/external/openssl/crypto/pkcs12/ |
D | p12_crt.c | 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag); 66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) in copy_bag_attr() argument 74 if (!X509at_add1_attr(&bag->attrib, attr)) in copy_bag_attr() 86 PKCS12_SAFEBAG *bag = NULL; in PKCS12_create() local 116 bag = PKCS12_add_cert(&bags, cert); in PKCS12_create() 117 if(name && !PKCS12_add_friendlyname(bag, name, -1)) in PKCS12_create() 119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); in PKCS12_create() 140 if (!bag) in PKCS12_create() 143 if (!copy_bag_attr(bag, pkey, NID_ms_csp_name)) in PKCS12_create() [all …]
|
D | p12_add.c | 68 PKCS12_BAGS *bag; in PKCS12_item_pack_safebag() local 70 if (!(bag = PKCS12_BAGS_new())) { in PKCS12_item_pack_safebag() 74 bag->type = OBJ_nid2obj(nid1); in PKCS12_item_pack_safebag() 75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { in PKCS12_item_pack_safebag() 83 safebag->value.bag = bag; in PKCS12_item_pack_safebag() 92 PKCS12_SAFEBAG *bag; in PKCS12_MAKE_KEYBAG() local 93 if (!(bag = PKCS12_SAFEBAG_new())) { in PKCS12_MAKE_KEYBAG() 97 bag->type = OBJ_nid2obj(NID_keyBag); in PKCS12_MAKE_KEYBAG() 98 bag->value.keybag = p8; in PKCS12_MAKE_KEYBAG() 99 return bag; in PKCS12_MAKE_KEYBAG() [all …]
|
D | p12_attr.c | 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, in PKCS12_add_localkeyid() argument 68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, in PKCS12_add_localkeyid() 90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, in PKCS12_add_friendlyname_asc() argument 93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, in PKCS12_add_friendlyname_asc() 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, in PKCS12_add_friendlyname_uni() argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, in PKCS12_add_friendlyname_uni() 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, in PKCS12_add_CSPName_asc() argument 114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, in PKCS12_add_CSPName_asc() 137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) in PKCS12_get_friendlyname() argument 140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL; in PKCS12_get_friendlyname()
|
D | p12_utl.c | 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) in PKCS12_certbag2x509() argument 135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; in PKCS12_certbag2x509() 136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; in PKCS12_certbag2x509() 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); in PKCS12_certbag2x509() 140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) in PKCS12_certbag2x509crl() argument 142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; in PKCS12_certbag2x509crl() 143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; in PKCS12_certbag2x509crl() 144 return ASN1_item_unpack(bag->value.bag->value.octet, in PKCS12_certbag2x509crl()
|
D | p12_kiss.c | 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 224 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 233 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName))) in parse_bag() 236 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) in parse_bag() 239 switch (M_PKCS12_bag_type(bag)) in parse_bag() 244 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) in parse_bag() 251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) in parse_bag() 259 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) in parse_bag() 261 if (!(x509 = PKCS12_certbag2x509(bag))) in parse_bag() 292 return parse_bags(bag->value.safes, pass, passlen, in parse_bag()
|
D | pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ argument 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen); 200 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, 202 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, [all …]
|
D | p12_npas.c | 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 192 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) in newpass_bag() argument 198 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; in newpass_bag() 200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; in newpass_bag() 201 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, in newpass_bag() 206 X509_SIG_free(bag->value.shkeybag); in newpass_bag() 207 bag->value.shkeybag = p8new; in newpass_bag()
|
D | p12_asn.c | 103 ADB_ENTRY(NID_certBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 104 ADB_ENTRY(NID_crlBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 105 ADB_ENTRY(NID_secretBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0))
|
/external/valgrind/main/coregrind/ |
