/external/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 76 if (!PKCS7_type_is_data(p12->authsafes)) in PKCS12_gen_mac() 82 salt = p12->mac->salt->data; in PKCS12_gen_mac() 83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac() 84 if (!p12->mac->iter) iter = 1; in PKCS12_gen_mac() 85 else iter = ASN1_INTEGER_get (p12->mac->iter); in PKCS12_gen_mac() 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { in PKCS12_gen_mac() 101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, in PKCS12_gen_mac() 102 p12->authsafes->d.data->length) in PKCS12_gen_mac() 113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument [all …]
|
D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() argument 82 if(!p12) { in PKCS12_newpass() 89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass() 94 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass() 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12() argument 114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; in newpass_p12() 155 p12_data_tmp = p12->authsafes->d.data; in newpass_p12() 156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; in newpass_p12() 157 if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; in newpass_p12() [all …]
|
D | p12_crt.c | 83 PKCS12 *p12 = NULL; in PKCS12_create() local 160 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create() 162 if (!p12) in PKCS12_create() 170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create() 173 return p12; in PKCS12_create() 177 if (p12) in PKCS12_create() 178 PKCS12_free(p12); in PKCS12_create() 343 PKCS12 *p12; in PKCS12_add_safes() local 346 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes() 348 if (!p12) in PKCS12_add_safes() [all …]
|
D | p12_utl.c | 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio() 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp() 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio() 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument 117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
|
D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); [all …]
|
D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 87 if(!p12) in PKCS12_parse() 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse() 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse() 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) in PKCS12_parse() 179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0; in parse_pk12()
|
D | p12_add.c | 224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument 227 &p12->authsafes->d.data)) in PKCS12_pack_authsafes() 232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF() 234 if (!PKCS7_type_is_data(p12->authsafes)) in STACK_OF() 239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); in STACK_OF()
|
/external/openssl/include/openssl/ |
D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); [all …]
|
/external/openssl/apps/ |
D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 105 PKCS12 *p12 = NULL; in MAIN() local 583 p12 = PKCS12_create(cpass, name, key, ucert, certs, in MAIN() 586 if (!p12) in MAIN() 603 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in MAIN() 610 i2d_PKCS12_bio(out, p12); in MAIN() 632 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { in MAIN() 650 …if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN… in MAIN() 656 if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in MAIN() 659 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in MAIN() [all …]
|
D | CA.sh | 151 -out newcert.p12 -export -name "$CNAME"
|
D | apps.c | 748 PKCS12 *p12; in load_pkcs12() local 749 p12 = d2i_PKCS12_bio(in, NULL); in load_pkcs12() 750 if (p12 == NULL) in load_pkcs12() 756 if (PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0)) in load_pkcs12() 771 if (!PKCS12_verify_mac(p12, tpass, len)) in load_pkcs12() 779 ret = PKCS12_parse(p12, pass, pkey, cert, ca); in load_pkcs12() 781 if (p12) in load_pkcs12() 782 PKCS12_free(p12); in load_pkcs12()
|
/external/opencv/cv/src/ |
D | cvposit.cpp | 303 float p12 = -(ata00 * ata12 - ata01 * ata02); in icvPseudoInverse3D() local 320 b[n + k] = (p01 * a0 + p11 * a1 + p12 * a2) * inv_det; in icvPseudoInverse3D() 321 b[2 * n + k] = (p02 * a0 + p12 * a1 + p22 * a2) * inv_det; in icvPseudoInverse3D()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 1718 static int tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, in tls_parse_pkcs12() argument 1730 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12() 1733 PKCS12_free(p12); in tls_parse_pkcs12() 1783 PKCS12_free(p12); in tls_parse_pkcs12() 1798 PKCS12 *p12; in tls_read_pkcs12() local 1804 p12 = d2i_PKCS12_fp(f, NULL); in tls_read_pkcs12() 1807 if (p12 == NULL) { in tls_read_pkcs12() 1813 return tls_parse_pkcs12(ssl_ctx, ssl, p12, passwd); in tls_read_pkcs12() 1827 PKCS12 *p12; in tls_read_pkcs12_blob() local 1829 p12 = d2i_PKCS12(NULL, (OPENSSL_d2i_TYPE) &blob, len); in tls_read_pkcs12_blob() [all …]
|
/external/chromium/net/data/ssl/certificates/ |
D | README | 32 - client.p12 : A PKCS #12 file containing a client certificate and a private
|
/external/wpa_supplicant_8/hostapd/ |
D | android.config | 123 # a file that usually has extension .p12 or .pfx)
|
D | defconfig | 121 # a file that usually has extension .p12 or .pfx)
|
/external/llvm/test/MC/Disassembler/ARM/ |
D | thumb-tests.txt | 221 # CHECK: stc2 p12, c15, [r9], {137}
|
/external/llvm/test/Other/ |
D | constant-fold-gep.ll | 453 @p12 = addrspace(12) global [4 x i8] zeroinitializer, align 1 457 %p = getelementptr inbounds i8* bitcast ([4 x i8] addrspace(12)* @p12 to i8*), 460 ; OPT: ret i8* getelementptr (i8* bitcast ([4 x i8] addrspace(12)* @p12 to i8*), i32 2)
|
/external/llvm/test/MC/ARM/ |
D | basic-arm-instructions.s | 802 ldc p12, c4, [r0, #4] 815 ldclo p12, c4, [r0, #4] 843 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0xed] 856 @ CHECK: ldclo p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0x3d] 2202 stc p12, c4, [r0, #4] 2215 stclo p12, c4, [r0, #4] 2243 @ CHECK: stc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x80,0xed] 2256 @ CHECK: stclo p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x80,0x3d]
|
D | basic-thumb2-instructions.s | 626 ldc p12, c4, [r0, #4] 654 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x90,0xed,0x01,0x4c] 1327 mrc2 p12, #3, r3, c3, c4 1332 @ CHECK: mrc2 p12, #3, r3, c3, c4, #0 @ encoding: [0x73,0xfe,0x14,0x3c] 2456 stc p12, c4, [r0, #4] 2484 @ CHECK: stc p12, c4, [r0, #4] @ encoding: [0x80,0xed,0x01,0x4c]
|
/external/openssl/crypto/md5/asm/ |
D | md5-ia64.S | 86 #define pPad2 p12
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/lang/ |
D | MathTest.java | 1058 double p12 = 12.0; in test_powDD() local 1063 double[] values = { p1, p2, p3, p4, p5, p6, p7, p8, p9, p10, p11, p12, in test_powDD()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | README-HS20 | 140 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
|
D | android.config | 213 # a file that usually has extension .p12 or .pfx)
|
/external/v8/src/arm/ |
D | assembler-arm.h | 387 p12 = 12, enumerator
|