Searched refs:p12 (Results 1 - 25 of 26) sorted by relevance

12

/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_mutl.c69 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
78 if (!PKCS7_type_is_data(p12->authsafes)) {
83 salt = p12->mac->salt->data;
84 saltlen = p12->mac->salt->length;
85 if (!p12->mac->iter)
88 iter = ASN1_INTEGER_get(p12->mac->iter);
89 if (!(md_type = EVP_get_digestbyobj(p12->mac->dinfo->algor->algorithm))) {
103 || !HMAC_Update(&hmac, p12->authsafes->d.data->data,
104 p12->authsafes->d.data->length)
114 int PKCS12_verify_mac(PKCS12 *p12, cons argument
134 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
159 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) argument
[all...]
H A Dp12_npas.c69 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
80 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) argument
84 if (!p12) {
92 if (!PKCS12_verify_mac(p12, oldpass, -1)) {
97 if (!newpass_p12(p12, oldpass, newpass)) {
107 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) argument
118 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
153 p12_data_tmp = p12->authsafes->d.data;
154 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL)
156 if (!PKCS12_pack_authsafes(p12, newsafe
[all...]
H A Dp12_utl.c111 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) argument
113 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
117 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) argument
119 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
123 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) argument
125 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
129 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) argument
131 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
H A Dp12_crt.c84 PKCS12 *p12 = NULL; local
166 p12 = PKCS12_add_safes(safes, 0);
168 if (!p12)
176 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
179 return p12;
183 if (p12)
184 PKCS12_free(p12);
343 PKCS12 *p12; local
346 p12 = PKCS12_init(nid_p7);
348 if (!p12)
[all...]
H A Dpkcs12.h170 # define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
199 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
200 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable
234 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
236 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
237 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
255 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
269 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12);
[all...]
H A Dp12_kiss.c66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
95 if (!p12) {
111 if (PKCS12_verify_mac(p12, NULL, 0))
113 else if (PKCS12_verify_mac(p12, "", 0))
119 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
132 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) {
185 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument
193 if (!(asafes = PKCS12_unpack_authsafes(p12)))
H A Dp12_add.c241 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) argument
244 &p12->authsafes->d.data))
249 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
251 if (!PKCS7_type_is_data(p12->authsafes)) {
256 return ASN1_item_unpack(p12->authsafes->d.data,
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dks_p12.c326 struct ks_pkcs12 *p12; local
344 p12 = calloc(1, sizeof(*p12));
345 if (p12 == NULL) {
351 p12->fn = strdup(residue);
352 if (p12->fn == NULL) {
360 0, lock, &p12->certs);
362 *data = p12;
429 ret = _hx509_collector_collect_certs(context, c, &p12->certs);
431 *data = p12;
567 struct ks_pkcs12 *p12 = data; local
645 struct ks_pkcs12 *p12 = data; local
655 struct ks_pkcs12 *p12 = data; local
665 struct ks_pkcs12 *p12 = data; local
676 struct ks_pkcs12 *p12 = data; local
686 struct ks_pkcs12 *p12 = data; local
[all...]
H A Dtest_query.in48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1
92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1
105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1
112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
H A Dtest_nist_pkcs12.in64 for a in $nistdir/pkcs12/*.p12 ; do
H A DMakefile.am407 data/sub-cert.p12 \
419 data/test-nopw.p12 \
430 data/test.p12 \
H A Dtest_cms.in213 echo "create signed data (p12)"
216 --certificate=PKCS12:$srcdir/data/test.p12 \
/freebsd-11-stable/contrib/netbsd-tests/ipf/
H A Dt_pools.sh78 test_case p12 ptest text text
98 atf_add_test_case p12
/freebsd-11-stable/crypto/openssl/apps/
H A Dpkcs12.c84 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
110 PKCS12 *p12 = NULL; local
645 p12 = PKCS12_create(cpass, name, key, ucert, certs,
648 if (!p12) {
661 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd);
668 i2d_PKCS12_bio(out, p12);
693 if (!(p12 = d2i_PKCS12_bio(in, NULL))) {
713 if ((options & INFO) && p12->mac)
715 p12->mac->iter ? ASN1_INTEGER_get(p12
768 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument
[all...]
H A DCA.sh151 -out newcert.p12 -export -name "$CNAME"
H A Dapps.c286 || (strcmp(s, "P12") == 0) || (strcmp(s, "p12") == 0))
760 PKCS12 *p12; local
761 p12 = d2i_PKCS12_bio(in, NULL);
762 if (p12 == NULL) {
767 if (PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0))
779 if (!PKCS12_verify_mac(p12, tpass, len)) {
787 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
789 if (p12)
790 PKCS12_free(p12);
[all...]
/freebsd-11-stable/contrib/serf/buckets/
H A Dssl_buckets.c1223 PKCS12 *p12; local
1253 p12 = d2i_PKCS12_bio(bio, NULL);
1256 i = PKCS12_parse(p12, NULL, pkey, cert, NULL);
1259 PKCS12_free(p12);
1293 i = PKCS12_parse(p12, password, pkey, cert, NULL);
1295 PKCS12_free(p12);
1323 PKCS12_free(p12);
1331 PKCS12_free(p12);
/freebsd-11-stable/crypto/openssl/engines/
H A De_sureware.c467 SureWareHook_Dsa_Sign_t *p12 = NULL; local
509 || !(p12 =
534 p_surewarehk_Dsa_Sign = p12;
H A De_ubsec.c401 t_UBSEC_rng_ioctl *p12; local
446 || !(p12 = (t_UBSEC_rng_ioctl *)
472 p_UBSEC_rng_ioctl = p12;
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls_openssl.c3308 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, argument
3322 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
3325 PKCS12_free(p12);
3429 PKCS12_free(p12);
3444 PKCS12 *p12; local
3450 p12 = d2i_PKCS12_fp(f, NULL);
3453 if (p12 == NULL) {
3459 return tls_parse_pkcs12(data, ssl, p12, passwd);
3463 "p12/pfx files");
3473 PKCS12 *p12; local
[all...]
/freebsd-11-stable/usr.sbin/pc-sysinstall/backend/
H A Dfunctions-disk.sh524 p1|p2|p3|p4|p5|p6|p7|p8|p9|p10|p11|p12|p13|p14|p15|p16|p17|p18|p19|p20)
/freebsd-11-stable/crypto/openssl/crypto/bn/asm/
H A Dia64-mont.pl436 cmp4.le p12,p13=7,in5 }
470 { .mfi; (p12)ldf8 ai6=[aptr],16 // ap[6]
476 { .mfi; (p12)ldf8 bj[1]=[bptr],16 // bp[6]
482 { .mfi; (p12)ldf8 ni6=[nptr],16 // np[6]
/freebsd-11-stable/crypto/openssl/crypto/sha/asm/
H A Dsha512-ia64.pl178 cmp.eq p12,p0=4,r8 }
219 (p12) br.cond.dpnt.many .L4byte };;
/freebsd-11-stable/crypto/openssl/crypto/md5/asm/
H A Dmd5-ia64.S86 #define pPad2 p12
/freebsd-11-stable/sys/contrib/alpine-hal/eth/
H A Dal_hal_eth_ec_regs.h149 uint32_t p12; member in struct:al_ec_epe_res
1409 /**** p12 register ****/

Completed in 175 milliseconds

12