HomeSort by relevance Sort by last modified time
    Searched refs:PKCS12 (Results 1 - 25 of 31) sorted by null

1 2

  /external/boringssl/src/include/openssl/
pkcs8.h 136 * |PKCS12| structure. The |out_p12| argument should be NULL(?). On exit,
137 * |*ber_bytes| will be advanced by |ber_len|. It returns a fresh |PKCS12|
146 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes,
150 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12);
153 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12);
163 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
170 * get anything from a |PKCS12|. Thus |password| and |password_len| may b
    [all...]
base.h 306 typedef struct pkcs12_st PKCS12;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/
PKCS12.java 6 public class PKCS12
8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".pkcs12.";
19 provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
22 // provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore");
24 // provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
25 // provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore3DES");
27 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore");
28 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore3DES");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
Twofish.java 93 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128);
105 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16);
AES.java 324 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16);
333 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16);
342 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16);
354 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 128, 16);
363 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 192, 16);
372 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 256, 16);
429 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128);
441 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128);
453 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128);
465 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128)
    [all...]
RC2.java 123 super("PBEwithSHAand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64);
135 super("PBEwithSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64);
171 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8);
183 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8);
ARC4.java 46 super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0);
58 super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0);
DESede.java 222 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8);
234 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8);
246 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64);
258 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
  /external/boringssl/src/crypto/pkcs8/
pkcs8_x509.c 627 PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes,
629 PKCS12 *p12;
631 p12 = OPENSSL_malloc(sizeof(PKCS12));
655 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) {
660 PKCS12 *ret = NULL;
704 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) {
706 PKCS12 *ret
    [all...]
pkcs12_test.cc 28 * openssl pkcs12 -export -inkey key.pem -in cacert.pem */
907 CBS pkcs12; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
BCPBEKey.java 77 if (type == PBE.PKCS12)
PBE.java 39 // PBE Based encryption constants - by default we do PKCS12 with SHA-1
58 static final int PKCS12 = 2;
148 else if (type == PKCS12)
493 if (type == PKCS12)
BaseMac.java 42 private int scheme = PKCS12;
87 throw new InvalidKeyException("PKCS12 requires a SecretKey/PBEKey");
96 throw new InvalidAlgorithmParameterException("PKCS12 requires a PBEParameterSpec");
148 throw new InvalidAlgorithmParameterException("no PKCS12 mapping for HMAC: " + macEngine.getAlgorithmName());
153 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec);
BaseStreamCipher.java 179 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName());
BaseWrapCipher.java 60 protected int pbeType = PKCS12;
BaseBlockCipher.java 494 // in PKCS12
534 // Was: if (scheme == PKCS12 || key instanceof PKCS12Key)
535 // If the key is a BCPBE one without an IV, ignore the fact that the scheme is PKCS12.
536 // TODO(27995180): consider whether we want to keep support for these keys and PKCS12.
537 if ((scheme == PKCS12 || key instanceof PKCS12Key) && !isBCPBEKeyWithoutIV(key))
547 throw new InvalidKeyException("PKCS12 requires a SecretKey/PBEKey");
582 // Was: param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName());
583 // TODO(27995180): consider rejecting such keys for PKCS12
591 throw new InvalidKeyException("Algorithm requires a PBE key suitable for PKCS12");
596 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName())
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
SHA1.java 87 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0);
  /external/curl/docs/examples/
curlx.c 7 coming from a pkcs12 file
97 #include <openssl/pkcs12.h>
138 PKCS12 *p12;
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 22 #include <openssl/pkcs12.h>
    [all...]
  /external/curl/lib/vtls/
openssl.c 67 #include <openssl/pkcs12.h>
440 PKCS12 *p12;
446 failf(data, "could not open PKCS12 file '%s'", cert_file);
453 failf(data, "error reading PKCS12 file '%s'", cert_file);
462 "could not parse PKCS12 file, check password, " OSSL_PACKAGE
473 "could not load PKCS12 client certificate, " OSSL_PACKAGE
480 failf(data, "unable to use private key from PKCS12 file '%s'",
486 failf(data, "private key from PKCS12 file '%s' "
    [all...]
  /prebuilts/sdk/tools/lib/
signapk.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.50/
bcprov-jdk15on-1.50.jar 
  /external/google-tv-pairing-protocol/java/jar/
bcprov-jdk15-143.jar 
  /frameworks/base/config/
preloaded-classes     [all...]
  /prebuilts/devtools/tools/lib/
bcprov-jdk15on-1.48.jar 

Completed in 459 milliseconds

1 2