/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 76 if (!PKCS7_type_is_data(p12->authsafes)) in PKCS12_gen_mac() 82 salt = p12->mac->salt->data; in PKCS12_gen_mac() 83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac() 84 if (!p12->mac->iter) iter = 1; in PKCS12_gen_mac() 85 else iter = ASN1_INTEGER_get (p12->mac->iter); in PKCS12_gen_mac() 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { in PKCS12_gen_mac() 101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, in PKCS12_gen_mac() 102 p12->authsafes->d.data->length) in PKCS12_gen_mac() 113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument [all …]
|
D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() argument 82 if(!p12) { in PKCS12_newpass() 89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass() 94 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass() 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12() argument 114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; in newpass_p12() 155 p12_data_tmp = p12->authsafes->d.data; in newpass_p12() 156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; in newpass_p12() 157 if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; in newpass_p12() [all …]
|
D | p12_crt.c | 83 PKCS12 *p12 = NULL; in PKCS12_create() local 160 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create() 162 if (!p12) in PKCS12_create() 170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create() 173 return p12; in PKCS12_create() 177 if (p12) in PKCS12_create() 178 PKCS12_free(p12); in PKCS12_create() 343 PKCS12 *p12; in PKCS12_add_safes() local 346 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes() 348 if (!p12) in PKCS12_add_safes() [all …]
|
D | p12_utl.c | 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio() 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp() 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio() 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument 117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
|
D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); [all …]
|
D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 87 if(!p12) in PKCS12_parse() 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse() 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse() 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) in PKCS12_parse() 179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0; in parse_pk12()
|
D | p12_add.c | 224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument 227 &p12->authsafes->d.data)) in PKCS12_pack_authsafes() 232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF() 234 if (!PKCS7_type_is_data(p12->authsafes)) in STACK_OF() 239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); in STACK_OF()
|
/external/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 76 if (!PKCS7_type_is_data(p12->authsafes)) in PKCS12_gen_mac() 82 salt = p12->mac->salt->data; in PKCS12_gen_mac() 83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac() 84 if (!p12->mac->iter) iter = 1; in PKCS12_gen_mac() 85 else iter = ASN1_INTEGER_get (p12->mac->iter); in PKCS12_gen_mac() 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { in PKCS12_gen_mac() 101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, in PKCS12_gen_mac() 102 p12->authsafes->d.data->length) in PKCS12_gen_mac() 113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument [all …]
|
D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() argument 82 if(!p12) { in PKCS12_newpass() 89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass() 94 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass() 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12() argument 114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; in newpass_p12() 155 p12_data_tmp = p12->authsafes->d.data; in newpass_p12() 156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; in newpass_p12() 157 if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; in newpass_p12() [all …]
|
D | p12_crt.c | 83 PKCS12 *p12 = NULL; in PKCS12_create() local 160 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create() 162 if (!p12) in PKCS12_create() 170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create() 173 return p12; in PKCS12_create() 177 if (p12) in PKCS12_create() 178 PKCS12_free(p12); in PKCS12_create() 343 PKCS12 *p12; in PKCS12_add_safes() local 346 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes() 348 if (!p12) in PKCS12_add_safes() [all …]
|
D | p12_utl.c | 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio() 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp() 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio() 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument 117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
|
D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); [all …]
|
D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 87 if(!p12) in PKCS12_parse() 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse() 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse() 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) in PKCS12_parse() 179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0; in parse_pk12()
|
D | p12_add.c | 224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument 227 &p12->authsafes->d.data)) in PKCS12_pack_authsafes() 232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF() 234 if (!PKCS7_type_is_data(p12->authsafes)) in STACK_OF() 239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES)); in STACK_OF()
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); [all …]
|
/external/openssl/include/openssl/ |
D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) argument 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 260 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); [all …]
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 105 PKCS12 *p12 = NULL; in MAIN() local 583 p12 = PKCS12_create(cpass, name, key, ucert, certs, in MAIN() 586 if (!p12) in MAIN() 603 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in MAIN() 610 i2d_PKCS12_bio(out, p12); in MAIN() 632 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { in MAIN() 650 …if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN… in MAIN() 656 if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in MAIN() 659 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in MAIN() [all …]
|
/external/openssl/apps/ |
D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 105 PKCS12 *p12 = NULL; in MAIN() local 583 p12 = PKCS12_create(cpass, name, key, ucert, certs, in MAIN() 586 if (!p12) in MAIN() 603 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); in MAIN() 610 i2d_PKCS12_bio(out, p12); in MAIN() 632 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { in MAIN() 650 …if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN… in MAIN() 656 if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in MAIN() 659 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in MAIN() [all …]
|
/external/llvm/test/MC/ARM/ |
D | thumb-only-conditionals.s | 44 mrc2ne p12, #3, r3, c3, c4 47 @ CHECK-NEXT: mrc2ne p12, #3, r3, c3, c4
|
/external/chromium_org/net/data/ssl/certificates/ |
D | README | 28 - client.p12 : A PKCS #12 file containing a client certificate and a private 31 - client-nokey.p12 : A PKCS #12 file containing a client certificate (the same 32 as the one in client.p12) but no private key. The password is "12345". 129 - websocket_client_cert.p12 : A PKCS #12 file containing a client certificate 168 - duplicate_cn_1.p12 170 - duplicate_cn_2.p12 177 The .pem versions contain just the certs, while the .p12 versions contain
|
/external/chromium_org/net/data/ssl/scripts/ |
D | generate-duplicate-cn-certs.sh | 121 -out ../certificates/duplicate_cn_1.p12 \ 128 -out ../certificates/duplicate_cn_2.p12 \
|
D | generate-client-certificates.sh | 146 -out client_1.p12 \ 152 -out client_2.p12 \
|
/external/opencv/cv/src/ |
D | cvposit.cpp | 303 float p12 = -(ata00 * ata12 - ata01 * ata02); in icvPseudoInverse3D() local 320 b[n + k] = (p01 * a0 + p11 * a1 + p12 * a2) * inv_det; in icvPseudoInverse3D() 321 b[2 * n + k] = (p02 * a0 + p12 * a1 + p22 * a2) * inv_det; in icvPseudoInverse3D()
|
/external/chromium_org/ui/v2/src/ |
D | view_unittest.cc | 362 ViewObserver::TreeChangeParams p12; in TEST_F() local 363 p12 = p1; in TEST_F() 364 p12.receiver = &v12; in TEST_F() 365 p12.phase = ViewObserver::DISPOSITION_CHANGED; in TEST_F() 366 EXPECT_TRUE(TreeChangeParamsMatch(p12, o12.received_params().back())); in TEST_F()
|
/external/skia/tests/ |
D | PathOpsQuadIntersectionTest.cpp | 487 SkDPoint p12 = quad1.ptAtT(t12); in intersectionFinder() local 489 p10.fX, p10.fY, p1Seed.fX, p1Seed.fY, p12.fX, p12.fY); in intersectionFinder()
|