/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
H A D | p12_attr.c | 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument 68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument 93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, argument 114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument 140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam [all...] |
H A D | p12_add.c | 68 PKCS12_BAGS *bag; local 70 if (!(bag = PKCS12_BAGS_new())) { 74 bag->type = OBJ_nid2obj(nid1); 75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 83 safebag->value.bag = bag; 92 PKCS12_SAFEBAG *bag; local 93 if (!(bag = PKCS12_SAFEBAG_new())) { 97 bag->type = OBJ_nid2obj(NID_keyBag); 98 bag 108 PKCS12_SAFEBAG *bag; local 218 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
H A D | p12_crt.c | 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag); 66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 74 if (!X509at_add1_attr(&bag->attrib, attr)) 86 PKCS12_SAFEBAG *bag = NULL; local 116 bag = PKCS12_add_cert(&bags, cert); 117 if(name && !PKCS12_add_friendlyname(bag, name, -1)) 119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 140 if (!bag) 143 if (!copy_bag_attr(bag, pke 189 PKCS12_SAFEBAG *bag = NULL; local 232 PKCS12_SAFEBAG *bag = NULL; local [all...] |
H A D | p12_kiss.c | 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 224 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 233 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName))) 236 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) 239 switch (M_PKCS12_bag_type(bag)) 244 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) 251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 259 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) 261 if (!(x509 = PKCS12_certbag2x509(bag))) 292 return parse_bags(bag [all...] |
H A D | p12_utl.c | 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument 135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; 136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); 140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument 142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; 143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; 144 return ASN1_item_unpack(bag->value.bag [all...] |
H A D | p12_npas.c | 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 140 /* Repack bag in same form with new password */ 192 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument 198 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; 200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; 201 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, 206 X509_SIG_free(bag->value.shkeybag); 207 bag->value.shkeybag = p8new;
|
H A D | pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon13893::__anon13894 116 X509_SIG *shkeybag; /* shrouded key bag */ 134 ASN1_TYPE *other; /* Secret or other bag */ 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/external/openssl/crypto/pkcs12/ |
H A D | p12_attr.c | 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument 68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument 93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, argument 114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument 140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam [all...] |
H A D | p12_add.c | 68 PKCS12_BAGS *bag; local 70 if (!(bag = PKCS12_BAGS_new())) { 74 bag->type = OBJ_nid2obj(nid1); 75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 83 safebag->value.bag = bag; 92 PKCS12_SAFEBAG *bag; local 93 if (!(bag = PKCS12_SAFEBAG_new())) { 97 bag->type = OBJ_nid2obj(NID_keyBag); 98 bag 108 PKCS12_SAFEBAG *bag; local 218 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
H A D | p12_crt.c | 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag); 66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 74 if (!X509at_add1_attr(&bag->attrib, attr)) 86 PKCS12_SAFEBAG *bag = NULL; local 127 bag = PKCS12_add_cert(&bags, cert); 128 if(name && !PKCS12_add_friendlyname(bag, name, -1)) 130 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 149 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 151 if (!bag) 154 if (!copy_bag_attr(bag, pke 200 PKCS12_SAFEBAG *bag = NULL; local 243 PKCS12_SAFEBAG *bag = NULL; local [all...] |
H A D | p12_kiss.c | 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 224 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 233 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName))) 236 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) 239 switch (M_PKCS12_bag_type(bag)) 244 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) 251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 259 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) 261 if (!(x509 = PKCS12_certbag2x509(bag))) 292 return parse_bags(bag [all...] |
