| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_mutl.c | 24 int PKCS12_mac_present(const PKCS12 *p12) 26 return p12->mac ? 1 : 0; 33 const PKCS12 *p12) 35 if (p12->mac) { 36 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); 38 *psalt = p12->mac->salt; 40 *piter = p12->mac->iter; 76 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 96 if (!PKCS7_type_is_data(p12->authsafes)) { 101 if (p12->authsafes->d.data == NULL) [all...] |
| p12_npas.c | 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 32 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) 36 if (p12 == NULL) { 43 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 48 if (!newpass_p12(p12, oldpass, newpass)) { 58 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) 69 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) 105 p12_data_tmp = p12->authsafes->d.data; 106 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) 108 if (!PKCS12_pack_authsafes(p12, newsafes) [all...] |
| p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 46 if (p12 == NULL) { 61 if (!PKCS12_mac_present(p12) 62 || PKCS12_verify_mac(p12, NULL, 0)) 64 else if (PKCS12_verify_mac(p12, "", 0)) 70 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 82 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { 136 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 144 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL [all...] |
| p12_crt.c | 42 PKCS12 *p12 = NULL; local 125 p12 = PKCS12_add_safes_ex(safes, 0, ctx, propq); 127 if (p12 == NULL) 135 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 138 return p12; 141 PKCS12_free(p12); 344 PKCS12 *p12; local 348 p12 = PKCS12_init_ex(nid_p7, ctx, propq); 349 if (p12 == NULL) 352 if (!PKCS12_pack_authsafes(p12, safes)) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_mutl.c | 18 int PKCS12_mac_present(const PKCS12 *p12) 20 return p12->mac ? 1 : 0; 27 const PKCS12 *p12) 29 if (p12->mac) { 30 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); 32 *psalt = p12->mac->salt; 34 *piter = p12->mac->iter; 70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 91 if (!PKCS7_type_is_data(p12->authsafes)) { 96 salt = p12->mac->salt->data [all...] |
| p12_npas.c | 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 32 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) 36 if (!p12) { 44 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 49 if (!newpass_p12(p12, oldpass, newpass)) { 59 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) 70 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) 105 p12_data_tmp = p12->authsafes->d.data; 106 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) 108 if (!PKCS12_pack_authsafes(p12, newsafes) [all...] |
| p12_crt.c | 35 PKCS12 *p12 = NULL; local 112 p12 = PKCS12_add_safes(safes, 0); 114 if (!p12) 122 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 125 return p12; 128 PKCS12_free(p12); 277 PKCS12 *p12; local 280 p12 = PKCS12_init(nid_p7); 282 if (!p12) 285 if (!PKCS12_pack_authsafes(p12, safes)) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| pkcs12_api_test.c | 35 PKCS12 *p12 = NULL; local 41 p12 = PKCS12_init_ex(NID_pkcs7_data, testctx, "provider=default"); 42 if (!TEST_ptr(p12)) 45 if (!TEST_true(p12 == d2i_PKCS12_bio(bio, &p12))) 50 return p12; 54 PKCS12_free(p12); 64 static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca) 73 if (!TEST_true(PKCS12_newpass(p12, in_pass, "NEWPASS"))) 77 if (!TEST_true(i2d_PKCS12_bio(bio, p12))) 106 PKCS12 *p12 = NULL; local 145 PKCS12 *p12 = NULL; local 162 PKCS12 *ptr = NULL, *p12 = NULL; local 263 PKCS12 *p12 = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_mutl.c | 31 int PKCS12_mac_present(const PKCS12 *p12) 33 return p12->mac ? 1 : 0; 40 const PKCS12 *p12) 42 if (p12->mac) { 43 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); 45 *psalt = p12->mac->salt; 47 *piter = p12->mac->iter; 171 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 192 if (!PKCS7_type_is_data(p12->authsafes)) { 197 if (p12->authsafes->d.data == NULL) [all...] |
| p12_init.c | 59 const PKCS7_CTX *ossl_pkcs12_get0_pkcs7ctx(const PKCS12 *p12) 61 if (p12 == NULL || p12->authsafes == NULL) 63 return &p12->authsafes->ctx;
|
| p12_npas.c | 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 34 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) 38 if (p12 == NULL) { 44 if (p12->mac != NULL) { 45 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 50 if (!newpass_p12(p12, oldpass, newpass)) { 60 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) 71 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) 110 p12_data_tmp = p12->authsafes->d.data; 111 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL [all...] |
| p12_asn.c | 32 void PKCS12_free(PKCS12 *p12) 34 if (p12 != NULL && p12->authsafes != NULL) { 35 OPENSSL_free(p12->authsafes->ctx.propq); 36 p12->authsafes->ctx.propq = NULL; 38 ASN1_item_free((ASN1_VALUE *)p12, ASN1_ITEM_rptr(PKCS12));
|
