Home
last modified time | relevance | path

Searched refs:p12 (Results 1 – 25 of 27) sorted by relevance

12

/external/openssl/crypto/pkcs12/
Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
76 if (!PKCS7_type_is_data(p12->authsafes)) in PKCS12_gen_mac()
82 salt = p12->mac->salt->data; in PKCS12_gen_mac()
83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac()
84 if (!p12->mac->iter) iter = 1; in PKCS12_gen_mac()
85 else iter = ASN1_INTEGER_get (p12->mac->iter); in PKCS12_gen_mac()
87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { in PKCS12_gen_mac()
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, in PKCS12_gen_mac()
102 p12->authsafes->d.data->length) in PKCS12_gen_mac()
113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
[all …]
Dp12_npas.c68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() argument
82 if(!p12) { in PKCS12_newpass()
89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass()
94 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass()
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12() argument
114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; in newpass_p12()
155 p12_data_tmp = p12->authsafes->d.data; in newpass_p12()
156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; in newpass_p12()
157 if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; in newpass_p12()
[all …]
Dp12_crt.c83 PKCS12 *p12 = NULL; in PKCS12_create() local
160 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create()
162 if (!p12) in PKCS12_create()
170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create()
173 return p12; in PKCS12_create()
177 if (p12) in PKCS12_create()
178 PKCS12_free(p12); in PKCS12_create()
343 PKCS12 *p12; in PKCS12_add_safes() local
346 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes()
348 if (!p12) in PKCS12_add_safes()
[all …]
Dp12_utl.c98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument
100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio()
104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument
106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp()
110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument
112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio()
115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument
117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
[all …]
Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument
87 if(!p12) in PKCS12_parse()
107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse()
108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse()
113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse()
127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) in PKCS12_parse()
179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument
187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0; in parse_pk12()
Dp12_add.c224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument
227 &p12->authsafes->d.data)) in PKCS12_pack_authsafes()
232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF()
234 if (!PKCS7_type_is_data(p12->authsafes)) in STACK_OF()
239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); in STACK_OF()
/external/openssl/include/openssl/
Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
[all …]
/external/openssl/apps/
Dpkcs12.c83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
105 PKCS12 *p12 = NULL; in MAIN() local
583 p12 = PKCS12_create(cpass, name, key, ucert, certs, in MAIN()
586 if (!p12) in MAIN()
603 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in MAIN()
610 i2d_PKCS12_bio(out, p12); in MAIN()
632 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { in MAIN()
650 …if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN… in MAIN()
656 if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in MAIN()
659 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in MAIN()
[all …]
DCA.sh151 -out newcert.p12 -export -name "$CNAME"
Dapps.c748 PKCS12 *p12; in load_pkcs12() local
749 p12 = d2i_PKCS12_bio(in, NULL); in load_pkcs12()
750 if (p12 == NULL) in load_pkcs12()
756 if (PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0)) in load_pkcs12()
771 if (!PKCS12_verify_mac(p12, tpass, len)) in load_pkcs12()
779 ret = PKCS12_parse(p12, pass, pkey, cert, ca); in load_pkcs12()
781 if (p12) in load_pkcs12()
782 PKCS12_free(p12); in load_pkcs12()
/external/opencv/cv/src/
Dcvposit.cpp303 float p12 = -(ata00 * ata12 - ata01 * ata02); in icvPseudoInverse3D() local
320 b[n + k] = (p01 * a0 + p11 * a1 + p12 * a2) * inv_det; in icvPseudoInverse3D()
321 b[2 * n + k] = (p02 * a0 + p12 * a1 + p22 * a2) * inv_det; in icvPseudoInverse3D()
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl.c1718 static int tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, in tls_parse_pkcs12() argument
1730 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12()
1733 PKCS12_free(p12); in tls_parse_pkcs12()
1783 PKCS12_free(p12); in tls_parse_pkcs12()
1798 PKCS12 *p12; in tls_read_pkcs12() local
1804 p12 = d2i_PKCS12_fp(f, NULL); in tls_read_pkcs12()
1807 if (p12 == NULL) { in tls_read_pkcs12()
1813 return tls_parse_pkcs12(ssl_ctx, ssl, p12, passwd); in tls_read_pkcs12()
1827 PKCS12 *p12; in tls_read_pkcs12_blob() local
1829 p12 = d2i_PKCS12(NULL, (OPENSSL_d2i_TYPE) &blob, len); in tls_read_pkcs12_blob()
[all …]
/external/chromium/net/data/ssl/certificates/
DREADME32 - client.p12 : A PKCS #12 file containing a client certificate and a private
/external/wpa_supplicant_8/hostapd/
Dandroid.config123 # a file that usually has extension .p12 or .pfx)
Ddefconfig121 # a file that usually has extension .p12 or .pfx)
/external/llvm/test/MC/Disassembler/ARM/
Dthumb-tests.txt221 # CHECK: stc2 p12, c15, [r9], {137}
/external/llvm/test/Other/
Dconstant-fold-gep.ll453 @p12 = addrspace(12) global [4 x i8] zeroinitializer, align 1
457 %p = getelementptr inbounds i8* bitcast ([4 x i8] addrspace(12)* @p12 to i8*),
460 ; OPT: ret i8* getelementptr (i8* bitcast ([4 x i8] addrspace(12)* @p12 to i8*), i32 2)
/external/llvm/test/MC/ARM/
Dbasic-arm-instructions.s802 ldc p12, c4, [r0, #4]
815 ldclo p12, c4, [r0, #4]
843 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0xed]
856 @ CHECK: ldclo p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0x3d]
2202 stc p12, c4, [r0, #4]
2215 stclo p12, c4, [r0, #4]
2243 @ CHECK: stc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x80,0xed]
2256 @ CHECK: stclo p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x80,0x3d]
Dbasic-thumb2-instructions.s626 ldc p12, c4, [r0, #4]
654 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x90,0xed,0x01,0x4c]
1327 mrc2 p12, #3, r3, c3, c4
1332 @ CHECK: mrc2 p12, #3, r3, c3, c4, #0 @ encoding: [0x73,0xfe,0x14,0x3c]
2456 stc p12, c4, [r0, #4]
2484 @ CHECK: stc p12, c4, [r0, #4] @ encoding: [0x80,0xed,0x01,0x4c]
/external/openssl/crypto/md5/asm/
Dmd5-ia64.S86 #define pPad2 p12
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/lang/
DMathTest.java1058 double p12 = 12.0; in test_powDD() local
1063 double[] values = { p1, p2, p3, p4, p5, p6, p7, p8, p9, p10, p11, p12, in test_powDD()
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-HS20140 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
Dandroid.config213 # a file that usually has extension .p12 or .pfx)
/external/v8/src/arm/
Dassembler-arm.h387 p12 = 12, enumerator

12