/external/openssl/crypto/pkcs12/ |
p12_init.c | 61 #include <openssl/pkcs12.h> 63 /* Initialise a PKCS12 structure to take data */ 65 PKCS12 *PKCS12_init(int mode) 67 PKCS12 *pkcs12; local 68 if (!(pkcs12 = PKCS12_new())) { 72 ASN1_INTEGER_set(pkcs12->version, 3); 73 pkcs12->authsafes->type = OBJ_nid2obj(mode); 76 if (!(pkcs12->authsafes->d.data = 88 return pkcs12; [all...] |
p12_p8d.c | 61 #include <openssl/pkcs12.h>
|
p12_p8e.c | 61 #include <openssl/pkcs12.h>
|
p12_attr.c | 61 #include <openssl/pkcs12.h>
|
p12_crpt.c | 61 #include <openssl/pkcs12.h>
|
pk12err.c | 1 /* crypto/pkcs12/pk12err.c */ 63 #include <openssl/pkcs12.h> 114 {ERR_REASON(PKCS12_R_INVALID_NULL_PKCS12_POINTER),"invalid null pkcs12 pointer"}, 124 {ERR_REASON(PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR),"pkcs12 algor cipherinit error"}, 125 {ERR_REASON(PKCS12_R_PKCS12_CIPHERFINAL_ERROR),"pkcs12 cipherfinal error"}, 126 {ERR_REASON(PKCS12_R_PKCS12_PBE_CRYPT_ERROR),"pkcs12 pbe crypt error"}, 128 {ERR_REASON(PKCS12_R_UNSUPPORTED_PKCS12_MODE),"unsupported pkcs12 mode"},
|
p12_asn.c | 62 #include <openssl/pkcs12.h> 66 ASN1_SEQUENCE(PKCS12) = { 67 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER), 68 ASN1_SIMPLE(PKCS12, authsafes, PKCS7), 69 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA) 70 } ASN1_SEQUENCE_END(PKCS12) 72 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
|
p12_decr.c | 61 #include <openssl/pkcs12.h>
|
p12_utl.c | 61 #include <openssl/pkcs12.h> 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12 [all...] |
p12_mutl.c | 64 #include <openssl/pkcs12.h> 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) 132 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
|
p12_npas.c | 64 #include <openssl/pkcs12.h> 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) 80 /* Check for NULL PKCS12 structure */ 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
|
/system/core/fastboot/ |
p12topem.sh | 9 openssl pkcs12 -passin pass:"$2" -passout pass:"$2" -in $1.p12 -out $1.pem
|
genkey.sh | 18 # Create a PKCS12 store containing the generated private key. 20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \
|
/external/openssl/crypto/evp/ |
c_alld.c | 62 #include <openssl/pkcs12.h>
|
c_allc.c | 62 #include <openssl/pkcs12.h>
|
evp_pbe.c | 62 #include <openssl/pkcs12.h>
|
/external/openssl/ |
Crypto.mk | 392 crypto/pkcs12/p12_add.c \ 393 crypto/pkcs12/p12_asn.c \ 394 crypto/pkcs12/p12_attr.c \ 395 crypto/pkcs12/p12_crpt.c \ 396 crypto/pkcs12/p12_crt.c \ 397 crypto/pkcs12/p12_decr.c \ 398 crypto/pkcs12/p12_init.c \ 399 crypto/pkcs12/p12_key.c \ 400 crypto/pkcs12/p12_kiss.c \ 401 crypto/pkcs12/p12_mutl.c [all...] |
Apps.mk | 31 apps/pkcs12.c \
|
/external/openssl/apps/ |
progs.pl | 48 elsif ( ($_ =~ /^pkcs12$/))
|
CA.pl | 54 $PKCS12="$openssl pkcs12"; 124 } elsif (/^-pkcs12$/) { 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
CA.pl.in | 54 $PKCS12="$openssl pkcs12"; 124 } elsif (/^-pkcs12$/) { 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
CA.sh | 69 PKCS12="openssl pkcs12" 144 -pkcs12) 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
pkcs8.c | 64 #include <openssl/pkcs12.h>
|
/external/openssl/crypto/err/ |
err_all.c | 89 #include <openssl/pkcs12.h>
|
/external/chromium/crypto/ |
rsa_private_key_openssl.cc | 8 #include <openssl/pkcs12.h>
|