H A D | p12_utl.c | 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument 135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; 136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); 140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument 142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; 143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; 144 return ASN1_item_unpack(bag->value.bag [all...] |
H A D | p12_npas.c | 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 140 /* Repack bag in same form with new password */ 192 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument 198 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; 200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; 201 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, 206 X509_SIG_free(bag->value.shkeybag); 207 bag->value.shkeybag = p8new;
|
H A D | pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon27508::__anon27509 116 X509_SIG *shkeybag; /* shrouded key bag */ 134 ASN1_TYPE *other; /* Secret or other bag */ 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/external/chromium_org/sync/util/ |
H A D | cryptographer.cc | 128 // Create a bag of all the Nigori parameters we know about. 129 sync_pb::NigoriKeyBag bag; local 133 sync_pb::NigoriKey* key = bag.add_key(); 140 // Encrypt the bag with the default Nigori. 141 return Encrypt(bag, encrypted); 205 sync_pb::NigoriKeyBag bag; local 206 if (!Decrypt(encrypted, &bag)) 208 InstallKeyBag(bag); 240 sync_pb::NigoriKeyBag bag; 241 if (!bag 288 InstallKeyBag(const sync_pb::NigoriKeyBag& bag) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/media/devices/ |
H A D | win32devicemanager.cc | 195 CComPtr<IPropertyBag> bag; local 197 __uuidof(bag), reinterpret_cast<void**>(&bag)))) { 200 if (SUCCEEDED(bag->Read(kFriendlyName, &name, 0)) && 204 if (SUCCEEDED(bag->Read(kDevicePath, &path, 0)) && 219 HRESULT GetStringProp(IPropertyStore* bag, PROPERTYKEY key, std::string* out) { argument 224 HRESULT hr = bag->GetValue(key, &var);
|
/external/chromium_org/win8/delegate_execute/ |
H A D | command_execute_impl.cc | 287 IPropertyBag* bag) { 286 Initialize(LPCWSTR name, IPropertyBag* bag) argument
|
/external/jemalloc/test/unit/ |
H A D | rb.c | 220 uint64_t bag[NNODES]; local 231 bag[j] = j; 236 bag[j] = NNODES - j - 1; 240 bag[j] = gen_rand64_range(sfmt, NNODES); 249 nodes[k].key = bag[k];
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | pkcs12.c | 753 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass, argument 760 switch (M_PKCS12_bag_type(bag)) 763 if (options & INFO) BIO_printf (bio_err, "Key bag\n"); 765 print_attribs (out, bag->attrib, "Bag Attributes"); 766 p8 = bag->value.keybag; 776 alg_print (bio_err, bag->value.shkeybag->algor); 779 print_attribs (out, bag->attrib, "Bag Attributes"); 780 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 793 if (options & INFO) BIO_printf (bio_err, "Certificate bag\n"); 795 if (PKCS12_get_attr(bag, NID_localKeyI [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon13939::__anon13940 116 X509_SIG *shkeybag; /* shrouded key bag */ 134 ASN1_TYPE *other; /* Secret or other bag */ 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/external/openssl/apps/ |
H A D | pkcs12.c | 760 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass, argument 767 switch (M_PKCS12_bag_type(bag)) 770 if (options & INFO) BIO_printf (bio_err, "Key bag\n"); 772 print_attribs (out, bag->attrib, "Bag Attributes"); 773 p8 = bag->value.keybag; 783 alg_print (bio_err, bag->value.shkeybag->algor); 786 print_attribs (out, bag->attrib, "Bag Attributes"); 787 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 800 if (options & INFO) BIO_printf (bio_err, "Certificate bag\n"); 802 if (PKCS12_get_attr(bag, NID_localKeyI [all...] |
/external/openssl/include/openssl/ |
H A D | pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon27551::__anon27552 116 X509_SIG *shkeybag; /* shrouded key bag */ 134 ASN1_TYPE *other; /* Secret or other bag */ 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
/external/valgrind/main/coregrind/ |
H A D | m_wordfm.c | 856 WordBag* bag = alloc_nofail(cc, sizeof(WordBag)); local 857 bag->fm = VG_(newFM)( alloc_nofail, cc, dealloc, NULL ); 858 return bag; 861 void VG_(deleteBag) ( WordBag* bag ) 863 void (*dealloc)(void*) = bag->fm->dealloc; 864 VG_(deleteFM)( bag->fm, NULL, NULL ); 865 VG_(memset)(bag, 0, sizeof(WordBag)); 866 dealloc(bag); 869 void VG_(addToBag)( WordBag* bag, UWord w ) argument 872 if (VG_(lookupFM)(bag 881 elemBag( WordBag* bag, UWord w ) argument 917 delFromBag( WordBag* bag, UWord w ) argument 967 nextIterBag( WordBag* bag, UWord* pVal, UWord* pCount ) argument [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.jface.text_3.6.1.r361_v20100825-0800.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/chromium_org/third_party/WebKit/Source/devtools/scripts/closure/ |
H A D | compiler.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/debugging/ com/google/debugging/sourcemap/ ... |