/freebsd-11.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_utl.c | 111 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) 113 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 117 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) 119 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 123 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) 125 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 129 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) 131 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), f [all...] |
H A D | p12_init.c | 64 /* Initialise a PKCS12 structure to take data */ 66 PKCS12 *PKCS12_init(int mode) 68 PKCS12 *pkcs12;
|
H A D | pkcs12.h | 112 } PKCS12; typedef in typeref:struct:__anon6416 199 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 200 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 224 PKCS12 *PKCS12_init(int mode); 234 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 236 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 237 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 246 DECLARE_ASN1_FUNCTIONS(PKCS12) 255 int PKCS12_parse(PKCS12 *p1 [all...] |
H A D | p12_asn.c | 67 ASN1_SEQUENCE(PKCS12) = { variable 68 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER), 69 ASN1_SIMPLE(PKCS12, authsafes, PKCS7), 70 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA) 71 } ASN1_SEQUENCE_END(PKCS12) 73 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
|
H A D | p12_mutl.c | 69 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 114 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) 134 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 159 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
|
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 80 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) 82 /* Check for NULL PKCS12 structure */ 107 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
|
H A D | p12_crt.c | 80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 84 PKCS12 *p12 = NULL; 341 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) 343 PKCS12 *p12;
|
H A D | p12_kiss.c | 66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 87 /* Check for NULL PKCS12 structure */ 180 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
|
H A D | p12_add.c | 241 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) 249 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
|
/freebsd-11.0-release/crypto/heimdal/lib/hx509/ |
H A D | test_query.in | 48 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 59 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 65 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 71 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1 86 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1 92 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1 105 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1 112 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
|
H A D | test_nist_pkcs12.in | 66 if ${hxtool} validate $pass PKCS12:$a > /dev/null; then
|
H A D | test_crypto.in | 178 echo "copy keystore FILE -> PKCS12" 181 PKCS12:out2.pem || exit 1
|
H A D | test_cms.in | 216 --certificate=PKCS12:$srcdir/data/test.p12 \
|
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | CA.pl | 54 $PKCS12="$openssl pkcs12"; 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
H A D | CA.pl.in | 54 $PKCS12="$openssl pkcs12"; 127 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
H A D | CA.sh | 69 PKCS12="openssl pkcs12" 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
H A D | pkcs12.c | 84 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, 110 PKCS12 *p12 = NULL; 332 BIO_printf(bio_err, "-export output PKCS12 file\n"); 768 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass,
|
H A D | apps.c | 281 || (strcmp(s, "PKCS12") == 0) || (strcmp(s, "pkcs12") == 0) 756 PKCS12 *p12; 759 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc); 777 "Mac verify error (wrong password?) in PKCS12 file for %s\n",
|
/freebsd-11.0-release/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 1143 PKCS12 *p12; 1160 /* Load the x.509 cert file stored in PKCS12 */
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 2182 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, 2198 "Failed to parse PKCS12 file"); 2202 wpa_printf(MSG_DEBUG, "TLS: Successfully parsed PKCS12 data"); 2207 wpa_printf(MSG_DEBUG, "TLS: Got certificate from PKCS12: " 2220 wpa_printf(MSG_DEBUG, "TLS: Got private key from PKCS12"); 2238 " from PKCS12: subject='%s'", buf); 2275 " from PKCS12: subject='%s'", buf); 2305 PKCS12 *p12; 2323 wpa_printf(MSG_INFO, "TLS: PKCS12 support disabled - cannot read " 2334 PKCS12 *p1 [all...] |