Searched refs:pbe_nid (Results 1 - 3 of 3) sorted by relevance

/external/boringssl/include/openssl/
H A Dpkcs8.h73 * passing -1 for |pbe_nid|. Otherwise, PBES1 is used and |cipher| is ignored.
87 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt_pbe(int pbe_nid,
124 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
/external/boringssl/src/include/openssl/
H A Dpkcs8.h73 * passing -1 for |pbe_nid|. Otherwise, PBES1 is used and |cipher| is ignored.
87 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt_pbe(int pbe_nid,
124 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
/external/boringssl/src/crypto/pkcs8/
H A Dpkcs8.c274 int pbe_nid; member in struct:pbe_suite
301 static const struct pbe_suite *get_pbe_suite(int pbe_nid) { argument
304 if (kBuiltinPBE[i].pbe_nid == pbe_nid) {
313 * appropriate to the supplied |pbe_nid|. The input |pass| is treated as a
321 static int pass_to_pass_raw(int pbe_nid, const char *pass, int pass_len, argument
336 const struct pbe_suite *suite = get_pbe_suite(pbe_nid);
534 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, argument
539 if (!pass_to_pass_raw(pbe_nid, pass, pass_len, &pass_raw, &pass_raw_len)) {
543 X509_SIG *ret = PKCS8_encrypt_pbe(pbe_nid, ciphe
553 PKCS8_encrypt_pbe(int pbe_nid, const EVP_CIPHER *cipher, const uint8_t *pass_raw, size_t pass_raw_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument
[all...]

Completed in 78 milliseconds