/external/openssl/crypto/pkcs12/ |
D | pkcs12.h | 109 } PKCS12; typedef 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 217 PKCS12 *PKCS12_init(int mode); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 236 DECLARE_ASN1_FUNCTIONS(PKCS12) 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, [all …]
|
D | p12_utl.c | 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in i2d_PKCS12_bio() 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in i2d_PKCS12_fp() 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); in d2i_PKCS12_bio() 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() 117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); in d2i_PKCS12_fp()
|
D | p12_asn.c | 66 ASN1_SEQUENCE(PKCS12) = { 67 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER), 68 ASN1_SIMPLE(PKCS12, authsafes, PKCS7), 69 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA) 70 } ASN1_SEQUENCE_END(PKCS12) 72 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
|
D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() 113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() 132 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_set_mac() 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, in PKCS12_setup_mac()
|
D | p12_init.c | 65 PKCS12 *PKCS12_init(int mode) in PKCS12_init() 67 PKCS12 *pkcs12; in PKCS12_init()
|
D | p12_crt.c | 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, in PKCS12_create() 83 PKCS12 *p12 = NULL; in PKCS12_create() 356 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) in PKCS12_add_safes() 358 PKCS12 *p12; in PKCS12_add_safes()
|
D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) in PKCS12_newpass() 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) in newpass_p12()
|
D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() 179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12()
|
D | p12_add.c | 224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() 232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) in STACK_OF()
|
/external/openssl/include/openssl/ |
D | pkcs12.h | 109 } PKCS12; typedef 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 217 PKCS12 *PKCS12_init(int mode); 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 236 DECLARE_ASN1_FUNCTIONS(PKCS12) 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, [all …]
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
D | pkcs8.h | 147 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, 151 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12); 154 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12); 164 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 169 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 236 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); in PBEWithSHAAnd128BitAESBC() 248 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); in PBEWithSHAAnd192BitAESBC() 260 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAAnd256BitAESBC() 272 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); in PBEWithSHA256And128BitAESBC() 284 super("PBEWithSHA256And192BitAES-CBC-BC", null, true, PKCS12, SHA256, 192, 128); in PBEWithSHA256And192BitAESBC() 296 super("PBEWithSHA256And256BitAES-CBC-BC", null, true, PKCS12, SHA256, 256, 128); in PBEWithSHA256And256BitAESBC()
|
D | ARC4.java | 46 …PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); in PBEWithSHAAnd128BitKeyFactory() 58 …"PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); in PBEWithSHAAnd40BitKeyFactory()
|
D | RC2.java | 126 …Aand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAnd128BitKeyFactory() 138 …hSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); in PBEWithSHAAnd40BitKeyFactory()
|
D | Twofish.java | 93 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAKeyFactory()
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 1029 PKCS12* d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, size_t ber_len) { in d2i_PKCS12() 1030 PKCS12 *p12; in d2i_PKCS12() 1035 p12 = OPENSSL_malloc(sizeof(PKCS12)); in d2i_PKCS12() 1053 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) { in d2i_PKCS12_bio() 1058 PKCS12 *ret = NULL; in d2i_PKCS12_bio() 1097 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) { in d2i_PKCS12_fp() 1099 PKCS12 *ret; in d2i_PKCS12_fp() 1111 int PKCS12_parse(const PKCS12 *p12, const char *password, EVP_PKEY **out_pkey, in PKCS12_parse() 1151 void PKCS12_free(PKCS12 *p12) { in PKCS12_free()
|
/external/openssl/apps/ |
D | CA.pl | 54 $PKCS12="$openssl pkcs12"; 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
D | CA.pl.in | 54 $PKCS12="$openssl pkcs12"; 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
D | CA.sh | 69 PKCS12="openssl pkcs12" 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/external/chromium_org/chromeos/test/data/network/ |
D | repaired_toplevel_partially_invalid.onc | 41 …"PKCS12": "MIIGUQIBAzCCBhcGCSqGSIb3DQEHAaCCBggEggYEMIIGADCCAv8GCSqGSIb3DQEHBqCCAvAwggLsAgEAMIIC5QY… 46 …"PKCS12": "ERROR MIIGUQIBAzCCBhcGCSqGSIb3DQEHAaCCBggEggYEMIIGADCCAv8GCSqGSIb3DQEHBqCCAvAwggLsAgEAM…
|
D | toplevel_partially_invalid.onc | 48 …"PKCS12": "MIIGUQIBAzCCBhcGCSqGSIb3DQEHAaCCBggEggYEMIIGADCCAv8GCSqGSIb3DQEHBqCCAvAwggLsAgEAMIIC5QY… 53 …"PKCS12": "ERROR MIIGUQIBAzCCBhcGCSqGSIb3DQEHAaCCBggEggYEMIIGADCCAv8GCSqGSIb3DQEHBqCCAvAwggLsAgEAM…
|
D | certificate-client.onc | 5 …"PKCS12": "MIIGUQIBAzCCBhcGCSqGSIb3DQEHAaCCBggEggYEMIIGADCCAv8GCSqGSIb3DQEHBqCCAvAwggLsAgEAMIIC5QY…
|
D | certificate-client-update.onc | 5 …"PKCS12": "MIIGUQIBAzCCBhcGCSqGSIb3DQEHAaCCBggEggYEMIIGADCCAv8GCSqGSIb3DQEHBqCCAvAwggLsAgEAMIIC5QY…
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
D | PBE.java | 49 static final int PKCS12 = 2; field 129 else if (type == PKCS12) in makePBEGenerator() 343 if (type == PKCS12) in convertPassword()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
D | PKCS12.java | 6 public class PKCS12 class
|