| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_init.c | 12 #include <openssl/pkcs12.h> 15 /* Initialise a PKCS12 structure to take data */ 17 PKCS12 *PKCS12_init(int mode) 19 PKCS12 *pkcs12; local 21 if ((pkcs12 = PKCS12_new()) == NULL) { 25 if (!ASN1_INTEGER_set(pkcs12->version, 3)) 27 pkcs12->authsafes->type = OBJ_nid2obj(mode); 30 if ((pkcs12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) { 39 return pkcs12; [all...] |
| p12_init.c | 12 #include <openssl/pkcs12.h> 15 /* Initialise a PKCS12 structure to take data */ 17 PKCS12 *PKCS12_init(int mode) 19 PKCS12 *pkcs12; local 21 if ((pkcs12 = PKCS12_new()) == NULL) { 25 if (!ASN1_INTEGER_set(pkcs12->version, 3)) 27 pkcs12->authsafes->type = OBJ_nid2obj(mode); 30 if ((pkcs12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) { 39 return pkcs12; [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_init.c | 12 #include <openssl/pkcs12.h> 16 /* Initialise a PKCS12 structure to take data */ 18 PKCS12 *PKCS12_init_ex(int mode, OSSL_LIB_CTX *ctx, const char *propq) 20 PKCS12 *pkcs12; local 22 if ((pkcs12 = PKCS12_new()) == NULL) { 26 if (!ASN1_INTEGER_set(pkcs12->version, 3)) 28 pkcs12->authsafes->type = OBJ_nid2obj(mode); 30 ossl_pkcs7_set0_libctx(pkcs12->authsafes, ctx); 31 if (!ossl_pkcs7_set1_propq(pkcs12->authsafes, propq)) [all...] |
| p12_init.c | 12 #include <openssl/pkcs12.h> 16 /* Initialise a PKCS12 structure to take data */ 18 PKCS12 *PKCS12_init_ex(int mode, OSSL_LIB_CTX *ctx, const char *propq) 20 PKCS12 *pkcs12; local 22 if ((pkcs12 = PKCS12_new()) == NULL) { 26 if (!ASN1_INTEGER_set(pkcs12->version, 3)) 28 pkcs12->authsafes->type = OBJ_nid2obj(mode); 30 ossl_pkcs7_set0_libctx(pkcs12->authsafes, ctx); 31 if (!ossl_pkcs7_set1_propq(pkcs12->authsafes, propq)) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_init.c | 12 #include <openssl/pkcs12.h> 16 /* Initialise a PKCS12 structure to take data */ 18 PKCS12 *PKCS12_init_ex(int mode, OSSL_LIB_CTX *ctx, const char *propq) 20 PKCS12 *pkcs12; local 22 if ((pkcs12 = PKCS12_new()) == NULL) { 26 if (!ASN1_INTEGER_set(pkcs12->version, 3)) 28 pkcs12->authsafes->type = OBJ_nid2obj(mode); 30 ossl_pkcs7_set0_libctx(pkcs12->authsafes, ctx); 31 if (!ossl_pkcs7_set1_propq(pkcs12->authsafes, propq)) [all...] |
| p12_init.c | 12 #include <openssl/pkcs12.h> 16 /* Initialise a PKCS12 structure to take data */ 18 PKCS12 *PKCS12_init_ex(int mode, OSSL_LIB_CTX *ctx, const char *propq) 20 PKCS12 *pkcs12; local 22 if ((pkcs12 = PKCS12_new()) == NULL) { 26 if (!ASN1_INTEGER_set(pkcs12->version, 3)) 28 pkcs12->authsafes->type = OBJ_nid2obj(mode); 30 ossl_pkcs7_set0_libctx(pkcs12->authsafes, ctx); 31 if (!ossl_pkcs7_set1_propq(pkcs12->authsafes, propq)) [all...] |
| /src/external/bsd/ppp/dist/pppd/ |
| eap-tls.c | 52 #include <openssl/pkcs12.h> 258 char *certfile, char *privkeyfile, char *pkcs12) 269 PKCS12 *p12 = NULL; 278 if (!pkcs12[0]) 430 if (pkcs12[0]) 432 input = BIO_new_file(pkcs12, "r"); 435 error("EAP-TLS: Cannot open `%s' PKCS12 for input", pkcs12); 443 error("EAP-TLS: Cannot load PKCS12 certificate"); 449 error("EAP-TLS: Cannot parse PKCS12 certificate, invalid password") 654 char pkcs12[MAXWORDLEN]; local 732 char pkcs12[MAXWORDLEN]; local [all...] |
| eap-tls.c | 52 #include <openssl/pkcs12.h> 258 char *certfile, char *privkeyfile, char *pkcs12) 269 PKCS12 *p12 = NULL; 278 if (!pkcs12[0]) 430 if (pkcs12[0]) 432 input = BIO_new_file(pkcs12, "r"); 435 error("EAP-TLS: Cannot open `%s' PKCS12 for input", pkcs12); 443 error("EAP-TLS: Cannot load PKCS12 certificate"); 449 error("EAP-TLS: Cannot parse PKCS12 certificate, invalid password") 654 char pkcs12[MAXWORDLEN]; local 732 char pkcs12[MAXWORDLEN]; local [all...] |