/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 69 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 78 if (!PKCS7_type_is_data(p12->authsafes)) { 83 salt = p12->mac->salt->data; 84 saltlen = p12->mac->salt->length; 85 if (!p12->mac->iter) 88 iter = ASN1_INTEGER_get(p12->mac->iter); 89 if (!(md_type = EVP_get_digestbyobj(p12->mac->dinfo->algor->algorithm))) { 103 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, 104 p12->authsafes->d.data->length) 114 int PKCS12_verify_mac(PKCS12 *p12, cons argument 134 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument 159 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) argument [all...] |
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 80 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) argument 84 if (!p12) { 92 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 97 if (!newpass_p12(p12, oldpass, newpass)) { 107 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) argument 118 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) 153 p12_data_tmp = p12->authsafes->d.data; 154 if ((p12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) 156 if (!PKCS12_pack_authsafes(p12, newsafe [all...] |
H A D | p12_utl.c | 111 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) argument 113 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 117 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) argument 119 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 123 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) argument 125 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 129 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) argument 131 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
|
H A D | p12_crt.c | 84 PKCS12 *p12 = NULL; local 166 p12 = PKCS12_add_safes(safes, 0); 168 if (!p12) 176 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 179 return p12; 183 if (p12) 184 PKCS12_free(p12); 343 PKCS12 *p12; local 346 p12 = PKCS12_init(nid_p7); 348 if (!p12) [all...] |
H A D | pkcs12.h | 170 # define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) 199 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 200 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable 234 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 236 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 237 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 255 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 269 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); [all...] |
H A D | p12_kiss.c | 66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 95 if (!p12) { 111 if (PKCS12_verify_mac(p12, NULL, 0)) 113 else if (PKCS12_verify_mac(p12, "", 0)) 119 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 132 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { 185 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument 193 if (!(asafes = PKCS12_unpack_authsafes(p12)))
|
H A D | p12_add.c | 241 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) argument 244 &p12->authsafes->d.data)) 249 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) 251 if (!PKCS7_type_is_data(p12->authsafes)) { 256 return ASN1_item_unpack(p12->authsafes->d.data,
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_p12.c | 326 struct ks_pkcs12 *p12; local 344 p12 = calloc(1, sizeof(*p12)); 345 if (p12 == NULL) { 351 p12->fn = strdup(residue); 352 if (p12->fn == NULL) { 360 0, lock, &p12->certs); 362 *data = p12; 429 ret = _hx509_collector_collect_certs(context, c, &p12->certs); 431 *data = p12; 567 struct ks_pkcs12 *p12 = data; local 645 struct ks_pkcs12 *p12 = data; local 655 struct ks_pkcs12 *p12 = data; local 665 struct ks_pkcs12 *p12 = data; local 676 struct ks_pkcs12 *p12 = data; local 686 struct ks_pkcs12 *p12 = data; local [all...] |
H A D | test_query.in | 48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1 86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1 92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1 105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1 112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
|
H A D | test_nist_pkcs12.in | 64 for a in $nistdir/pkcs12/*.p12 ; do
|
H A D | Makefile.am | 407 data/sub-cert.p12 \ 419 data/test-nopw.p12 \ 430 data/test.p12 \
|
H A D | test_cms.in | 213 echo "create signed data (p12)" 216 --certificate=PKCS12:$srcdir/data/test.p12 \
|
/freebsd-11-stable/contrib/netbsd-tests/ipf/ |
H A D | t_pools.sh | 78 test_case p12 ptest text text 98 atf_add_test_case p12
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | pkcs12.c | 84 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, 110 PKCS12 *p12 = NULL; local 645 p12 = PKCS12_create(cpass, name, key, ucert, certs, 648 if (!p12) { 661 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd); 668 i2d_PKCS12_bio(out, p12); 693 if (!(p12 = d2i_PKCS12_bio(in, NULL))) { 713 if ((options & INFO) && p12->mac) 715 p12->mac->iter ? ASN1_INTEGER_get(p12 768 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument [all...] |
H A D | CA.sh | 151 -out newcert.p12 -export -name "$CNAME"
|
H A D | apps.c | 286 || (strcmp(s, "P12") == 0) || (strcmp(s, "p12") == 0)) 760 PKCS12 *p12; local 761 p12 = d2i_PKCS12_bio(in, NULL); 762 if (p12 == NULL) { 767 if (PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0)) 779 if (!PKCS12_verify_mac(p12, tpass, len)) { 787 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 789 if (p12) 790 PKCS12_free(p12); [all...] |
/freebsd-11-stable/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 1223 PKCS12 *p12; local 1253 p12 = d2i_PKCS12_bio(bio, NULL); 1256 i = PKCS12_parse(p12, NULL, pkey, cert, NULL); 1259 PKCS12_free(p12); 1293 i = PKCS12_parse(p12, password, pkey, cert, NULL); 1295 PKCS12_free(p12); 1323 PKCS12_free(p12); 1331 PKCS12_free(p12);
|
/freebsd-11-stable/crypto/openssl/engines/ |
H A D | e_sureware.c | 467 SureWareHook_Dsa_Sign_t *p12 = NULL; local 509 || !(p12 = 534 p_surewarehk_Dsa_Sign = p12;
|
H A D | e_ubsec.c | 401 t_UBSEC_rng_ioctl *p12; local 446 || !(p12 = (t_UBSEC_rng_ioctl *) 472 p_UBSEC_rng_ioctl = p12;
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 3308 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, argument 3322 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 3325 PKCS12_free(p12); 3429 PKCS12_free(p12); 3444 PKCS12 *p12; local 3450 p12 = d2i_PKCS12_fp(f, NULL); 3453 if (p12 == NULL) { 3459 return tls_parse_pkcs12(data, ssl, p12, passwd); 3463 "p12/pfx files"); 3473 PKCS12 *p12; local [all...] |
/freebsd-11-stable/usr.sbin/pc-sysinstall/backend/ |
H A D | functions-disk.sh | 524 p1|p2|p3|p4|p5|p6|p7|p8|p9|p10|p11|p12|p13|p14|p15|p16|p17|p18|p19|p20)
|
/freebsd-11-stable/crypto/openssl/crypto/bn/asm/ |
H A D | ia64-mont.pl | 436 cmp4.le p12,p13=7,in5 } 470 { .mfi; (p12)ldf8 ai6=[aptr],16 // ap[6] 476 { .mfi; (p12)ldf8 bj[1]=[bptr],16 // bp[6] 482 { .mfi; (p12)ldf8 ni6=[nptr],16 // np[6]
|
/freebsd-11-stable/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-ia64.pl | 178 cmp.eq p12,p0=4,r8 } 219 (p12) br.cond.dpnt.many .L4byte };;
|
/freebsd-11-stable/crypto/openssl/crypto/md5/asm/ |
H A D | md5-ia64.S | 86 #define pPad2 p12
|
/freebsd-11-stable/sys/contrib/alpine-hal/eth/ |
H A D | al_hal_eth_ec_regs.h | 149 uint32_t p12; member in struct:al_ec_epe_res 1409 /**** p12 register ****/
|