/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_attr.c | 66 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, argument 69 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 91 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, argument 94 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, argument 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) argument 113 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 138 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) argument 141 if (!(atype = PKCS12_get_attr(bag, NID_friendlyNam [all...] |
H A D | p12_crt.c | 65 PKCS12_SAFEBAG *bag); 67 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 75 if (!X509at_add1_attr(&bag->attrib, attr)) 87 PKCS12_SAFEBAG *bag = NULL; local 124 bag = PKCS12_add_cert(&bags, cert); 125 if (name && !PKCS12_add_friendlyname(bag, name, -1)) 127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 146 if (!bag) 149 if (!copy_bag_attr(bag, pke 195 PKCS12_SAFEBAG *bag = NULL; local 238 PKCS12_SAFEBAG *bag = NULL; local [all...] |
H A D | p12_utl.c | 147 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) argument 149 if (M_PKCS12_bag_type(bag) != NID_certBag) 151 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) 153 return ASN1_item_unpack(bag->value.bag->value.octet, 157 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) argument 159 if (M_PKCS12_bag_type(bag) != NID_crlBag) 161 if (M_PKCS12_cert_bag_type(bag) != NID_x509Crl) 163 return ASN1_item_unpack(bag->value.bag [all...] |
H A D | p12_add.c | 69 PKCS12_BAGS *bag; local 71 if (!(bag = PKCS12_BAGS_new())) { 75 bag->type = OBJ_nid2obj(nid1); 76 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 84 safebag->value.bag = bag; 89 PKCS12_BAGS_free(bag); 97 PKCS12_SAFEBAG *bag; local 98 if (!(bag = PKCS12_SAFEBAG_new())) { 102 bag 114 PKCS12_SAFEBAG *bag; local 235 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
H A D | p12_npas.c | 72 static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass, 139 /* Repack bag in same form with new password */ 192 static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass, argument 199 if (M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) 202 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) 204 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen)) 211 X509_SIG_free(bag->value.shkeybag); 212 bag->value.shkeybag = p8new;
|
H A D | p12_kiss.c | 72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 231 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 240 if ((attrib = PKCS12_get_attr(bag, NID_friendlyName))) 243 if ((attrib = PKCS12_get_attr(bag, NID_localKeyID))) 246 switch (M_PKCS12_bag_type(bag)) { 250 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) 257 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 266 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) 268 if (!(x509 = PKCS12_certbag2x509(bag))) 296 return parse_bags(bag [all...] |
H A D | pkcs12.h | 117 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon4614::__anon4615 119 X509_SIG *shkeybag; /* shrouded key bag */ 137 ASN1_TYPE *other; /* Secret or other bag */ 161 # define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 164 # define PKCS12_get_attr(bag, attr_nid) \ 165 PKCS12_get_attr_gen(bag->attrib, attr_nid) 174 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 175 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 182 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, 202 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigne [all...] |
H A D | p12_asn.c | 104 ADB_ENTRY(NID_certBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 105 ADB_ENTRY(NID_crlBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 106 ADB_ENTRY(NID_secretBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0))
|
/freebsd-11-stable/contrib/libstdc++/include/ext/pb_ds/detail/pat_trie_/ |
H A D | split_fn_imps.hpp | 54 split_join_branch_bag bag; local 55 leaf_pointer p_split_lf = split_prep(r_key, other, bag); 58 _GLIBCXX_DEBUG_ASSERT(bag.empty()); 64 _GLIBCXX_DEBUG_ASSERT(!bag.empty()); 70 bag);
|
H A D | insert_join_fn_imps.hpp | 54 split_join_branch_bag bag; local 55 if (!join_prep(other, bag)) 63 other.m_p_head->m_p_parent, 0, bag); 403 split_join_branch_bag bag; local 404 bag.add_branch(); 405 m_p_head->m_p_parent = rec_join(m_p_head->m_p_parent, p_new_lf, 0, bag);
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | pkcs12.c | 826 int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, argument 834 switch (M_PKCS12_bag_type(bag)) { 837 BIO_printf(bio_err, "Key bag\n"); 840 print_attribs(out, bag->attrib, "Bag Attributes"); 841 p8 = bag->value.keybag; 852 alg_print(bio_err, bag->value.shkeybag->algor); 856 print_attribs(out, bag->attrib, "Bag Attributes"); 857 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 871 BIO_printf(bio_err, "Certificate bag\n"); 874 if (PKCS12_get_attr(bag, NID_localKeyI [all...] |
/freebsd-11-stable/stand/ |
H A D | defs.mk | 103 # For amd64, there's a bit of mixed bag. Some of the tree (i386, lib*32) is
|