1, { 378 p12.foo = p12.foo + 1; 379 p12.bar = p12.bar + 1; 464 declare let p12: Point & {
|
D | transformsElideNullUndefinedType.js | 42 constructor(p12: null) { } 50 var C6 = class { constructor(p12: null) { } } 93 constructor(p12) { } argument 99 constructor(p12) { } argument
|
/third_party/ffmpeg/tests/ref/vsynth/ |
D | vsynth_lena-vc2-420p12 | 1 98c9ce4afcbedb6634b10dcba9e5d8ec *tests/data/fate/vsynth_lena-vc2-420p12.mov 2 1516759 tests/data/fate/vsynth_lena-vc2-420p12.mov 3 b1c660113acab8eb4075f3d9fbb9cee9 *tests/data/fate/vsynth_lena-vc2-420p12.out.rawvideo
|
D | vsynth2-vc2-444p12 | 1 1b535238247c0cdca338f2927e2c8c37 *tests/data/fate/vsynth2-vc2-444p12.mov 2 2145499 tests/data/fate/vsynth2-vc2-444p12.mov 3 38836be5c12b951c9b280d15fe3b31ce *tests/data/fate/vsynth2-vc2-444p12.out.rawvideo
|
D | vsynth1-vc2-420p12 | 1 9e482c1b03d49cfec89c6515888bc735 *tests/data/fate/vsynth1-vc2-420p12.mov 2 1746007 tests/data/fate/vsynth1-vc2-420p12.mov 3 387696707c79cf1a6c9aeff4024226b9 *tests/data/fate/vsynth1-vc2-420p12.out.rawvideo
|
D | vsynth1-vc2-422p12 | 1 4dd111ed0272534faa258cb6a2dab13d *tests/data/fate/vsynth1-vc2-422p12.mov 2 2135131 tests/data/fate/vsynth1-vc2-422p12.mov 3 1b56b3d127320c0e6c643e3430b7ffd1 *tests/data/fate/vsynth1-vc2-422p12.out.rawvideo
|
D | vsynth_lena-vc2-444p12 | 1 effbd39862492bb3f81973ddce70a1d7 *tests/data/fate/vsynth_lena-vc2-444p12.mov 2 2134875 tests/data/fate/vsynth_lena-vc2-444p12.mov 3 a505434ec95362772a57d274f63a3f5a *tests/data/fate/vsynth_lena-vc2-444p12.out.rawvideo
|
D | vsynth_lena-vc2-422p12 | 1 c2ec3fa0b1faf0cfdbee4410655037a0 *tests/data/fate/vsynth_lena-vc2-422p12.mov 2 1768027 tests/data/fate/vsynth_lena-vc2-422p12.mov 3 bd374304997834410a69ee6c6e047d19 *tests/data/fate/vsynth_lena-vc2-422p12.out.rawvideo
|
D | vsynth2-vc2-422p12 | 1 ef1f1484a569008ba64803f25b06df54 *tests/data/fate/vsynth2-vc2-422p12.mov 2 1752535 tests/data/fate/vsynth2-vc2-422p12.mov 3 7241b922e7c17d14701567db6c743a9e *tests/data/fate/vsynth2-vc2-422p12.out.rawvideo
|
D | vsynth2-vc2-420p12 | 1 8ff2cd721eae2e95d91568dde88a9970 *tests/data/fate/vsynth2-vc2-420p12.mov 2 1525079 tests/data/fate/vsynth2-vc2-420p12.mov 3 01389f7ae4f2a3dc0d7b8384d435fd83 *tests/data/fate/vsynth2-vc2-420p12.out.rawvideo
|
D | vsynth1-vc2-444p12 | 1 f5ef425d9d29829e8dc4287ef253d3c7 *tests/data/fate/vsynth1-vc2-444p12.mov 2 2755159 tests/data/fate/vsynth1-vc2-444p12.mov 3 55998114d7386d219a49011c8b804a58 *tests/data/fate/vsynth1-vc2-444p12.out.rawvideo
|
/third_party/openssl/apps/ |
D | pkcs12.c | 40 int dump_certs_keys_p12(BIO *out, const PKCS12 *p12, 179 PKCS12 *p12 = NULL; in pkcs12_main() local 667 p12 = PKCS12_create_ex(cpass, name, key, ee_cert, certs, in pkcs12_main() 671 if (p12 == NULL) { in pkcs12_main() 683 if (!PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd)) { in pkcs12_main() 695 i2d_PKCS12_bio(out, p12); in pkcs12_main() 719 p12 = PKCS12_init_ex(NID_pkcs7_data, app_get0_libctx(), app_get0_propq()); in pkcs12_main() 720 if (p12 == NULL) { in pkcs12_main() 724 if ((p12 = d2i_PKCS12_bio(in, &p12)) == NULL) { in pkcs12_main() 747 if ((options & INFO) && PKCS12_mac_present(p12)) { in pkcs12_main() [all …]
|
/third_party/openssl/include/openssl/ |
D | pkcs12.h.in | 95 int PKCS12_mac_present(const PKCS12 *p12); 100 const PKCS12 *p12); 175 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 176 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12); 259 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 261 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 262 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 265 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 283 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 314 int i2d_PKCS12_bio(BIO *bp, const PKCS12 *p12); [all …]
|