Searched refs:PKCS12 (Results 1 - 20 of 20) sorted by relevance

/freebsd-10.3-release/crypto/openssl/crypto/pkcs12/
H A Dp12_utl.c107 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12)
109 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
113 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12)
115 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
119 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12)
121 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
125 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12)
127 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), f
[all...]
H A Dp12_init.c64 /* Initialise a PKCS12 structure to take data */
66 PKCS12 *PKCS12_init(int mode)
68 PKCS12 *pkcs12;
H A Dpkcs12.h112 } PKCS12; typedef in typeref:struct:__anon5611
199 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
200 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
224 PKCS12 *PKCS12_init(int mode);
234 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
236 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
237 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
246 DECLARE_ASN1_FUNCTIONS(PKCS12)
255 int PKCS12_parse(PKCS12 *p1
[all...]
H A Dp12_asn.c67 ASN1_SEQUENCE(PKCS12) = { variable
68 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER),
69 ASN1_SIMPLE(PKCS12, authsafes, PKCS7),
70 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA)
71 } ASN1_SEQUENCE_END(PKCS12)
73 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
H A Dp12_mutl.c69 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
114 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
134 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
159 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
H A Dp12_npas.c69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass)
81 /* Check for NULL PKCS12 structure */
106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
84 PKCS12 *p12 = NULL;
341 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7)
343 PKCS12 *p12;
H A Dp12_kiss.c66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
87 /* Check for NULL PKCS12 structure */
180 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
H A Dp12_add.c241 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes)
249 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
/freebsd-10.3-release/crypto/heimdal/lib/hx509/
H A Dtest_query.in48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1
92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1
105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1
112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
H A Dtest_nist_pkcs12.in66 if ${hxtool} validate $pass PKCS12:$a > /dev/null; then
H A Dtest_crypto.in178 echo "copy keystore FILE -> PKCS12"
181 PKCS12:out2.pem || exit 1
H A Dtest_cms.in216 --certificate=PKCS12:$srcdir/data/test.p12 \
/freebsd-10.3-release/crypto/openssl/apps/
H A DCA.pl54 $PKCS12="$openssl pkcs12";
127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
H A DCA.pl.in54 $PKCS12="$openssl pkcs12";
127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
H A DCA.sh69 PKCS12="openssl pkcs12"
150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
H A Dpkcs12.c84 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
110 PKCS12 *p12 = NULL;
334 BIO_printf(bio_err, "-export output PKCS12 file\n");
771 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass,
H A Dapps.c280 || (strcmp(s, "PKCS12") == 0) || (strcmp(s, "pkcs12") == 0)
753 PKCS12 *p12;
756 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc);
774 "Mac verify error (wrong password?) in PKCS12 file for %s\n",
/freebsd-10.3-release/contrib/wpa/src/crypto/
H A Dtls_openssl.c1705 static int tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12,
1719 "Failed to parse PKCS12 file");
1723 wpa_printf(MSG_DEBUG, "TLS: Successfully parsed PKCS12 data");
1728 wpa_printf(MSG_DEBUG, "TLS: Got certificate from PKCS12: "
1741 wpa_printf(MSG_DEBUG, "TLS: Got private key from PKCS12");
1757 " from PKCS12: subject='%s'", buf);
1785 PKCS12 *p12;
1803 wpa_printf(MSG_INFO, "TLS: PKCS12 support disabled - cannot read "
1814 PKCS12 *p12;
1826 wpa_printf(MSG_INFO, "TLS: PKCS12 suppor
[all...]
/freebsd-10.3-release/contrib/serf/buckets/
H A Dssl_buckets.c1143 PKCS12 *p12;
1160 /* Load the x.509 cert file stored in PKCS12 */

Completed in 165 milliseconds