Searched refs:PKCS12 (Results 1 - 20 of 20) sorted by relevance

/freebsd-11.0-release/crypto/openssl/crypto/pkcs12/
H A Dp12_utl.c111 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12)
113 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
117 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12)
119 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
123 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12)
125 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
129 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12)
131 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), f
[all...]
H A Dp12_init.c64 /* Initialise a PKCS12 structure to take data */
66 PKCS12 *PKCS12_init(int mode)
68 PKCS12 *pkcs12;
H A Dpkcs12.h112 } PKCS12; typedef in typeref:struct:__anon6416
199 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
200 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
224 PKCS12 *PKCS12_init(int mode);
234 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
236 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
237 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
246 DECLARE_ASN1_FUNCTIONS(PKCS12)
255 int PKCS12_parse(PKCS12 *p1
[all...]
H A Dp12_asn.c67 ASN1_SEQUENCE(PKCS12) = { variable
68 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER),
69 ASN1_SIMPLE(PKCS12, authsafes, PKCS7),
70 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA)
71 } ASN1_SEQUENCE_END(PKCS12)
73 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
H A Dp12_mutl.c69 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
114 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
134 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
159 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
H A Dp12_npas.c69 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
80 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass)
82 /* Check for NULL PKCS12 structure */
107 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
84 PKCS12 *p12 = NULL;
341 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7)
343 PKCS12 *p12;
H A Dp12_kiss.c66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
87 /* Check for NULL PKCS12 structure */
180 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
H A Dp12_add.c241 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes)
249 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
/freebsd-11.0-release/crypto/heimdal/lib/hx509/
H A Dtest_query.in48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1
92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1
98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1
105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1
112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
H A Dtest_nist_pkcs12.in66 if ${hxtool} validate $pass PKCS12:$a > /dev/null; then
H A Dtest_crypto.in178 echo "copy keystore FILE -> PKCS12"
181 PKCS12:out2.pem || exit 1
H A Dtest_cms.in216 --certificate=PKCS12:$srcdir/data/test.p12 \
/freebsd-11.0-release/crypto/openssl/apps/
H A DCA.pl54 $PKCS12="$openssl pkcs12";
127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
H A DCA.pl.in54 $PKCS12="$openssl pkcs12";
127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
H A DCA.sh69 PKCS12="openssl pkcs12"
150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
H A Dpkcs12.c84 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
110 PKCS12 *p12 = NULL;
332 BIO_printf(bio_err, "-export output PKCS12 file\n");
768 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass,
H A Dapps.c281 || (strcmp(s, "PKCS12") == 0) || (strcmp(s, "pkcs12") == 0)
756 PKCS12 *p12;
759 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc);
777 "Mac verify error (wrong password?) in PKCS12 file for %s\n",
/freebsd-11.0-release/contrib/serf/buckets/
H A Dssl_buckets.c1143 PKCS12 *p12;
1160 /* Load the x.509 cert file stored in PKCS12 */
/freebsd-11.0-release/contrib/wpa/src/crypto/
H A Dtls_openssl.c2182 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12,
2198 "Failed to parse PKCS12 file");
2202 wpa_printf(MSG_DEBUG, "TLS: Successfully parsed PKCS12 data");
2207 wpa_printf(MSG_DEBUG, "TLS: Got certificate from PKCS12: "
2220 wpa_printf(MSG_DEBUG, "TLS: Got private key from PKCS12");
2238 " from PKCS12: subject='%s'", buf);
2275 " from PKCS12: subject='%s'", buf);
2305 PKCS12 *p12;
2323 wpa_printf(MSG_INFO, "TLS: PKCS12 support disabled - cannot read "
2334 PKCS12 *p1
[all...]

Completed in 137 milliseconds