/dalvik/libcore/support/src/test/java/targets/ |
KeyStores.java | 21 static abstract class PKCS12 extends Internal {
|
/external/openssl/crypto/pkcs12/ |
p12_utl.c | 61 #include <openssl/pkcs12.h> 104 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) 106 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 110 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) 112 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 116 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) 118 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 121 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12 [all...] |
p12_init.c | 61 #include <openssl/pkcs12.h> 63 /* Initialise a PKCS12 structure to take data */ 65 PKCS12 *PKCS12_init(int mode) 67 PKCS12 *pkcs12; local 68 if (!(pkcs12 = PKCS12_new())) { 72 ASN1_INTEGER_set(pkcs12->version, 3); 73 pkcs12->authsafes->type = OBJ_nid2obj(mode); 76 if (!(pkcs12->authsafes->d.data = 88 return pkcs12; [all...] |
pkcs12.h | 0 /* pkcs12.h */ 109 } PKCS12; 198 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 199 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 219 PKCS12 *PKCS12_init(int mode); 227 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 229 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 230 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 243 DECLARE_ASN1_FUNCTIONS(PKCS12) [all...] |
p12_asn.c | 62 #include <openssl/pkcs12.h> 66 ASN1_SEQUENCE(PKCS12) = { 67 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER), 68 ASN1_SIMPLE(PKCS12, authsafes, PKCS7), 69 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA) 70 } ASN1_SEQUENCE_END(PKCS12) 72 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
|
p12_mutl.c | 64 #include <openssl/pkcs12.h> 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 105 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) 124 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
|
p12_npas.c | 64 #include <openssl/pkcs12.h> 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) 80 /* Check for NULL PKCS12 structure */ 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
|
p12_crt.c | 61 #include <openssl/pkcs12.h> 83 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 87 PKCS12 *p12 = NULL; 352 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) 354 PKCS12 *p12;
|
p12_add.c | 61 #include <openssl/pkcs12.h> 208 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) 216 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
|
p12_kiss.c | 61 #include <openssl/pkcs12.h> 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 87 /* Check for NULL PKCS12 structure */ 144 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
|
/external/openssl/include/openssl/ |
pkcs12.h | 0 /* pkcs12.h */ 109 } PKCS12; 198 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 199 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 219 PKCS12 *PKCS12_init(int mode); 227 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 229 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 230 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 243 DECLARE_ASN1_FUNCTIONS(PKCS12) [all...] |
/frameworks/base/core/java/android/webkit/ |
CertTool.java | 40 static final String PKCS12 = Credentials.PKCS12;
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
JCESecretKeyFactory.java | 380 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); 392 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); 404 // super("PBEwithSHAand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); 417 super("PBEwithSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbewithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); 430 // super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); 442 // super("PBEwithSHAandIDEA-CBC", null, true, PKCS12, SHA1, 128, 64); 454 // super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); 466 // super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); 478 // super("PBEwithHmacRIPEMD160", null, false, PKCS12, RIPEMD160, 160, 0); 491 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0) [all...] |
PBE.java | 30 // PBE Based encryption constants - by default we do PKCS12 with SHA-1 40 static final int PKCS12 = 2; 72 else if (type == PKCS12) 215 if (type == PKCS12) 258 if (type == PKCS12)
|
JCEMac.java | 39 private int pbeType = PKCS12; 501 // // PKCS12 states that the same algorithm should be used 514 // super(new HMac(new RIPEMD160Digest()), PKCS12, RIPEMD160, 160); 527 super(new HMac(new SHA1Digest()), PKCS12, SHA1, 160); 540 // super(new HMac(new TigerDigest()), PKCS12, TIGER, 192);
|
JCEPBEKey.java | 77 if (type == PBE.PKCS12)
|
BrokenJCEBlockCipher.java | 64 private int pbeType = PKCS12; 583 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 64); 607 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 64);
|
BrokenPBE.java | 29 * RSA's PKCS12 Page</a> 101 * generation of a derived key ala PKCS12 V1.0. 252 // PBE Based encryption constants - by default we do PKCS12 with SHA-1 260 static final int PKCS12 = 2;
|
/external/openssl/apps/ |
CA.pl | 54 $PKCS12="$openssl pkcs12"; 124 } elsif (/^-pkcs12$/) { 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
CA.pl.in | 54 $PKCS12="$openssl pkcs12"; 124 } elsif (/^-pkcs12$/) { 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
CA.sh | 69 PKCS12="openssl pkcs12" 144 -pkcs12) 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 62 /** Data type for PKCS12. */ 63 public static final String PKCS12 = "PKCS12";
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 159 return mBundle.containsKey(Credentials.PKCS12); 197 mBundle.put(Credentials.PKCS12, data); 261 java.security.KeyStore.getInstance("PKCS12"); 264 keystore.load(new ByteArrayInputStream(getData(Credentials.PKCS12)),
|
CertFile.java | 169 intent.putExtra(Credentials.PKCS12, value);
|
/external/openssl/crypto/ |
install.com | 49 EVP,ASN1,PEM,X509,X509V3,CONF,TXT_DB,PKCS7,PKCS12,COMP,OCSP,- 95 $ EXHEADER_PKCS12 := pkcs12.h
|