HomeSort by: relevance | last modified time | path
    Searched refs:p12 (Results 1 - 25 of 79) sorted by relevancy

1 2 3 4

  /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/
p12_mutl.c 24 int PKCS12_mac_present(const PKCS12 *p12)
26 return p12->mac ? 1 : 0;
33 const PKCS12 *p12)
35 if (p12->mac) {
36 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac);
38 *psalt = p12->mac->salt;
40 *piter = p12->mac->iter;
76 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
96 if (!PKCS7_type_is_data(p12->authsafes)) {
101 if (p12->authsafes->d.data == NULL)
    [all...]
p12_npas.c 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
32 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass)
36 if (p12 == NULL) {
43 if (!PKCS12_verify_mac(p12, oldpass, -1)) {
48 if (!newpass_p12(p12, oldpass, newpass)) {
58 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
69 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
105 p12_data_tmp = p12->authsafes->d.data;
106 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL)
108 if (!PKCS12_pack_authsafes(p12, newsafes)
    [all...]
p12_kiss.c 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
46 if (p12 == NULL) {
61 if (!PKCS12_mac_present(p12)
62 || PKCS12_verify_mac(p12, NULL, 0))
64 else if (PKCS12_verify_mac(p12, "", 0))
70 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
82 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) {
136 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
144 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL
    [all...]
p12_crt.c 42 PKCS12 *p12 = NULL; local
125 p12 = PKCS12_add_safes_ex(safes, 0, ctx, propq);
127 if (p12 == NULL)
135 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
138 return p12;
141 PKCS12_free(p12);
344 PKCS12 *p12; local
348 p12 = PKCS12_init_ex(nid_p7, ctx, propq);
349 if (p12 == NULL)
352 if (!PKCS12_pack_authsafes(p12, safes))
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
p12_mutl.c 18 int PKCS12_mac_present(const PKCS12 *p12)
20 return p12->mac ? 1 : 0;
27 const PKCS12 *p12)
29 if (p12->mac) {
30 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac);
32 *psalt = p12->mac->salt;
34 *piter = p12->mac->iter;
70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
91 if (!PKCS7_type_is_data(p12->authsafes)) {
96 salt = p12->mac->salt->data
    [all...]
p12_npas.c 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
32 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass)
36 if (!p12) {
44 if (!PKCS12_verify_mac(p12, oldpass, -1)) {
49 if (!newpass_p12(p12, oldpass, newpass)) {
59 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
70 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
105 p12_data_tmp = p12->authsafes->d.data;
106 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL)
108 if (!PKCS12_pack_authsafes(p12, newsafes)
    [all...]
p12_crt.c 35 PKCS12 *p12 = NULL; local
112 p12 = PKCS12_add_safes(safes, 0);
114 if (!p12)
122 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
125 return p12;
128 PKCS12_free(p12);
277 PKCS12 *p12; local
280 p12 = PKCS12_init(nid_p7);
282 if (!p12)
285 if (!PKCS12_pack_authsafes(p12, safes))
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
pkcs12_api_test.c 35 PKCS12 *p12 = NULL; local
41 p12 = PKCS12_init_ex(NID_pkcs7_data, testctx, "provider=default");
42 if (!TEST_ptr(p12))
45 if (!TEST_true(p12 == d2i_PKCS12_bio(bio, &p12)))
50 return p12;
54 PKCS12_free(p12);
64 static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca)
73 if (!TEST_true(PKCS12_newpass(p12, in_pass, "NEWPASS")))
77 if (!TEST_true(i2d_PKCS12_bio(bio, p12)))
106 PKCS12 *p12 = NULL; local
145 PKCS12 *p12 = NULL; local
162 PKCS12 *ptr = NULL, *p12 = NULL; local
263 PKCS12 *p12 = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/
p12_mutl.c 31 int PKCS12_mac_present(const PKCS12 *p12)
33 return p12->mac ? 1 : 0;
40 const PKCS12 *p12)
42 if (p12->mac) {
43 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac);
45 *psalt = p12->mac->salt;
47 *piter = p12->mac->iter;
171 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
192 if (!PKCS7_type_is_data(p12->authsafes)) {
197 if (p12->authsafes->d.data == NULL)
    [all...]
p12_init.c 59 const PKCS7_CTX *ossl_pkcs12_get0_pkcs7ctx(const PKCS12 *p12)
61 if (p12 == NULL || p12->authsafes == NULL)
63 return &p12->authsafes->ctx;
p12_npas.c 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
34 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass)
38 if (p12 == NULL) {
44 if (p12->mac != NULL) {
45 if (!PKCS12_verify_mac(p12, oldpass, -1)) {
50 if (!newpass_p12(p12, oldpass, newpass)) {
60 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
71 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
110 p12_data_tmp = p12->authsafes->d.data;
111 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL
    [all...]
p12_asn.c 32 void PKCS12_free(PKCS12 *p12)
34 if (p12 != NULL && p12->authsafes != NULL) {
35 OPENSSL_free(p12->authsafes->ctx.propq);
36 p12->authsafes->ctx.propq = NULL;
38 ASN1_item_free((ASN1_VALUE *)p12, ASN1_ITEM_rptr(PKCS12));
p12_utl.c 235 int i2d_PKCS12_bio(BIO *bp, const PKCS12 *p12)
