/external/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 76 if (!PKCS7_type_is_data(p12->authsafes)) 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 84 if (!p12->mac->iter) iter = 1; 85 else iter = ASN1_INTEGER_get (p12->mac->iter); 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { 101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, 102 p12->authsafes->d.data->length) 113 int PKCS12_verify_mac(PKCS12 *p12, cons argument 132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument 156 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) argument [all...] |
H A D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 82 if(!p12) { 89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 94 if (!newpass_p12(p12, oldpass, newpass)) { 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; 155 p12_data_tmp = p12->authsafes->d.data; 156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; 157 if(!PKCS12_pack_authsafes(p12, newsafe [all...] |
H A D | p12_utl.c | 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) argument 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) argument 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) argument 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) argument 117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
|
H A D | p12_crt.c | 83 PKCS12 *p12 = NULL; local 171 p12 = PKCS12_add_safes(safes, 0); 173 if (!p12) 181 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 184 return p12; 188 if (p12) 189 PKCS12_free(p12); 358 PKCS12 *p12; local 361 p12 = PKCS12_init(nid_p7); 363 if (!p12) [all...] |
H A D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); [all...] |
H A D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 87 if(!p12) 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) 179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument 187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0;
|
H A D | p12_add.c | 224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) argument 227 &p12->authsafes->d.data)) 232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) 234 if (!PKCS7_type_is_data(p12->authsafes)) 239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES));
|
/external/llvm/test/MC/ARM/ |
H A D | gas-compl-copr-reg.s | 3 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0xed] 6 ldc p12, cr4, [r0, #4] 10 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0xed]
13 ldc p12, cr4, [r0, #4]
|
H A D | thumb-only-conditionals.s | 44 mrc2ne p12, #3, r3, c3, c4 47 @ CHECK-NEXT: mrc2ne p12, #3, r3, c3, c4
|
/external/openssl/include/openssl/ |
H A D | pkcs12.h | 167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) 196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable 225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | pkcs8.h | 157 * |p12|. The |out_pkey| and |out_cert| arguments must not be NULL and, on 164 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 168 /* PKCS12_free frees |p12| and its contents. */ 169 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12);
|
/external/openssl/apps/ |
H A D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 105 PKCS12 *p12 = NULL; local 590 p12 = PKCS12_create(cpass, name, key, ucert, certs, 593 if (!p12) 610 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); 617 i2d_PKCS12_bio(out, p12); 639 if (!(p12 = d2i_PKCS12_bio (in, NULL))) { 657 if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12 704 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 1030 PKCS12 *p12; local 1035 p12 = OPENSSL_malloc(sizeof(PKCS12)); 1036 if (!p12) { 1040 p12->ber_bytes = OPENSSL_malloc(ber_len); 1041 if (!p12->ber_bytes) { 1042 OPENSSL_free(p12); 1046 memcpy(p12->ber_bytes, *ber_bytes, ber_len); 1047 p12->ber_len = ber_len; 1050 return p12; 1111 int PKCS12_parse(const PKCS12 *p12, cons argument 1151 PKCS12_free(PKCS12 *p12) argument [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
H A D | generate-duplicate-cn-certs.sh | 94 -out ../certificates/duplicate_cn_1.p12 \ 101 -out ../certificates/duplicate_cn_2.p12 \
|
H A D | generate-client-certificates.sh | 153 -out client_1.p12 \ 159 -out client_2.p12 \
|
/external/chromium_org/third_party/skia/tests/ |
H A D | PathOpsQuadIntersectionTest.cpp | 493 SkDPoint p12 = quad1.ptAtT(t12); local 495 p10.fX, p10.fY, p1Seed.fX, p1Seed.fY, p12.fX, p12.fY);
|
/external/opencv/cv/src/ |
H A D | cvposit.cpp | 303 float p12 = -(ata00 * ata12 - ata01 * ata02); local 320 b[n + k] = (p01 * a0 + p11 * a1 + p12 * a2) * inv_det; 321 b[2 * n + k] = (p02 * a0 + p12 * a1 + p22 * a2) * inv_det;
|
/external/skia/tests/ |
H A D | PathOpsQuadIntersectionTest.cpp | 490 SkDPoint p12 = quad1.ptAtT(t12); local 492 p10.fX, p10.fY, p1Seed.fX, p1Seed.fY, p12.fX, p12.fY);
|
/external/linux-tools-perf/perf-3.12.0/arch/ia64/lib/ |
H A D | memcpy_mck.S | 407 cmp.le p12,p13 = 3,in2 422 EX(.ex_handler_short, (p12) ld1 t3=[src0],2) 431 EX(.ex_handler_short, (p12) st1 [dst0]=t3,2) 477 cmp.le p12,p0 = 7,r30 485 EK(.ex_handler_short, (p12) ld1 t7=[src0],2) 492 EK(.ex_handler_short, (p12) st1 [dst0] = t7) 548 * p12-p13: dst faulting addr calculation 576 cmp.gtu p12,p13=dst_pre_mem,saved_in0 580 (p12) add dst0=8,saved_in0 597 cmp.ltu p12,p1 [all...] |
/external/chromium_org/ui/v2/src/ |
H A D | view_unittest.cc | 362 ViewObserver::TreeChangeParams p12; local 363 p12 = p1; 364 p12.receiver = &v12; 365 p12.phase = ViewObserver::DISPOSITION_CHANGED; 366 EXPECT_TRUE(TreeChangeParamsMatch(p12, o12.received_params().back()));
|
/external/chromium_org/third_party/skia/experimental/Intersection/ |
H A D | QuadraticIntersection_Test.cpp | 423 _Point p12 = xy_at_t(quad1, t12); local 425 p10.x, p10.y, p1Seed.x, p1Seed.y, p12.x, p12.y);
|
/external/skia/experimental/Intersection/ |
H A D | QuadraticIntersection_Test.cpp | 423 _Point p12 = xy_at_t(quad1, t12); local 425 p10.x, p10.y, p1Seed.x, p1Seed.y, p12.x, p12.y);
|
/external/chromium_org/mojo/services/public/cpp/view_manager/tests/ |
H A D | view_unittest.cc | 311 ViewObserver::TreeChangeParams p12; local 312 p12 = p1; 313 p12.receiver = &v12; 314 EXPECT_TRUE(TreeChangeParamsMatch(p12, o12.received_params().back()));
|
/external/chromium_org/third_party/tcmalloc/chromium/src/tests/ |
H A D | profiler_unittest.sh | 233 "$PROFILER1" 50 1 "$TMPDIR/p12" || RegisterFailure 234 "$PPROF" $PPROF_FLAGS "$PROFILER1_REALNAME" "$TMPDIR/p12" --raw \ 236 VerifyIdentical p12 "$PROFILER1_REALNAME" p13 "" || RegisterFailure
|
/external/chromium_org/third_party/tcmalloc/vendor/src/tests/ |
H A D | profiler_unittest.sh | 233 "$PROFILER1" 50 1 "$TMPDIR/p12" || RegisterFailure 234 "$PPROF" $PPROF_FLAGS "$PROFILER1_REALNAME" "$TMPDIR/p12" --raw \ 236 VerifyIdentical p12 "$PROFILER1_REALNAME" p13 "" || RegisterFailure
|