D | m_wordfm.c | 856 WordBag* bag = alloc_nofail(cc, sizeof(WordBag)); in VG_() local 857 bag->fm = VG_(newFM)( alloc_nofail, cc, dealloc, NULL ); in VG_() 858 return bag; in VG_() 861 void VG_(deleteBag) ( WordBag* bag ) in VG_() 863 void (*dealloc)(void*) = bag->fm->dealloc; in VG_() 864 VG_(deleteFM)( bag->fm, NULL, NULL ); in VG_() 865 VG_(memset)(bag, 0, sizeof(WordBag)); in VG_() 866 dealloc(bag); in VG_() 869 void VG_(addToBag)( WordBag* bag, UWord w ) in VG_() 872 if (VG_(lookupFM)(bag->fm, &key, &count, w)) { in VG_() [all …]
|
/external/chromium/chrome/browser/sync/util/ |
D | cryptographer.cc | 92 sync_pb::NigoriKeyBag bag; in GetKeys() local 96 sync_pb::NigoriKey* key = bag.add_key(); in GetKeys() 104 return Encrypt(bag, encrypted); in GetKeys() 136 sync_pb::NigoriKeyBag bag; in SetKeys() local 137 if (!Decrypt(encrypted, &bag)) { in SetKeys() 140 InstallKeys(encrypted.key_name(), bag); in SetKeys() 162 sync_pb::NigoriKeyBag bag; in DecryptPendingKeys() local 163 if (!bag.ParseFromString(plaintext)) { in DecryptPendingKeys() 167 InstallKeys(pending_keys_->key_name(), bag); in DecryptPendingKeys() 245 const sync_pb::NigoriKeyBag& bag) { in InstallKeys() argument [all …]
|
D | cryptographer.h | 125 const sync_pb::NigoriKeyBag& bag);
|
/external/openssl/include/openssl/ |
D | pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ argument 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen); 200 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, 202 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, [all …]
|
/external/valgrind/main/helgrind/ |
D | hg_lock_n_thread.c | 52 static Bool is_sane_Bag_of_Threads ( WordBag* bag ) in is_sane_Bag_of_Threads() argument 56 VG_(initIterBag)( bag ); in is_sane_Bag_of_Threads() 57 while (VG_(nextIterBag)( bag, (Word*)&thr, &count )) { in is_sane_Bag_of_Threads() 61 VG_(doneIterBag)( bag ); in is_sane_Bag_of_Threads()
|
/external/openssl/apps/ |
D | pkcs12.c | 753 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass, in dump_certs_pkeys_bag() argument 760 switch (M_PKCS12_bag_type(bag)) in dump_certs_pkeys_bag() 765 print_attribs (out, bag->attrib, "Bag Attributes"); in dump_certs_pkeys_bag() 766 p8 = bag->value.keybag; in dump_certs_pkeys_bag() 776 alg_print (bio_err, bag->value.shkeybag->algor); in dump_certs_pkeys_bag() 779 print_attribs (out, bag->attrib, "Bag Attributes"); in dump_certs_pkeys_bag() 780 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) in dump_certs_pkeys_bag() 795 if (PKCS12_get_attr(bag, NID_localKeyID)) { in dump_certs_pkeys_bag() 798 print_attribs (out, bag->attrib, "Bag Attributes"); in dump_certs_pkeys_bag() 799 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) in dump_certs_pkeys_bag() [all …]
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
D | devicemanager.cc | 408 CComPtr<IPropertyBag> bag; in GetDevices() local 410 __uuidof(bag), reinterpret_cast<void**>(&bag)))) { in GetDevices() 413 if (SUCCEEDED(bag->Read(kFriendlyName, &name, 0)) && in GetDevices() 418 if (SUCCEEDED(bag->Read(kDevicePath, &path, 0)) && in GetDevices() 434 HRESULT GetStringProp(IPropertyStore* bag, PROPERTYKEY key, std::string* out) { in GetStringProp() argument 439 HRESULT hr = bag->GetValue(key, &var); in GetStringProp()
|
/external/guava/ |
D | README.android | 11 Guava-libraries are a grab bag of utility libraries published by Google as
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
D | JDKPKCS12KeyStore.java | 699 Pfx bag = Pfx.getInstance(obj); in engineLoad() local 700 ContentInfo info = bag.getAuthSafe(); in engineLoad() 705 if (bag.getMacData() != null) // check the mac code in engineLoad() 707 MacData mData = bag.getMacData(); in engineLoad()
|
/external/icu4c/data/region/ |
D | bas.txt | 214 TT{"Trìnidàd ɓɔ Tòbagò"}
|
D | is.txt | 278 TT{"Trínidad og Tóbagó"}
|
D | agq.txt | 217 TT{"Tèlenedà à Tòbagù"}
|
/external/icu4c/data/curr/ |
D | is.txt | 760 "Trínidad og Tóbagó-dalur",
|
/external/chromium/chrome/browser/ |
D | chrome_browser_application_mac.mm | 126 // Grab-bag exception, not very common. CFArray (or other
|
/external/chromium/chrome/browser/autocomplete/ |
D | autocomplete_edit_view_mac.mm | 100 // Returns a lazily initialized property bag accessor for saving our
|
/external/chromium/net/base/ |
D | ssl_false_start_blacklist.txt | 258 bag-mail.de 3339 services.bag-mail.de
|
/external/webkit/Source/WebKit/win/ |
D | ChangeLog-2009-06-16 | 2125 Pass more information in the property bag passed to embeddedViewWithArguments. 4085 More property bag work. 4099 property bag values must be of the same type. 14034 …Pass an empty property bag when constructing the WebError, the code in Safari relies on having a u… 14709 Take a property bag. 14712 Return the property bag. 17799 New class which wraps a NavigationAction in a property bag. 18294 … Fix ownership issues so WebElementPropertyBag can one day be a value in another property bag.
|