/external/openssl/crypto/pkcs12/ |
D | p12_crt.c | 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag); 73 PKCS12_SAFEBAG *bag = NULL; in PKCS12_create() local 103 bag = PKCS12_add_cert(&bags, cert); in PKCS12_create() 104 if(name && !PKCS12_add_friendlyname(bag, name, -1)) in PKCS12_create() 106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); in PKCS12_create() 128 if (!bag) in PKCS12_create() 136 if (!X509at_add1_attr(&bag->attrib, cspattr)) in PKCS12_create() 140 if(name && !PKCS12_add_friendlyname(bag, name, -1)) in PKCS12_create() 142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() [all …]
|
D | p12_add.c | 68 PKCS12_BAGS *bag; in PKCS12_item_pack_safebag() local 70 if (!(bag = PKCS12_BAGS_new())) { in PKCS12_item_pack_safebag() 74 bag->type = OBJ_nid2obj(nid1); in PKCS12_item_pack_safebag() 75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { in PKCS12_item_pack_safebag() 83 safebag->value.bag = bag; in PKCS12_item_pack_safebag() 92 PKCS12_SAFEBAG *bag; in PKCS12_MAKE_KEYBAG() local 93 if (!(bag = PKCS12_SAFEBAG_new())) { in PKCS12_MAKE_KEYBAG() 97 bag->type = OBJ_nid2obj(NID_keyBag); in PKCS12_MAKE_KEYBAG() 98 bag->value.keybag = p8; in PKCS12_MAKE_KEYBAG() 99 return bag; in PKCS12_MAKE_KEYBAG() [all …]
|
D | p12_attr.c | 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, in PKCS12_add_localkeyid() argument 68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, in PKCS12_add_localkeyid() 90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, in PKCS12_add_friendlyname_asc() argument 93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, in PKCS12_add_friendlyname_asc() 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, in PKCS12_add_friendlyname_uni() argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, in PKCS12_add_friendlyname_uni() 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, in PKCS12_add_CSPName_asc() argument 114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, in PKCS12_add_CSPName_asc() 137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) in PKCS12_get_friendlyname() argument 140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL; in PKCS12_get_friendlyname()
|
D | p12_utl.c | 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) in PKCS12_certbag2x509() argument 135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; in PKCS12_certbag2x509() 136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; in PKCS12_certbag2x509() 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); in PKCS12_certbag2x509() 140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) in PKCS12_certbag2x509crl() argument 142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; in PKCS12_certbag2x509crl() 143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; in PKCS12_certbag2x509crl() 144 return ASN1_item_unpack(bag->value.bag->value.octet, in PKCS12_certbag2x509crl()
|
D | p12_kiss.c | 73 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 199 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 210 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName))) in parse_bag() 213 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) { in parse_bag() 230 switch (M_PKCS12_bag_type(bag)) in parse_bag() 234 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) return 0; in parse_bag() 240 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) in parse_bag() 249 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) in parse_bag() 251 if (!(x509 = PKCS12_certbag2x509(bag))) return 0; in parse_bag() 287 return parse_bags(bag->value.safes, pass, passlen, in parse_bag()
|
D | pkcs12.h | 116 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member 160 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 163 #define PKCS12_get_attr(bag, attr_nid) \ argument 164 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 201 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen); 202 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, 204 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, [all …]
|
D | p12_npas.c | 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 187 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) in newpass_bag() argument 193 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; in newpass_bag() 195 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; in newpass_bag() 196 alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen); in newpass_bag() 199 X509_SIG_free(bag->value.shkeybag); in newpass_bag() 200 bag->value.shkeybag = p8new; in newpass_bag()
|
D | p12_asn.c | 103 ADB_ENTRY(NID_certBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 104 ADB_ENTRY(NID_crlBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 105 ADB_ENTRY(NID_secretBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0))
|
/external/openssl/include/openssl/ |
D | pkcs12.h | 116 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member 160 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 163 #define PKCS12_get_attr(bag, attr_nid) \ argument 164 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 201 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen); 202 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, 204 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, [all …]
|
/external/openssl/apps/ |
D | pkcs12.c | 745 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass, in dump_certs_pkeys_bag() argument 752 switch (M_PKCS12_bag_type(bag)) in dump_certs_pkeys_bag() 757 print_attribs (out, bag->attrib, "Bag Attributes"); in dump_certs_pkeys_bag() 758 p8 = bag->value.keybag; in dump_certs_pkeys_bag() 768 alg_print (bio_err, bag->value.shkeybag->algor); in dump_certs_pkeys_bag() 771 print_attribs (out, bag->attrib, "Bag Attributes"); in dump_certs_pkeys_bag() 772 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) in dump_certs_pkeys_bag() 787 if (PKCS12_get_attr(bag, NID_localKeyID)) { in dump_certs_pkeys_bag() 790 print_attribs (out, bag->attrib, "Bag Attributes"); in dump_certs_pkeys_bag() 791 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) in dump_certs_pkeys_bag() [all …]
|
/external/icu4c/data/locales/ |
D | is.txt | 230 TT{"Trínidad og Tóbagó"} 801 "Trínidad og Tóbagó-dalur",
|
/external/webkit/WebKit/win/ |
D | ChangeLog | 908 Pass more information in the property bag passed to embeddedViewWithArguments. 2868 More property bag work. 2882 property bag values must be of the same type. 12817 …Pass an empty property bag when constructing the WebError, the code in Safari relies on having a u… 13492 Take a property bag. 13495 Return the property bag. 16582 New class which wraps a NavigationAction in a property bag. 17077 … Fix ownership issues so WebElementPropertyBag can one day be a value in another property bag.
|
/external/srec/config/en.us/dictionary/ |
D | large.ok | 1937 bag bag 1938 bagaoisan bag?6s@n 1940 bagen bag@n
|