237 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
241 int i2d_PKCS12_fp(FILE *fp, const PKCS12 *p12)
243 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
247 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12)
253 if (p12 != NULL) {
254 p7ctx = ossl_pkcs12_get0_pkcs7ctx(*p12);
260 return ASN1_item_d2i_bio_ex(ASN1_ITEM_rptr(PKCS12), bp, p12, libctx, propq);
264 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12)
270 if (p12 != NULL)
    [all...]
p12_kiss.c 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
35 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
48 if (p12 == NULL) {
54 if (PKCS12_mac_present(p12)) {
62 if (PKCS12_verify_mac(p12, NULL, 0))
64 else if (PKCS12_verify_mac(p12, "", 0))
70 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
85 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) {
138 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
146 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/helpers/
pkcs12.c 39 static int write_p12(PKCS12 *p12, const char *outfile);
43 static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac);
142 PKCS12 *p12; local
154 p12 = PKCS12_add_safes(pb->safes, 0);
156 p12 = PKCS12_add_safes_ex(pb->safes, 0, test_ctx, test_propq);
157 if (!TEST_ptr(p12)) {
169 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass),
175 i2d_PKCS12_bio(pb->p12bio, p12);
179 write_p12(p12, pb->filename);
183 PKCS12_free(p12);
204 PKCS12 *p12 = NULL; local
232 PKCS12 *p12 = NULL; local
663 PKCS12 *p12; local
683 PKCS12 *p12; local
703 PKCS12 *p12; local
723 PKCS12 *p12; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/helpers/
pkcs12.c 39 static int write_p12(PKCS12 *p12, const char *outfile);
43 static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac);
148 PKCS12 *p12; local
160 p12 = PKCS12_add_safes(pb->safes, 0);
162 p12 = PKCS12_add_safes_ex(pb->safes, 0, test_ctx, test_propq);
163 if (!TEST_ptr(p12)) {
175 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass),
181 i2d_PKCS12_bio(pb->p12bio, p12);
185 write_p12(p12, pb->filename);
189 PKCS12_free(p12);
211 PKCS12 *p12 = NULL; local
240 PKCS12 *p12 = NULL; local
662 PKCS12 *p12; local
682 PKCS12 *p12; local
702 PKCS12 *p12; local
722 PKCS12 *p12; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/demos/pkcs12/
pkwrite.c 23 PKCS12 *p12; local
38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
39 if (!p12) {
49 i2d_PKCS12_fp(fp, p12);
50 PKCS12_free(p12);
pkread.c 18 static char *find_friendly_name(PKCS12 *p12)
27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL)
54 PKCS12 *p12 = NULL; local
67 p12 = d2i_PKCS12_fp(fp, NULL);
69 if (p12 == NULL) {
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) {
79 name = find_friendly_name(p12);
80 PKCS12_free(p12);
  /src/crypto/external/bsd/openssl/dist/demos/pkcs12/
pkwrite.c 23 PKCS12 *p12; local
38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
39 if (!p12) {
49 i2d_PKCS12_fp(fp, p12);
50 PKCS12_free(p12);
pkread.c 18 static char *find_friendly_name(PKCS12 *p12)
27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL)
54 PKCS12 *p12 = NULL; local
67 p12 = d2i_PKCS12_fp(fp, NULL);
69 if (p12 == NULL) {
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) {
79 name = find_friendly_name(p12);
80 PKCS12_free(p12);
  /src/crypto/external/bsd/openssl.old/dist/demos/pkcs12/
pkwrite.c 23 PKCS12 *p12; local
38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
39 if (!p12) {
49 i2d_PKCS12_fp(fp, p12);
50 PKCS12_free(p12);
pkread.c 18 static char *find_friendly_name(PKCS12 *p12)
27 if ((safes = PKCS12_unpack_authsafes(p12)) == NULL)
54 PKCS12 *p12 = NULL; local
67 p12 = d2i_PKCS12_fp(fp, NULL);
69 if (p12 == NULL) {
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) {
79 name = find_friendly_name(p12);
80 PKCS12_free(p12);
  /src/crypto/external/bsd/openssl.old/dist/include/openssl/
pkcs12.h 78 int PKCS12_mac_present(const PKCS12 *p12);
83 const PKCS12 *p12);
128 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
129 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12); variable
172 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
174 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
175 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
178 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
210 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
ks_p12.c 332 struct ks_pkcs12 *p12; local
350 p12 = calloc(1, sizeof(*p12));
351 if (p12 == NULL) {
357 p12->fn = strdup(residue);
358 if (p12->fn == NULL) {
366 0, lock, &p12->certs);
368 *data = p12;
435 ret = _hx509_collector_collect_certs(context, c, &p12->certs);
437 *data = p12;
573 struct ks_pkcs12 *p12 = data; local
651 struct ks_pkcs12 *p12 = data; local
661 struct ks_pkcs12 *p12 = data; local
671 struct ks_pkcs12 *p12 = data; local
682 struct ks_pkcs12 *p12 = data; local
692 struct ks_pkcs12 *p12 = data; local
    [all...]
test_query.in 48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1
92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1
105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1
112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1

Completed in 56 milliseconds

1 2 3 4