Home
last modified time | relevance | path

Searched refs:p12 (Results 1 – 25 of 53) sorted by relevance

123

/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
76 if (!PKCS7_type_is_data(p12->authsafes)) in PKCS12_gen_mac()
82 salt = p12->mac->salt->data; in PKCS12_gen_mac()
83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac()
84 if (!p12->mac->iter) iter = 1; in PKCS12_gen_mac()
85 else iter = ASN1_INTEGER_get (p12->mac->iter); in PKCS12_gen_mac()
87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { in PKCS12_gen_mac()
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, in PKCS12_gen_mac()
102 p12->authsafes->d.data->length) in PKCS12_gen_mac()
113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
[all …]
Dp12_npas.c68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() argument
82 if(!p12) { in PKCS12_newpass()
89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass()
94 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass()
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12() argument
114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; in newpass_p12()
155 p12_data_tmp = p12->authsafes->d.data; in newpass_p12()
156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; in newpass_p12()
157 if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; in newpass_p12()
[all …]
Dp12_crt.c83 PKCS12 *p12 = NULL; in PKCS12_create() local
160 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create()
162 if (!p12) in PKCS12_create()
170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create()
173 return p12; in PKCS12_create()
177 if (p12) in PKCS12_create()
178 PKCS12_free(p12); in PKCS12_create()
343 PKCS12 *p12; in PKCS12_add_safes() local
346 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes()
348 if (!p12) in PKCS12_add_safes()
[all …]
Dp12_utl.c98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument
100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio()
104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument
106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp()
110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument
112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio()
115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument
117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
[all …]
Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument
87 if(!p12) in PKCS12_parse()
107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse()
108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse()
113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse()
127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) in PKCS12_parse()
179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument
187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0; in parse_pk12()
Dp12_add.c224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument
227 &p12->authsafes->d.data)) in PKCS12_pack_authsafes()
232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF()
234 if (!PKCS7_type_is_data(p12->authsafes)) in STACK_OF()
239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); in STACK_OF()
/external/openssl/crypto/pkcs12/
Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
76 if (!PKCS7_type_is_data(p12->authsafes)) in PKCS12_gen_mac()
82 salt = p12->mac->salt->data; in PKCS12_gen_mac()
83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac()
84 if (!p12->mac->iter) iter = 1; in PKCS12_gen_mac()
85 else iter = ASN1_INTEGER_get (p12->mac->iter); in PKCS12_gen_mac()
87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { in PKCS12_gen_mac()
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, in PKCS12_gen_mac()
102 p12->authsafes->d.data->length) in PKCS12_gen_mac()
113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
[all …]
Dp12_npas.c68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() argument
82 if(!p12) { in PKCS12_newpass()
89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass()
94 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass()
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12() argument
114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; in newpass_p12()
155 p12_data_tmp = p12->authsafes->d.data; in newpass_p12()
156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; in newpass_p12()
157 if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; in newpass_p12()
[all …]
Dp12_crt.c83 PKCS12 *p12 = NULL; in PKCS12_create() local
160 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create()
162 if (!p12) in PKCS12_create()
170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create()
173 return p12; in PKCS12_create()
177 if (p12) in PKCS12_create()
178 PKCS12_free(p12); in PKCS12_create()
343 PKCS12 *p12; in PKCS12_add_safes() local
346 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes()
348 if (!p12) in PKCS12_add_safes()
[all …]
Dp12_utl.c98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument
100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio()
104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument
106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp()
110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument
112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio()
115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument
117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
[all …]
Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument
87 if(!p12) in PKCS12_parse()
107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse()
108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse()
113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse()
127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) in PKCS12_parse()
179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument
187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0; in parse_pk12()
Dp12_add.c224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument
227 &p12->authsafes->d.data)) in PKCS12_pack_authsafes()
232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF()
234 if (!PKCS7_type_is_data(p12->authsafes)) in STACK_OF()
239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); in STACK_OF()
/external/chromium_org/third_party/openssl/openssl/include/openssl/
Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
[all …]
/external/openssl/include/openssl/
Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
[all …]
/external/chromium_org/third_party/openssl/openssl/apps/
Dpkcs12.c83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
105 PKCS12 *p12 = NULL; in MAIN() local
583 p12 = PKCS12_create(cpass, name, key, ucert, certs, in MAIN()
586 if (!p12) in MAIN()
603 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in MAIN()
610 i2d_PKCS12_bio(out, p12); in MAIN()
632 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { in MAIN()
650 …if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN… in MAIN()
656 if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in MAIN()
659 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in MAIN()
[all …]
/external/openssl/apps/
Dpkcs12.c83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
105 PKCS12 *p12 = NULL; in MAIN() local
583 p12 = PKCS12_create(cpass, name, key, ucert, certs, in MAIN()
586 if (!p12) in MAIN()
603 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in MAIN()
610 i2d_PKCS12_bio(out, p12); in MAIN()
632 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { in MAIN()
650 …if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN… in MAIN()
656 if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in MAIN()
659 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in MAIN()
[all …]
/external/llvm/test/MC/ARM/
Dthumb-only-conditionals.s44 mrc2ne p12, #3, r3, c3, c4
47 @ CHECK-NEXT: mrc2ne p12, #3, r3, c3, c4
/external/chromium_org/net/data/ssl/certificates/
DREADME28 - client.p12 : A PKCS #12 file containing a client certificate and a private
31 - client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
32 as the one in client.p12) but no private key. The password is "12345".
129 - websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
168 - duplicate_cn_1.p12
170 - duplicate_cn_2.p12
177 The .pem versions contain just the certs, while the .p12 versions contain
/external/chromium_org/net/data/ssl/scripts/
Dgenerate-duplicate-cn-certs.sh121 -out ../certificates/duplicate_cn_1.p12 \
128 -out ../certificates/duplicate_cn_2.p12 \
Dgenerate-client-certificates.sh146 -out client_1.p12 \
152 -out client_2.p12 \
/external/opencv/cv/src/
Dcvposit.cpp303 float p12 = -(ata00 * ata12 - ata01 * ata02); in icvPseudoInverse3D() local
320 b[n + k] = (p01 * a0 + p11 * a1 + p12 * a2) * inv_det; in icvPseudoInverse3D()
321 b[2 * n + k] = (p02 * a0 + p12 * a1 + p22 * a2) * inv_det; in icvPseudoInverse3D()
/external/chromium_org/ui/v2/src/
Dview_unittest.cc362 ViewObserver::TreeChangeParams p12; in TEST_F() local
363 p12 = p1; in TEST_F()
364 p12.receiver = &v12; in TEST_F()
365 p12.phase = ViewObserver::DISPOSITION_CHANGED; in TEST_F()
366 EXPECT_TRUE(TreeChangeParamsMatch(p12, o12.received_params().back())); in TEST_F()
/external/skia/tests/
DPathOpsQuadIntersectionTest.cpp487 SkDPoint p12 = quad1.ptAtT(t12); in intersectionFinder() local
489 p10.fX, p10.fY, p1Seed.fX, p1Seed.fY, p12.fX, p12.fY); in intersectionFinder()

123