/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_p8e.c | 68 X509_SIG *p8 = NULL; local 71 if (!(p8 = X509_SIG_new())) { 82 X509_ALGOR_free(p8->algor); 83 p8->algor = pbe; 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) { 92 return p8; 95 X509_SIG_free(p8);
|
H A D | p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass, 66 passlen, p8->digest, 1);
|
H A D | p12_attr.c | 77 int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage) argument 81 if (X509at_add1_attr_by_NID(&p8->attributes, NID_key_usage,
|
H A D | p12_crt.c | 233 PKCS8_PRIV_KEY_INFO *p8 = NULL; local 236 if(!(p8 = EVP_PKEY2PKCS8(key))) 238 if(key_usage && !PKCS8_add_keyusage(p8, key_usage)) 242 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 243 PKCS8_PRIV_KEY_INFO_free(p8); 246 bag = PKCS12_MAKE_KEYBAG(p8);
|
H A D | pkcs12.h | 164 #define PKCS8_get_attr(p8, attr_nid) \ 165 PKCS12_get_attr_gen(p8->attributes, attr_nid) 177 PKCS12_SAFEBAG *PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8); 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 184 PKCS8_PRIV_KEY_INFO *p8); 188 PKCS8_PRIV_KEY_INFO *p8); 206 int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage);
|
H A D | p12_npas.c | 194 PKCS8_PRIV_KEY_INFO *p8; local 200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; 205 p8_iter, p8))) return 0;
|
H A D | p12_add.c | 90 PKCS12_SAFEBAG *PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8) argument 98 bag->value.keybag = p8; 106 PKCS8_PRIV_KEY_INFO *p8) 126 p8))) { 104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
|
H A D | p12_kiss.c | 227 PKCS8_PRIV_KEY_INFO *p8; local 251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 253 *pkey = EVP_PKCS82PKEY(p8); 254 PKCS8_PRIV_KEY_INFO_free(p8);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | i2d_pr.c | 72 PKCS8_PRIV_KEY_INFO *p8 = EVP_PKEY2PKCS8(a); local 73 int ret = i2d_PKCS8_PRIV_KEY_INFO(p8,pp); 74 PKCS8_PRIV_KEY_INFO_free(p8);
|
H A D | p8_pkey.c | 127 PKCS8_PRIV_KEY_INFO *p8) 130 *ppkalg = p8->pkeyalg->algorithm; 131 if(p8->pkey->type == V_ASN1_OCTET_STRING) 133 p8->broken = PKCS8_OK; 136 *pk = p8->pkey->value.octet_string->data; 137 *ppklen = p8->pkey->value.octet_string->length; 140 else if (p8->pkey->type == V_ASN1_SEQUENCE) 142 p8->broken = PKCS8_NO_OCTET; 145 *pk = p8->pkey->value.sequence->data; 146 *ppklen = p8 [all...] |
H A D | d2i_pr.c | 107 PKCS8_PRIV_KEY_INFO *p8=NULL; local 108 p8=d2i_PKCS8_PRIV_KEY_INFO(NULL,pp,length); 109 if (!p8) goto err; 111 ret = EVP_PKCS82PKEY(p8); 112 PKCS8_PRIV_KEY_INFO_free(p8); 151 PKCS8_PRIV_KEY_INFO *p8 = d2i_PKCS8_PRIV_KEY_INFO(NULL,pp,length); local 155 if (!p8) 160 ret = EVP_PKCS82PKEY(p8); 161 PKCS8_PRIV_KEY_INFO_free(p8);
|
H A D | asn1_locl.h | 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | evp_pkey.c | 68 EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8) argument 74 if (!PKCS8_pkey_get0(&algoid, NULL, NULL, NULL, p8)) 92 if (!pkey->ameth->priv_decode(pkey, p8)) 121 PKCS8_PRIV_KEY_INFO *p8; local 123 if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) { 127 p8->broken = broken; 133 if (!pkey->ameth->priv_encode(p8, pkey)) 153 RAND_add(p8->pkey->value.octet_string->data, 154 p8->pkey->value.octet_string->length, 0.0); 155 return p8; 161 PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pem/ |
H A D | pem_pk8.c | 116 X509_SIG *p8; local 137 p8 = PKCS8_encrypt(nid, enc, kstr, klen, NULL, 0, 0, p8inf); 140 if(isder) ret = i2d_PKCS8_bio(bp, p8); 141 else ret = PEM_write_bio_PKCS8(bp, p8); 142 X509_SIG_free(p8); 155 X509_SIG *p8 = NULL; local 159 p8 = d2i_PKCS8_bio(bp, NULL); 160 if(!p8) return NULL; 165 X509_SIG_free(p8); 168 p8inf = PKCS8_decrypt(p8, psbu [all...] |
