Searched refs:p12 (Results 1 - 25 of 42) sorted by relevance

12

/external/openssl/crypto/pkcs12/
H A Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
76 if (!PKCS7_type_is_data(p12->authsafes))
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
84 if (!p12->mac->iter) iter = 1;
85 else iter = ASN1_INTEGER_get (p12->mac->iter);
87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) {
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data,
102 p12->authsafes->d.data->length)
113 int PKCS12_verify_mac(PKCS12 *p12, cons argument
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
156 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) argument
[all...]
H A Dp12_npas.c68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument
82 if(!p12) {
89 if (!PKCS12_verify_mac(p12, oldpass, -1)) {
94 if (!newpass_p12(p12, oldpass, newpass)) {
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument
114 if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0;
155 p12_data_tmp = p12->authsafes->d.data;
156 if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr;
157 if(!PKCS12_pack_authsafes(p12, newsafe
[all...]
H A Dp12_utl.c98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) argument
100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) argument
106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) argument
112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) argument
117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
H A Dp12_crt.c83 PKCS12 *p12 = NULL; local
171 p12 = PKCS12_add_safes(safes, 0);
173 if (!p12)
181 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
184 return p12;
188 if (p12)
189 PKCS12_free(p12);
358 PKCS12 *p12; local
361 p12 = PKCS12_init(nid_p7);
363 if (!p12)
[all...]
H A Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
[all...]
H A Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
87 if(!p12)
107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL;
108 else if(PKCS12_verify_mac(p12, "", 0)) pass = "";
113 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts))
179 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument
187 if (!(asafes = PKCS12_unpack_authsafes (p12))) return 0;
H A Dp12_add.c224 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) argument
227 &p12->authsafes->d.data))
232 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
234 if (!PKCS7_type_is_data(p12->authsafes))
239 return ASN1_item_unpack(p12->authsafes->d.data, ASN1_ITEM_rptr(PKCS12_AUTHSAFES));
/external/llvm/test/MC/ARM/
H A Dgas-compl-copr-reg.s3 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0xed]
6 ldc p12, cr4, [r0, #4]
10 @ CHECK: ldc p12, c4, [r0, #4] @ encoding: [0x01,0x4c,0x90,0xed]
13 ldc p12, cr4, [r0, #4]
H A Dthumb-only-conditionals.s44 mrc2ne p12, #3, r3, c3, c4
47 @ CHECK-NEXT: mrc2ne p12, #3, r3, c3, c4
/external/openssl/include/openssl/
H A Dpkcs12.h167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
196 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
197 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable
225 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
227 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
228 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
259 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
[all...]
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dpkcs8.h157 * |p12|. The |out_pkey| and |out_cert| arguments must not be NULL and, on
164 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
168 /* PKCS12_free frees |p12| and its contents. */
169 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12);
