HomeSort by relevance Sort by last modified time
    Searched refs:pass (Results 1 - 25 of 326) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /system/core/fastboot/
p12topem.sh 9 openssl pkcs12 -passin pass:"$2" -passout pass:"$2" -in $1.p12 -out $1.pem
genkey.sh 5 echo "Usage: $0 alias \"pass phrase\""
11 openssl genrsa -3 -out $1.pem -passout pass:"$2" 2048
14 openssl req -new -x509 -key $1.pem -passin pass:"$2" \
20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \
21 -out $1.p12 -name $1 -passout pass:"$2"
signfile.sh 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
  /packages/apps/Gallery3D/src/com/cooliris/media/
MediaFilter.java 20 public abstract boolean pass(MediaItem item); method in class:MediaFilter
  /external/openssl/crypto/pkcs12/
p12_p8d.c 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen)
65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
p12_kiss.c 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass,
73 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
113 if(!pass || !*pass) {
114 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL;
115 else if(PKCS12_verify_mac(p12, "", 0)) pass = "";
120 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
125 if (!parse_pk12 (p12, pass, -1, pkey, cert, ca)
    [all...]
pkcs12.h 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
184 const char *pass, int passlen,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
217 const char *pass, int passlen,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt
261 int key_nid, char *pass); variable
263 int safe_nid, int iter, char *pass); variable
    [all...]
p12_decr.c 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf)
121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
151 const char *pass, int passlen,
166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
p12_add.c 104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
161 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
184 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen,
193 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
198 pass, passlen,
202 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
205 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
  /external/webkit/WebKitTools/pywebsocket/test/testdata/handlers/sub/
exception_in_transfer_wsh.py 36 pass
no_wsh_at_the_end.py 36 pass
plain_wsh.py 32 pass
wrong_handshake_sig_wsh.py 36 pass
wrong_transfer_sig_wsh.py 36 pass
  /external/webkit/LayoutTests/fast/js/resources/
js-test-post-function.js 4 debug('<br><span class="pass">TEST COMPLETE</span>');
  /external/webkit/WebKitTools/Scripts/webkitpy/layout_tests/port/
test.py 81 pass
84 pass
90 pass
93 pass
96 pass
99 pass
102 pass
105 pass
144 pass
  /dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/
KSPasswordProtectionTest.java 80 char [] pass = {'a', 'b', 'c'}; local
81 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass);
84 assertEquals("Incorrect password length", pass.length, rPass.length);
85 for (int i = 0; i < pass.length; i++) {
87 .concat(")"), pass[i], rPass[i]);
AccessController2Test.java 71 Boolean pass; local
80 pass = AccessController.doPrivileged(privAction, null);
82 "AccessControlContext.", pass.booleanValue());
87 pass = AccessController.doPrivileged(privAction, acc);
89 "AccessControlContext.", pass.booleanValue());
102 Boolean pass; local
111 pass = AccessController.doPrivileged(privAction);
113 "AccessControlContext.", pass.booleanValue());
127 Boolean pass; local
140 pass = AccessController.doPrivileged(privExceptAction, null)
171 Boolean pass; local
    [all...]
  /external/iproute2/doc/
Makefile 35 @set -e; pass=2; echo "Running LaTeX $<"; \
38 if [ $$pass -gt 3 ]; then \
41 echo "Re-running LaTeX $<, $${pass}d pass"; pass=$$[$$pass + 1]; \
  /external/clearsilver/cs/
test_comma.cs 2 Comma tests, evalute both but pass right most as expression result
  /external/icu4c/test/intltest/
wbnf.cpp 1506 UBool pass; local
1522 UBool pass; local
1548 UBool pass = TRUE; local
1607 UBool pass = TRUE; local
1717 UBool pass; local
    [all...]
  /external/bluetooth/bluez/test/
dbusdef.py 16 pass
  /external/icu4c/test/cintltst/
crestst.h 52 int32_t pass; variable
  /external/webkit/WebKitTools/pywebsocket/example/
echo_wsh.py 38 pass # Always accept.
  /external/openssl/include/openssl/
pkcs12.h 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
184 const char *pass, int passlen,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
217 const char *pass, int passlen,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt
261 int key_nid, char *pass); variable
263 int safe_nid, int iter, char *pass); variable
    [all...]

Completed in 565 milliseconds

1 2 3 4 5 6 7 8 91011>>