H A D | pem_pkey.c | 100 X509_SIG *p8; local 103 p8 = d2i_X509_SIG(NULL, &p, len); 104 if(!p8) goto p8err; 110 X509_SIG_free(p8); 113 p8inf = PKCS8_decrypt(p8, psbuf, klen); 114 X509_SIG_free(p8);
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | pkcs8.c | 83 X509_SIG *p8 = NULL; local 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher, 321 PEM_write_bio_PKCS8(out, p8); 323 i2d_PKCS8_bio(out, p8); 350 p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL); 352 p8 = d2i_PKCS8_bio(in, NULL); 359 if (!p8) 372 p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass)); 428 X509_SIG_free(p8);
|
H A D | pkcs12.c | 757 PKCS8_PRIV_KEY_INFO *p8; local 766 p8 = bag->value.keybag; 767 if (!(pkey = EVP_PKCS82PKEY (p8))) return 0; 768 print_attribs (out, p8->attributes, "Key Attributes"); 780 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 782 if (!(pkey = EVP_PKCS82PKEY (p8))) { 783 PKCS8_PRIV_KEY_INFO_free(p8); 786 print_attribs (out, p8->attributes, "Key Attributes"); 787 PKCS8_PRIV_KEY_INFO_free(p8);
|
/barrelfish-master/include/openssl/ |
H A D | pkcs12.h | 164 #define PKCS8_get_attr(p8, attr_nid) \ 165 PKCS12_get_attr_gen(p8->attributes, attr_nid) 177 PKCS12_SAFEBAG *PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8); 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 184 PKCS8_PRIV_KEY_INFO *p8); 188 PKCS8_PRIV_KEY_INFO *p8); 206 int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage);
|
/barrelfish-master/usr/eclipseclp/ecrc_solvers/propia/ |
H A D | manual_examples.pl | 26 product(p8,18,2,2).
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_ameth.c | 127 static int rsa_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey) argument 139 if (!PKCS8_pkey_set0(p8, OBJ_nid2obj(NID_rsaEncryption), 0, 149 static int rsa_priv_decode(EVP_PKEY *pkey, PKCS8_PRIV_KEY_INFO *p8) argument 153 if (!PKCS8_pkey_get0(NULL, &p, &pklen, NULL, p8))
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x_all.c | 406 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) argument 408 return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8); 411 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) argument 413 return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8); 417 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) argument 419 return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8); 422 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) argument 424 return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8);
|
/barrelfish-master/include/openssl/local/ |
H A D | asn1_locl.h | 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsa_ameth.c | 190 static int dsa_priv_decode(EVP_PKEY *pkey, PKCS8_PRIV_KEY_INFO *p8) argument 204 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &palg, p8)) 225 p8->broken = PKCS8_EMBEDDED_PARAM; 229 p8->broken = PKCS8_NS_DB; 245 p8->broken = PKCS8_NEG_PRIVKEY; 303 static int dsa_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey) argument 339 if (!PKCS8_pkey_set0(p8, OBJ_nid2obj(NID_dsa), 0,
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dh_ameth.c | 184 static int dh_priv_decode(EVP_PKEY *pkey, PKCS8_PRIV_KEY_INFO *p8) argument 196 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &palg, p8)) 236 static int dh_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey) argument 272 if (!PKCS8_pkey_set0(p8, OBJ_nid2obj(NID_dhKeyAgreement), 0,
|
/barrelfish-master/lib/openssl-1.0.0d/demos/engines/cluster_labs/ |
H A D | hw_cluster_labs.c | 304 cl_rsa_pub_dec *p8; local 337 !(p8 = (cl_rsa_pub_dec *)DSO_bind_func( 358 p_cl_rsa_pub_dec = p8;
|