Searched refs:pbe_nid (Results 1 - 3 of 3) sorted by relevance
/external/boringssl/include/openssl/ |
H A D | pkcs8.h | 73 * passing -1 for |pbe_nid|. Otherwise, PBES1 is used and |cipher| is ignored. 87 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt_pbe(int pbe_nid, 124 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
|
/external/boringssl/src/include/openssl/ |
H A D | pkcs8.h | 73 * passing -1 for |pbe_nid|. Otherwise, PBES1 is used and |cipher| is ignored. 87 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt_pbe(int pbe_nid, 124 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 274 int pbe_nid; member in struct:pbe_suite 301 static const struct pbe_suite *get_pbe_suite(int pbe_nid) { argument 304 if (kBuiltinPBE[i].pbe_nid == pbe_nid) { 313 * appropriate to the supplied |pbe_nid|. The input |pass| is treated as a 321 static int pass_to_pass_raw(int pbe_nid, const char *pass, int pass_len, argument 336 const struct pbe_suite *suite = get_pbe_suite(pbe_nid); 534 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, argument 539 if (!pass_to_pass_raw(pbe_nid, pass, pass_len, &pass_raw, &pass_raw_len)) { 543 X509_SIG *ret = PKCS8_encrypt_pbe(pbe_nid, ciphe 553 PKCS8_encrypt_pbe(int pbe_nid, const EVP_CIPHER *cipher, const uint8_t *pass_raw, size_t pass_raw_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument [all...] |
Completed in 78 milliseconds