| p12_utl.c | 235 int i2d_PKCS12_bio(BIO *bp, const PKCS12 *p12) 237 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 241 int i2d_PKCS12_fp(FILE *fp, const PKCS12 *p12) 243 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 247 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) 253 if (p12 != NULL) { 254 p7ctx = ossl_pkcs12_get0_pkcs7ctx(*p12); 260 return ASN1_item_d2i_bio_ex(ASN1_ITEM_rptr(PKCS12), bp, p12, libctx, propq); 264 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) 270 if (p12 != NULL) [all...] |
| p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 35 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 48 if (p12 == NULL) { 54 if (PKCS12_mac_present(p12)) { 62 if (PKCS12_verify_mac(p12, NULL, 0)) 64 else if (PKCS12_verify_mac(p12, "", 0)) 70 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 85 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { 138 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 146 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL [all...] |
| /src/crypto/external/apache2/openssl/dist/test/helpers/ |
| pkcs12.c | 39 static int write_p12(PKCS12 *p12, const char *outfile); 43 static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac); 142 PKCS12 *p12; local 154 p12 = PKCS12_add_safes(pb->safes, 0); 156 p12 = PKCS12_add_safes_ex(pb->safes, 0, test_ctx, test_propq); 157 if (!TEST_ptr(p12)) { 169 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass), 175 i2d_PKCS12_bio(pb->p12bio, p12); 179 write_p12(p12, pb->filename); 183 PKCS12_free(p12); 204 PKCS12 *p12 = NULL; local 232 PKCS12 *p12 = NULL; local 663 PKCS12 *p12; local 683 PKCS12 *p12; local 703 PKCS12 *p12; local 723 PKCS12 *p12; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/helpers/ |
| pkcs12.c | 39 static int write_p12(PKCS12 *p12, const char *outfile); 43 static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac); 148 PKCS12 *p12; local 160 p12 = PKCS12_add_safes(pb->safes, 0); 162 p12 = PKCS12_add_safes_ex(pb->safes, 0, test_ctx, test_propq); 163 if (!TEST_ptr(p12)) { 175 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass), 181 i2d_PKCS12_bio(pb->p12bio, p12); 185 write_p12(p12, pb->filename); 189 PKCS12_free(p12); 211 PKCS12 *p12 = NULL; local 240 PKCS12 *p12 = NULL; local 662 PKCS12 *p12; local 682 PKCS12 *p12; local 702 PKCS12 *p12; local 722 PKCS12 *p12; local [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/pkcs12/ |
| pkwrite.c | 23 PKCS12 *p12; local 38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); 39 if (!p12) { 49 i2d_PKCS12_fp(fp, p12); 50 PKCS12_free(p12);
|
| pkread.c | 18 static char *find_friendly_name(PKCS12 *p12) 27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL) 54 PKCS12 *p12 = NULL; local 67 p12 = d2i_PKCS12_fp(fp, NULL); 69 if (p12 == NULL) { 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { 79 name = find_friendly_name(p12); 80 PKCS12_free(p12);
|
| /src/crypto/external/bsd/openssl/dist/demos/pkcs12/ |
| pkwrite.c | 23 PKCS12 *p12; local 38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); 39 if (!p12) { 49 i2d_PKCS12_fp(fp, p12); 50 PKCS12_free(p12);
|
| pkread.c | 18 static char *find_friendly_name(PKCS12 *p12) 27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL) 54 PKCS12 *p12 = NULL; local 67 p12 = d2i_PKCS12_fp(fp, NULL); 69 if (p12 == NULL) { 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { 79 name = find_friendly_name(p12); 80 PKCS12_free(p12);
|
| /src/crypto/external/bsd/openssl.old/dist/demos/pkcs12/ |
| pkwrite.c | 23 PKCS12 *p12; local 38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); 39 if (!p12) { 49 i2d_PKCS12_fp(fp, p12); 50 PKCS12_free(p12);
|
| pkread.c | 18 static char *find_friendly_name(PKCS12 *p12) 27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL) 54 PKCS12 *p12 = NULL; local 67 p12 = d2i_PKCS12_fp(fp, NULL); 69 if (p12 == NULL) { 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { 79 name = find_friendly_name(p12); 80 PKCS12_free(p12);
|
| /src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| pkcs12.h | 78 int PKCS12_mac_present(const PKCS12 *p12); 83 const PKCS12 *p12); 128 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 129 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12); variable 172 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 174 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 175 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 178 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 210 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| ks_p12.c | 332 struct ks_pkcs12 *p12; local 350 p12 = calloc(1, sizeof(*p12)); 351 if (p12 == NULL) { 357 p12->fn = strdup(residue); 358 if (p12->fn == NULL) { 366 0, lock, &p12->certs); 368 *data = p12; 435 ret = _hx509_collector_collect_certs(context, c, &p12->certs); 437 *data = p12; 573 struct ks_pkcs12 *p12 = data; local 651 struct ks_pkcs12 *p12 = data; local 661 struct ks_pkcs12 *p12 = data; local 671 struct ks_pkcs12 *p12 = data; local 682 struct ks_pkcs12 *p12 = data; local 692 struct ks_pkcs12 *p12 = data; local [all...] |
| test_query.in | 48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1 86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1 92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1 105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1 112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
|