/external/boringssl/src/include/openssl/ |
D | pkcs8.h | 146 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, 150 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12); 153 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12); 159 OPENSSL_EXPORT int i2d_PKCS12(const PKCS12 *p12, uint8_t **out); 163 OPENSSL_EXPORT int i2d_PKCS12_bio(BIO *bio, const PKCS12 *p12); 167 OPENSSL_EXPORT int i2d_PKCS12_fp(FILE *fp, const PKCS12 *p12); 177 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 189 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 203 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name, 210 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12); [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 319 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); in PBEWithSHA1AESCBC128() 328 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); in PBEWithSHA1AESCBC192() 337 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA1AESCBC256() 349 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 128, 16); in PBEWithSHA256AESCBC128() 358 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 192, 16); in PBEWithSHA256AESCBC192() 367 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 256, 16); in PBEWithSHA256AESCBC256() 429 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); in PBEWithSHAAnd128BitAESBC() 441 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); in PBEWithSHAAnd192BitAESBC() 453 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAAnd256BitAESBC() 465 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); in PBEWithSHA256And128BitAESBC() [all …]
|
D | RC2.java | 122 …Aand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAnd128BitKeyFactory() 134 …hSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); in PBEWithSHAAnd40BitKeyFactory() 170 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAnd128BitRC2() 182 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8); in PBEWithSHAAnd40BitRC2()
|
D | DESede.java | 223 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); in PBEWithSHAAndDES3Key() 235 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAndDES2Key() 247 …dDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); in PBEWithSHAAndDES3KeyFactory() 259 …dDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAndDES2KeyFactory()
|
D | Twofish.java | 91 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAKeyFactory() 103 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA()
|
D | ARC4.java | 46 …PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); in PBEWithSHAAnd128BitKeyFactory() 58 …"PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); in PBEWithSHAAnd40BitKeyFactory()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 343 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); in PBEWithSHA1AESCBC128() 355 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); in PBEWithSHA1AESCBC192() 367 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA1AESCBC256() 380 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 128, 16); in PBEWithSHA256AESCBC128() 392 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 192, 16); in PBEWithSHA256AESCBC192() 404 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 256, 16); in PBEWithSHA256AESCBC256() 470 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); in PBEWithSHAAnd128BitAESBC() 483 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); in PBEWithSHAAnd192BitAESBC() 496 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAAnd256BitAESBC() 509 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); in PBEWithSHA256And128BitAESBC() [all …]
|
D | RC2.java | 128 …Aand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAnd128BitKeyFactory() 141 …hSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); in PBEWithSHAAnd40BitKeyFactory() 180 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAnd128BitRC2() 193 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8); in PBEWithSHAAnd40BitRC2()
|
D | DESede.java | 244 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); in PBEWithSHAAndDES3Key() 257 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAndDES2Key() 270 …dDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); in PBEWithSHAAndDES3KeyFactory() 283 …dDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAndDES2KeyFactory()
|
D | Twofish.java | 96 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAKeyFactory() 109 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA()
|
D | ARC4.java | 57 …PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); in PBEWithSHAAnd128BitKeyFactory() 70 …"PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); in PBEWithSHAAnd40BitKeyFactory()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 748 PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, in d2i_PKCS12() 750 PKCS12 *p12; in d2i_PKCS12() 752 p12 = OPENSSL_malloc(sizeof(PKCS12)); in d2i_PKCS12() 776 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) { in d2i_PKCS12_bio() 781 PKCS12 *ret = NULL; in d2i_PKCS12_bio() 825 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) { in d2i_PKCS12_fp() 827 PKCS12 *ret; in d2i_PKCS12_fp() 839 int i2d_PKCS12(const PKCS12 *p12, uint8_t **out) { in i2d_PKCS12() 863 int i2d_PKCS12_bio(BIO *bio, const PKCS12 *p12) { in i2d_PKCS12_bio() 867 int i2d_PKCS12_fp(FILE *fp, const PKCS12 *p12) { in i2d_PKCS12_fp() [all …]
|
D | pkcs12_test.cc | 1198 bssl::UniquePtr<PKCS12> p12(d2i_PKCS12_bio(bio.get(), nullptr)); in TestCompat() 1410 bssl::UniquePtr<PKCS12> pkcs12( in TestRoundTrip()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
D | PBE.java | 59 static final int PKCS12 = 2; field 169 else if (type == PKCS12) in makePBEGenerator() 522 if (type == PKCS12) in convertPassword()
|
D | BaseMac.java | 40 private int scheme = PKCS12; 151 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec); in engineInit()
|
D | BCPBEKey.java | 86 if (type == PBE.PKCS12) in getEncoded()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/util/ |
D | PBE.java | 63 static final int PKCS12 = 2; field 173 else if (type == PKCS12) in makePBEGenerator() 526 if (type == PKCS12) in convertPassword()
|
D | BaseMac.java | 44 private int scheme = PKCS12; 155 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec); in engineInit()
|
D | BCPBEKey.java | 90 if (type == PBE.PKCS12) in getEncoded()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
D | PKCS12.java | 6 public class PKCS12 class
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/ |
D | PKCS12.java | 10 public class PKCS12 class
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
D | SHA1.java | 81 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0); in PBEWithMacKeyFactory()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/digest/ |
D | SHA1.java | 94 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0); in PBEWithMacKeyFactory()
|
/external/python/oauth2client/ |
D | CONTRIBUTING.md | 157 P12/PKCS12 key file. You can download this in the same way as a JSON 160 corresponding to the P12/PKCS12 key file.
|
D | CHANGELOG.md | 208 * Add utility function to convert PKCS12 key to PEM. (#115) 275 * Better unicode handling with PKCS12 passwords (#31, thanks @jterrace). 311 PKCS12 formatted keys). Note that if you use PEM formatted keys you can use
|