/external/boringssl/src/include/openssl/ |
D | pkcs8.h | 146 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, 150 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12); 153 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12); 163 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 175 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 179 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12); 189 BORINGSSL_MAKE_DELETER(PKCS12, PKCS12_free)
|
D | base.h | 313 typedef struct pkcs12_st PKCS12; typedef
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 321 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); in PBEWithSHA1AESCBC128() 330 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); in PBEWithSHA1AESCBC192() 339 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA1AESCBC256() 351 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 128, 16); in PBEWithSHA256AESCBC128() 360 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 192, 16); in PBEWithSHA256AESCBC192() 369 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 256, 16); in PBEWithSHA256AESCBC256() 431 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); in PBEWithSHAAnd128BitAESBC() 443 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); in PBEWithSHAAnd192BitAESBC() 455 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAAnd256BitAESBC() 467 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); in PBEWithSHA256And128BitAESBC() [all …]
|
D | RC2.java | 121 …Aand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAnd128BitKeyFactory() 133 …hSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); in PBEWithSHAAnd40BitKeyFactory() 169 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAnd128BitRC2() 181 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8); in PBEWithSHAAnd40BitRC2()
|
D | DESede.java | 222 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); in PBEWithSHAAndDES3Key() 234 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAndDES2Key() 246 …dDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); in PBEWithSHAAndDES3KeyFactory() 258 …dDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAndDES2KeyFactory()
|
D | Twofish.java | 91 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAKeyFactory() 103 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA()
|
D | ARC4.java | 46 …PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); in PBEWithSHAAnd128BitKeyFactory() 58 …"PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); in PBEWithSHAAnd40BitKeyFactory()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 626 PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, in d2i_PKCS12() 628 PKCS12 *p12; in d2i_PKCS12() 630 p12 = OPENSSL_malloc(sizeof(PKCS12)); in d2i_PKCS12() 654 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) { in d2i_PKCS12_bio() 659 PKCS12 *ret = NULL; in d2i_PKCS12_bio() 703 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) { in d2i_PKCS12_fp() 705 PKCS12 *ret; in d2i_PKCS12_fp() 717 int PKCS12_parse(const PKCS12 *p12, const char *password, EVP_PKEY **out_pkey, in PKCS12_parse() 758 int PKCS12_verify_mac(const PKCS12 *p12, const char *password, in PKCS12_verify_mac() 783 void PKCS12_free(PKCS12 *p12) { in PKCS12_free()
|
D | pkcs12_test.cc | 920 bssl::UniquePtr<PKCS12> p12(d2i_PKCS12_bio(bio.get(), nullptr)); in TestCompat()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
D | PBE.java | 55 static final int PKCS12 = 2; field 149 else if (type == PKCS12) in makePBEGenerator() 502 if (type == PKCS12) in convertPassword()
|
D | BaseMac.java | 40 private int scheme = PKCS12; 151 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec); in engineInit()
|
D | BCPBEKey.java | 77 if (type == PBE.PKCS12) in getEncoded()
|
D | BaseWrapCipher.java | 60 protected int pbeType = PKCS12;
|
D | BaseStreamCipher.java | 177 …param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pb… in engineInit()
|
D | BaseBlockCipher.java | 536 if ((scheme == PKCS12 || key instanceof PKCS12Key) && !isBCPBEKeyWithoutIV(key)) in engineInit() 593 …param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pb… in engineInit()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
D | PKCS12.java | 6 public class PKCS12 class
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
D | SHA1.java | 81 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0); in PBEWithMacKeyFactory()
|
/external/curl/docs/examples/ |
D | curlx.c | 138 PKCS12 *p12;
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 2716 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, in tls_parse_pkcs12() 2852 PKCS12 *p12; in tls_read_pkcs12() 2881 PKCS12 *p12; in tls_read_pkcs12_blob()
|
/external/curl/lib/vtls/ |
D | openssl.c | 653 PKCS12 *p12; in cert_stuff()
|
/external/curl/ |
D | CHANGES | 1993 - openssl: enable PKCS12 support for !BoringSSL 1995 Enable PKCS12 for all non-boringssl builds without relying on configure
|