/external/boringssl/src/tool/ |
pkcs12.cc | 119 CBS pkcs12; local 120 CBS_init(&pkcs12, contents.get(), size); 125 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
KeyChainTest.java | 241 // Create a PKCS12 keystore populated with key + certificate chain 242 KeyStore ks = KeyStore.getInstance("PKCS12"); 269 ByteArrayOutputStream pkcs12 = new ByteArrayOutputStream(); local 270 mKeyStore.store(pkcs12, EMPTY_PASSWORD); 271 if (pkcs12.size() == 0) { 276 intent.putExtra(KeyChain.EXTRA_PKCS12, pkcs12.toByteArray());
|
/external/libchrome/crypto/ |
rsa_private_key_openssl.cc | 10 #include <openssl/pkcs12.h>
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
crypt.py | 153 key: string, private key in PKCS12 or PEM format. 174 """Convert the contents of a PKCS12 key to PEM using OpenSSL. 178 private_key_password: String. Password for PKCS12. 188 pkcs12 = crypto.load_pkcs12(decoded_body, private_key_password) 190 pkcs12.get_privatekey()) 303 'PKCS12 format is not supported by the PyCrypto library. ' 305 '(openssl pkcs12 -in xxxxx.p12 -nodes -nocerts > privatekey.pem) ' 332 raw_key_input: The contents of a private key file (either PEM or PKCS12).
|
/external/curl/tests/certs/scripts/ |
genserv.sh | 90 echo "$OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt " 92 $OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
|
/external/curl/docs/examples/ |
curlx.c | 7 coming from a pkcs12 file 94 #include <openssl/pkcs12.h> 130 PKCS12 * p12 ;
|
/external/boringssl/ |
sources.mk | 325 src/tool/pkcs12.cc\
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 13 #include <gnutls/pkcs12.h> [all...] |
tls_openssl.c | 21 #include <openssl/pkcs12.h> [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs12_test.cc | 30 * openssl pkcs12 -export -inkey key.pem -in cacert.pem */ 692 CBS pkcs12; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 1 package org.bouncycastle.jcajce.provider.keystore.pkcs12; 556 throw new KeyStoreException("PKCS12 does not support non-PrivateKeys"); 793 throw new IOException("stream does not represent a PKCS12 key store"); 825 throw new IOException("PKCS12 key store mac invalid - wrong password or corrupted file."); 833 throw new IOException("PKCS12 key store mac invalid - wrong password or corrupted file."); [all...] |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/external/curl/lib/vtls/ |
openssl.c | 68 #include <openssl/pkcs12.h> 101 /* OpenSSL does not have PKCS12 support */ 450 PKCS12 *p12; 457 failf(data, "could not open PKCS12 file '%s'", cert_file); 464 failf(data, "error reading PKCS12 file '%s'", cert_file); 473 "could not parse PKCS12 file, check password, OpenSSL error %s", 483 "could not load PKCS12 client certificate, OpenSSL error %s", 489 failf(data, "unable to use private key from PKCS12 file '%s'", 495 failf(data, "private key from PKCS12 file '%s' " [all...] |