/external/openssl/apps/
H A Dpkcs12.c83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
105 PKCS12 *p12 = NULL; local
590 p12 = PKCS12_create(cpass, name, key, ucert, certs,
593 if (!p12)
610 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd);
617 i2d_PKCS12_bio(out, p12);
639 if (!(p12 = d2i_PKCS12_bio (in, NULL))) {
657 if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12
704 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
H A Dpkcs8.c1030 PKCS12 *p12; local
1035 p12 = OPENSSL_malloc(sizeof(PKCS12));
1036 if (!p12) {
1040 p12->ber_bytes = OPENSSL_malloc(ber_len);
1041 if (!p12->ber_bytes) {
1042 OPENSSL_free(p12);
1046 memcpy(p12->ber_bytes, *ber_bytes, ber_len);
1047 p12->ber_len = ber_len;
1050 return p12;
1111 int PKCS12_parse(const PKCS12 *p12, cons argument
1151 PKCS12_free(PKCS12 *p12) argument
[all...]
/external/chromium_org/net/data/ssl/scripts/
H A Dgenerate-duplicate-cn-certs.sh94 -out ../certificates/duplicate_cn_1.p12 \
101 -out ../certificates/duplicate_cn_2.p12 \
H A Dgenerate-client-certificates.sh153 -out client_1.p12 \
159 -out client_2.p12 \
/external/chromium_org/third_party/skia/tests/
H A DPathOpsQuadIntersectionTest.cpp493 SkDPoint p12 = quad1.ptAtT(t12); local
495 p10.fX, p10.fY, p1Seed.fX, p1Seed.fY, p12.fX, p12.fY);
/external/opencv/cv/src/
H A Dcvposit.cpp303 float p12 = -(ata00 * ata12 - ata01 * ata02); local
320 b[n + k] = (p01 * a0 + p11 * a1 + p12 * a2) * inv_det;
321 b[2 * n + k] = (p02 * a0 + p12 * a1 + p22 * a2) * inv_det;
/external/skia/tests/
H A DPathOpsQuadIntersectionTest.cpp490 SkDPoint p12 = quad1.ptAtT(t12); local
492 p10.fX, p10.fY, p1Seed.fX, p1Seed.fY, p12.fX, p12.fY);
/external/linux-tools-perf/perf-3.12.0/arch/ia64/lib/
H A Dmemcpy_mck.S407 cmp.le p12,p13 = 3,in2
422 EX(.ex_handler_short, (p12) ld1 t3=[src0],2)
431 EX(.ex_handler_short, (p12) st1 [dst0]=t3,2)
477 cmp.le p12,p0 = 7,r30
485 EK(.ex_handler_short, (p12) ld1 t7=[src0],2)
492 EK(.ex_handler_short, (p12) st1 [dst0] = t7)
548 * p12-p13: dst faulting addr calculation
576 cmp.gtu p12,p13=dst_pre_mem,saved_in0
580 (p12) add dst0=8,saved_in0
597 cmp.ltu p12,p1
[all...]
/external/chromium_org/ui/v2/src/
H A Dview_unittest.cc362 ViewObserver::TreeChangeParams p12; local
363 p12 = p1;
364 p12.receiver = &v12;
365 p12.phase = ViewObserver::DISPOSITION_CHANGED;
366 EXPECT_TRUE(TreeChangeParamsMatch(p12, o12.received_params().back()));
/external/chromium_org/third_party/skia/experimental/Intersection/
H A DQuadraticIntersection_Test.cpp423 _Point p12 = xy_at_t(quad1, t12); local
425 p10.x, p10.y, p1Seed.x, p1Seed.y, p12.x, p12.y);
/external/skia/experimental/Intersection/
H A DQuadraticIntersection_Test.cpp423 _Point p12 = xy_at_t(quad1, t12); local
425 p10.x, p10.y, p1Seed.x, p1Seed.y, p12.x, p12.y);
/external/chromium_org/mojo/services/public/cpp/view_manager/tests/
H A Dview_unittest.cc311 ViewObserver::TreeChangeParams p12; local
312 p12 = p1;
313 p12.receiver = &v12;
314 EXPECT_TRUE(TreeChangeParamsMatch(p12, o12.received_params().back()));
/external/chromium_org/third_party/tcmalloc/chromium/src/tests/
H A Dprofiler_unittest.sh233 "$PROFILER1" 50 1 "$TMPDIR/p12" || RegisterFailure
234 "$PPROF" $PPROF_FLAGS "$PROFILER1_REALNAME" "$TMPDIR/p12" --raw \
236 VerifyIdentical p12 "$PROFILER1_REALNAME" p13 "" || RegisterFailure
/external/chromium_org/third_party/tcmalloc/vendor/src/tests/
H A Dprofiler_unittest.sh233 "$PROFILER1" 50 1 "$TMPDIR/p12" || RegisterFailure
234 "$PPROF" $PPROF_FLAGS "$PROFILER1_REALNAME" "$TMPDIR/p12" --raw \
236 VerifyIdentical p12 "$PROFILER1_REALNAME" p13 "" || RegisterFailure

Completed in 8875 milliseconds

12