HomeSort by relevance Sort by last modified time
    Searched refs:PKCS12 (Results 1 - 23 of 23) sorted by null

  /external/openssl/crypto/pkcs12/
p12_utl.c 61 #include <openssl/pkcs12.h>
98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12)
100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12)
106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12)
112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12
    [all...]
p12_init.c 61 #include <openssl/pkcs12.h>
63 /* Initialise a PKCS12 structure to take data */
65 PKCS12 *PKCS12_init(int mode)
67 PKCS12 *pkcs12; local
68 if (!(pkcs12 = PKCS12_new())) {
72 ASN1_INTEGER_set(pkcs12->version, 3);
73 pkcs12->authsafes->type = OBJ_nid2obj(mode);
76 if (!(pkcs12->authsafes->d.data =
88 return pkcs12;
    [all...]
pkcs12.h 0 /* pkcs12.h */
109 } PKCS12;
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
217 PKCS12 *PKCS12_init(int mode);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
236 DECLARE_ASN1_FUNCTIONS(PKCS12)
    [all...]
p12_asn.c 62 #include <openssl/pkcs12.h>
66 ASN1_SEQUENCE(PKCS12) = {
67 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER),
68 ASN1_SIMPLE(PKCS12, authsafes, PKCS7),
69 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA)
70 } ASN1_SEQUENCE_END(PKCS12)
72 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
p12_mutl.c 64 #include <openssl/pkcs12.h>
67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
109 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
128 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
152 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
p12_npas.c 64 #include <openssl/pkcs12.h>
68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass)
80 /* Check for NULL PKCS12 structure */
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
p12_crt.c 61 #include <openssl/pkcs12.h>
79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
83 PKCS12 *p12 = NULL;
341 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7)
343 PKCS12 *p12;
p12_kiss.c 61 #include <openssl/pkcs12.h>
65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
85 /* Check for NULL PKCS12 structure */
179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
p12_add.c 61 #include <openssl/pkcs12.h>
224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes)
232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
  /external/openssl/include/openssl/
pkcs12.h 0 /* pkcs12.h */
109 } PKCS12;
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
217 PKCS12 *PKCS12_init(int mode);
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
236 DECLARE_ASN1_FUNCTIONS(PKCS12)
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCESecretKeyFactory.java 335 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64);
347 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
359 super("PBEwithSHAand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64);
371 super("PBEwithSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbewithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64);
383 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128);
395 super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0);
407 super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0);
420 // super("PBEwithHmacRIPEMD160", null, false, PKCS12, RIPEMD160, 160, 0);
433 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0);
446 // super("PBEwithHmacTiger", null, false, PKCS12, TIGER, 192, 0)
    [all...]
PBE.java 33 // PBE Based encryption constants - by default we do PKCS12 with SHA-1
44 static final int PKCS12 = 2;
81 else if (type == PKCS12)
229 if (type == PKCS12)
272 if (type == PKCS12)
JCEMac.java 56 private int pbeType = PKCS12;
407 // // PKCS12 states that the same algorithm should be used
420 // super(new HMac(new RIPEMD160Digest()), PKCS12, RIPEMD160, 160);
433 super(new HMac(new SHA1Digest()), PKCS12, SHA1, 160);
446 // super(new HMac(new TigerDigest()), PKCS12, TIGER, 192);
JCEPBEKey.java 77 if (type == PBE.PKCS12)
WrapCipherSpi.java 63 protected int pbeType = PKCS12;
  /external/openssl/apps/
CA.pl 54 $PKCS12="$openssl pkcs12";
124 } elsif (/^-pkcs12$/) {
127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
CA.pl.in 54 $PKCS12="$openssl pkcs12";
124 } elsif (/^-pkcs12$/) {
127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
CA.sh 69 PKCS12="openssl pkcs12"
144 -pkcs12)
150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
pkcs12.c 0 /* pkcs12.c */
69 #include <openssl/pkcs12.h>
83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
105 PKCS12 *p12 = NULL;
278 BIO_printf (bio_err, "Usage: pkcs12 [options]\n");
280 BIO_printf (bio_err, "-export output PKCS12 file\n");
607 CRYPTO_push_info("writing pkcs12");
697 int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
apps.c 132 #include <openssl/pkcs12.h>
273 || (strcmp(s,"PKCS12") == 0) || (strcmp(s,"pkcs12") == 0)
748 PKCS12 *p12;
752 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc);
774 "Mac verify error (wrong password?) in PKCS12 file for %s\n", desc);
    [all...]
  /external/wpa_supplicant/
tls_openssl.c 25 #include <openssl/pkcs12.h>
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_openssl.c 25 #include <openssl/pkcs12.h>
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 25 #include <openssl/pkcs12.h>
    [all...]

Completed in 1203 milliseconds