/external/openssl/crypto/evp/ |
c_allc.c | 62 #include <openssl/pkcs12.h>
|
evp_pbe.c | 62 #include <openssl/pkcs12.h>
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 64 #include <openssl/pkcs12.h> 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 113 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) 132 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
|
p12_npas.c | 64 #include <openssl/pkcs12.h> 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) 80 /* Check for NULL PKCS12 structure */ 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
|
p12_add.c | 61 #include <openssl/pkcs12.h> 224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) 232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
|
p12_crt.c | 61 #include <openssl/pkcs12.h> 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 83 PKCS12 *p12 = NULL; 356 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) 358 PKCS12 *p12;
|
p12_key.c | 61 #include <openssl/pkcs12.h> 72 /* PKCS12 compatible key/IV generation */
|
p12_kiss.c | 61 #include <openssl/pkcs12.h> 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 85 /* Check for NULL PKCS12 structure */ 179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
|
/external/chromium_org/crypto/ |
ec_private_key_openssl.cc | 9 #include <openssl/pkcs12.h>
|
/external/openssl/apps/ |
pkcs8.c | 64 #include <openssl/pkcs12.h>
|
pkcs12.c | 0 /* pkcs12.c */ 69 #include <openssl/pkcs12.h> 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 105 PKCS12 *p12 = NULL; 285 BIO_printf (bio_err, "Usage: pkcs12 [options]\n"); 287 BIO_printf (bio_err, "-export output PKCS12 file\n"); 614 CRYPTO_push_info("writing pkcs12"); 704 int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
|
apps.c | 132 #include <openssl/pkcs12.h> 273 || (strcmp(s,"PKCS12") == 0) || (strcmp(s,"pkcs12") == 0) 750 PKCS12 *p12; 754 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc); 776 "Mac verify error (wrong password?) in PKCS12 file for %s\n", desc); [all...] |
/external/openssl/crypto/pem/ |
pem_pk8.c | 66 #include <openssl/pkcs12.h>
|
pem_pkey.c | 66 #include <openssl/pkcs12.h>
|
pem_lib.c | 68 #include <openssl/pkcs12.h>
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsPKCS12Blob.cpp | 41 #include <pkcs12.h> 100 VLOG(1) << "no nickname for cert in PKCS12 file."; 240 // Iterate through all the imported PKCS12 items and mark any accompanying 337 // interface. Thankfully, PKCS12 appears to be the only thing in NSS that
|
/external/chromium_org/content/child/webcrypto/openssl/ |
rsa_key_openssl.cc | 8 #include <openssl/pkcs12.h>
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 13 #include <gnutls/pkcs12.h>
|
tls_openssl.c | 21 #include <openssl/pkcs12.h> [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
pkcs12_test.c | 29 * openssl pkcs12 -export -inkey key.pem -in cacert.pem */ 684 CBS pkcs12; local [all...] |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 1 package org.bouncycastle.jcajce.provider.keystore.pkcs12; 530 throw new KeyStoreException("PKCS12 does not support non-PrivateKeys"); 778 throw new IOException("stream does not represent a PKCS12 key store"); 810 throw new IOException("PKCS12 key store mac invalid - wrong password or corrupted file."); 818 throw new IOException("PKCS12 key store mac invalid - wrong password or corrupted file."); [all...] |