Searched defs:bag (Results 1 - 18 of 18) sorted by relevance

/external/openssl/crypto/pkcs12/
H A Dp12_attr.c65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument
68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID,
90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument
93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument
104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, argument
114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name,
137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument
140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam
[all...]
H A Dp12_add.c68 PKCS12_BAGS *bag; local
70 if (!(bag = PKCS12_BAGS_new())) {
74 bag->type = OBJ_nid2obj(nid1);
75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
83 safebag->value.bag = bag;
92 PKCS12_SAFEBAG *bag; local
93 if (!(bag = PKCS12_SAFEBAG_new())) {
97 bag->type = OBJ_nid2obj(NID_keyBag);
98 bag
108 PKCS12_SAFEBAG *bag; local
218 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
[all...]
H A Dp12_crt.c64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag);
66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument
74 if (!X509at_add1_attr(&bag->attrib, attr))
86 PKCS12_SAFEBAG *bag = NULL; local
127 bag = PKCS12_add_cert(&bags, cert);
128 if(name && !PKCS12_add_friendlyname(bag, name, -1))
130 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
149 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
151 if (!bag)
154 if (!copy_bag_attr(bag, pke
200 PKCS12_SAFEBAG *bag = NULL; local
243 PKCS12_SAFEBAG *bag = NULL; local
[all...]
H A Dp12_kiss.c71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
224 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument
233 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName)))
236 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID)))
239 switch (M_PKCS12_bag_type(bag))
244 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag)))
251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
259 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate )
261 if (!(x509 = PKCS12_certbag2x509(bag)))
292 return parse_bags(bag
[all...]
H A Dp12_utl.c133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument
135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL;
136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL;
137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509));
140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument
142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL;
143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL;
144 return ASN1_item_unpack(bag->value.bag
[all...]
H A Dp12_npas.c71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
140 /* Repack bag in same form with new password */
192 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
198 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1;
200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0;
201 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter,
206 X509_SIG_free(bag->value.shkeybag);
207 bag->value.shkeybag = p8new;
H A Dpkcs12.h114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon28350::__anon28351
116 X509_SIG *shkeybag; /* shrouded key bag */
134 ASN1_TYPE *other; /* Secret or other bag */
158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
161 #define PKCS12_get_attr(bag, attr_nid) \
162 PKCS12_get_attr_gen(bag->attrib, attr_nid)
172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne
[all...]
/external/chromium_org/sync/util/
H A Dcryptographer.cc146 // Create a bag of all the Nigori parameters we know about.
147 sync_pb::NigoriKeyBag bag; local
151 sync_pb::NigoriKey* key = bag.add_key();
158 // Encrypt the bag with the default Nigori.
159 return Encrypt(bag, encrypted);
223 sync_pb::NigoriKeyBag bag; local
224 if (!Decrypt(encrypted, &bag))
226 InstallKeyBag(bag);
258 sync_pb::NigoriKeyBag bag;
259 if (!bag
306 InstallKeyBag(const sync_pb::NigoriKeyBag& bag) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/media/devices/
H A Dwin32devicemanager.cc195 CComPtr<IPropertyBag> bag; local
197 __uuidof(bag), reinterpret_cast<void**>(&bag)))) {
200 if (SUCCEEDED(bag->Read(kFriendlyName, &name, 0)) &&
204 if (SUCCEEDED(bag->Read(kDevicePath, &path, 0)) &&
219 HRESULT GetStringProp(IPropertyStore* bag, PROPERTYKEY key, std::string* out) { argument
224 HRESULT hr = bag->GetValue(key, &var);
/external/chromium_org/win8/delegate_execute/
H A Dcommand_execute_impl.cc281 IPropertyBag* bag) {
280 Initialize(LPCWSTR name, IPropertyBag* bag) argument
/external/jemalloc/test/unit/
H A Drb.c220 uint64_t bag[NNODES]; local
231 bag[j] = j;
236 bag[j] = NNODES - j - 1;
240 bag[j] = gen_rand64_range(sfmt, NNODES);
249 nodes[k].key = bag[k];
/external/chromium_org/sync/engine/
H A Dmodel_type_sync_worker_impl_unittest.cc296 sync_pb::NigoriKeyBag bag; local
303 sync_pb::NigoriKey* key = bag.add_key();
317 // Serialize and encrypt the bag with the last nigori.
319 bag.SerializeToString(&serialized_bag);
/external/openssl/apps/
H A Dpkcs12.c760 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass, argument
767 switch (M_PKCS12_bag_type(bag))
770 if (options & INFO) BIO_printf (bio_err, "Key bag\n");
772 print_attribs (out, bag->attrib, "Bag Attributes");
773 p8 = bag->value.keybag;
783 alg_print (bio_err, bag->value.shkeybag->algor);
786 print_attribs (out, bag->attrib, "Bag Attributes");
787 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
800 if (options & INFO) BIO_printf (bio_err, "Certificate bag\n");
802 if (PKCS12_get_attr(bag, NID_localKeyI
[all...]
/external/openssl/include/openssl/
H A Dpkcs12.h114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon28393::__anon28394
116 X509_SIG *shkeybag; /* shrouded key bag */
134 ASN1_TYPE *other; /* Secret or other bag */
158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
161 #define PKCS12_get_attr(bag, attr_nid) \
162 PKCS12_get_attr_gen(bag->attrib, attr_nid)
172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne
[all...]
/external/valgrind/main/coregrind/
H A Dm_wordfm.c856 WordBag* bag = alloc_nofail(cc, sizeof(WordBag)); local
857 bag->fm = VG_(newFM)( alloc_nofail, cc, dealloc, NULL );
858 return bag;
861 void VG_(deleteBag) ( WordBag* bag )
863 void (*dealloc)(void*) = bag->fm->dealloc;
864 VG_(deleteFM)( bag->fm, NULL, NULL );
865 VG_(memset)(bag, 0, sizeof(WordBag));
866 dealloc(bag);
869 void VG_(addToBag)( WordBag* bag, UWord w ) argument
872 if (VG_(lookupFM)(bag
881 elemBag( WordBag* bag, UWord w ) argument
917 delFromBag( WordBag* bag, UWord w ) argument
967 nextIterBag( WordBag* bag, UWord* pVal, UWord* pCount ) argument
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.jface.text_3.6.1.r361_v20100825-0800.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/antlr/antlr-3.4/lib/
H A Dantlr-3.4-complete.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/antlr/ org/antlr/analysis/ org/antlr/codegen/ org/ ...
/external/chromium_org/third_party/android_platform/webview/
H A Dframeworks.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/location/ android/location/Address$1.class ...

Completed in 272 milliseconds