/external/boringssl/src/include/openssl/ |
pkcs8.h | 136 * |PKCS12| structure. The |out_p12| argument should be NULL(?). On exit, 137 * |*ber_bytes| will be advanced by |ber_len|. It returns a fresh |PKCS12| 146 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, 150 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12); 153 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12); 163 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 170 * get anything from a |PKCS12|. Thus |password| and |password_len| may b [all...] |
base.h | 306 typedef struct pkcs12_st PKCS12;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
PKCS12.java | 6 public class PKCS12 8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".pkcs12."; 19 provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 22 // provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore"); 24 // provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 25 // provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore3DES"); 27 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore"); 28 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore3DES");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
Twofish.java | 93 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); 105 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16);
|
AES.java | 324 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); 333 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); 342 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); 354 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 128, 16); 363 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 192, 16); 372 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 256, 16); 429 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); 441 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); 453 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); 465 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128) [all...] |
RC2.java | 123 super("PBEwithSHAand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); 135 super("PBEwithSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); 171 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8); 183 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8);
|
ARC4.java | 46 super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); 58 super("PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0);
|
DESede.java | 222 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); 234 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); 246 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); 258 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8_x509.c | 627 PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, 629 PKCS12 *p12; 631 p12 = OPENSSL_malloc(sizeof(PKCS12)); 655 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) { 660 PKCS12 *ret = NULL; 704 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) { 706 PKCS12 *ret [all...] |
pkcs12_test.cc | 28 * openssl pkcs12 -export -inkey key.pem -in cacert.pem */ 907 CBS pkcs12; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BCPBEKey.java | 77 if (type == PBE.PKCS12)
|
PBE.java | 39 // PBE Based encryption constants - by default we do PKCS12 with SHA-1 58 static final int PKCS12 = 2; 148 else if (type == PKCS12) 493 if (type == PKCS12)
|
BaseMac.java | 42 private int scheme = PKCS12; 87 throw new InvalidKeyException("PKCS12 requires a SecretKey/PBEKey"); 96 throw new InvalidAlgorithmParameterException("PKCS12 requires a PBEParameterSpec"); 148 throw new InvalidAlgorithmParameterException("no PKCS12 mapping for HMAC: " + macEngine.getAlgorithmName()); 153 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec);
|
BaseStreamCipher.java | 179 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName());
|
BaseWrapCipher.java | 60 protected int pbeType = PKCS12;
|
BaseBlockCipher.java | 494 // in PKCS12 534 // Was: if (scheme == PKCS12 || key instanceof PKCS12Key) 535 // If the key is a BCPBE one without an IV, ignore the fact that the scheme is PKCS12. 536 // TODO(27995180): consider whether we want to keep support for these keys and PKCS12. 537 if ((scheme == PKCS12 || key instanceof PKCS12Key) && !isBCPBEKeyWithoutIV(key)) 547 throw new InvalidKeyException("PKCS12 requires a SecretKey/PBEKey"); 582 // Was: param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 583 // TODO(27995180): consider rejecting such keys for PKCS12 591 throw new InvalidKeyException("Algorithm requires a PBE key suitable for PKCS12"); 596 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA1.java | 87 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0);
|
/external/curl/docs/examples/ |
curlx.c | 7 coming from a pkcs12 file 97 #include <openssl/pkcs12.h> 138 PKCS12 *p12;
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 22 #include <openssl/pkcs12.h> [all...] |
/external/curl/lib/vtls/ |
openssl.c | 67 #include <openssl/pkcs12.h> 440 PKCS12 *p12; 446 failf(data, "could not open PKCS12 file '%s'", cert_file); 453 failf(data, "error reading PKCS12 file '%s'", cert_file); 462 "could not parse PKCS12 file, check password, " OSSL_PACKAGE 473 "could not load PKCS12 client certificate, " OSSL_PACKAGE 480 failf(data, "unable to use private key from PKCS12 file '%s'", 486 failf(data, "private key from PKCS12 file '%s' " [all...] |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.50/ |
bcprov-jdk15on-1.50.jar | |
/external/google-tv-pairing-protocol/java/jar/ |
bcprov-jdk15-143.jar | |
/frameworks/base/config/ |
preloaded-classes | [all...] |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |