Searched refs:PKCS12 (Results 1 - 25 of 25) sorted by relevance

/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/
H A Dp12_utl.c98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12)
100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12)
106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12)
112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12);
115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12)
117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), f
[all...]
H A Dp12_init.c63 /* Initialise a PKCS12 structure to take data */
65 PKCS12 *PKCS12_init(int mode)
67 PKCS12 *pkcs12;
H A Dpkcs12.h109 } PKCS12; typedef in typeref:struct:__anon2249
198 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes);
199 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12);
219 PKCS12 *PKCS12_init(int mode);
227 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
229 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
230 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
238 DECLARE_ASN1_FUNCTIONS(PKCS12)
247 int PKCS12_parse(PKCS12 *p1
[all...]
H A Dp12_asn.c66 ASN1_SEQUENCE(PKCS12) = { variable
67 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER),
68 ASN1_SIMPLE(PKCS12, authsafes, PKCS7),
69 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA)
70 } ASN1_SEQUENCE_END(PKCS12)
72 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
H A Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
105 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
124 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
H A Dp12_npas.c68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass)
80 /* Check for NULL PKCS12 structure */
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
H A Dp12_crt.c66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
70 PKCS12 *p12 = NULL;
330 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7)
332 PKCS12 *p12;
H A Dp12_add.c208 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes)
216 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
H A Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
87 /* Check for NULL PKCS12 structure */
144 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
/opensolaris-onvv-gate/usr/src/common/net/wanboot/
H A Dp12access.c58 static PKCS12 *p12_read_file(char *);
59 static int p12_doparse(PKCS12 *, char *, int, EVP_PKEY **,
62 static int check_password(PKCS12 *, char *);
196 PKCS12 *p12 = NULL;
251 PKCS12 *p12 = NULL;
308 PKCS12 *p12 = NULL;
354 static PKCS12 *
357 PKCS12 *p12 = NULL;
410 p12_doparse(PKCS12 *p12, char *passwd, int matchty,
474 check_password(PKCS12 *p1
[all...]
H A Dp12aux.h161 int sunw_PKCS12_parse(PKCS12 *, const char *, int, char *, int, char *,
169 * return an encrypted PKCS12 structure containing them.
185 * != NULL - Address of PKCS12 structure. The user is responsible for
188 PKCS12 *sunw_PKCS12_create(const char *, STACK_OF(EVP_PKEY) *, STACK_OF(X509) *,
253 * a PKCS12 cert is pointless since it will be lost.
H A Dp12auxpars.c138 static int parse_pkcs12(PKCS12 *, const char *, int, char *, int, char *,
141 static int parse_outer(PKCS12 *, const char *, STACK_OF(EVP_PKEY) *,
150 static int sunw_PKCS12_contents(PKCS12 *p12, const char *pass,
154 * sunw_PKCS12_parse - Parse a PKCS12 structure and break it into its parts.
208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid,
215 /* If NULL PKCS12 structure, this is an error */
319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid,
498 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey,
549 * 1 - PKCS12 data object was parsed and lists of certs and private keys
553 parse_outer(PKCS12 *p1
[all...]
H A Dp12auxutl.c83 * return an encrypted PKCS12 structure containing them.
99 * != NULL - Address of PKCS12 structure. The user is responsible for
102 PKCS12 *
113 PKCS12 *ret_p12 = NULL;
114 PKCS12 *p12 = NULL;
/opensolaris-onvv-gate/usr/src/common/openssl/apps/
H A DCA.pl54 $PKCS12="$openssl pkcs12";
123 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
H A Dpkcs12.c83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
103 PKCS12 *p12 = NULL;
281 BIO_printf (bio_err, "-export output PKCS12 file\n");
670 int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
H A Dapps.c248 || (strcmp(s,"PKCS12") == 0) || (strcmp(s,"pkcs12") == 0)
707 PKCS12 *p12;
711 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc);
733 "Mac verify error (wrong password?) in PKCS12 file for %s\n", desc);
/opensolaris-onvv-gate/usr/src/lib/libkmsagent/common/
H A DKMSAgentPKICert.cpp186 PKCS12* pPKCS12Request = d2i_PKCS12_bio(pFileBio, NULL);
192 // convert PKCS12 to X509
233 PKCS12 *p12 = PKCS12_create(i_sPassphrase,
308 #endif /* PKCS12 */
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/
H A Dp12lib.h69 * PKCS12 file routines borrowed from SNT's libwanboot.
215 PKCS12 *sunw_PKCS12_create(const char *, STACK_OF(EVP_PKEY) *,
235 int sunw_PKCS12_contents(PKCS12 *, const char *,
H A Dkeystore.c79 static boolean_t check_password(PKCS12 *, char *);
89 static boolean_t write_keystore_file(PKG_ERR *, char *, PKCS12 *);
91 static PKCS12 *read_keystore_file(PKG_ERR *, char *);
100 static boolean_t get_keystore_passwd(PKG_ERR *err, PKCS12 *p12,
1212 PKCS12 *p12;
1650 PKCS12 *p12 = NULL;
1830 * decrypt PKCS12 structure.
1834 * p12 - PKCS12 structure which returned password should
1837 * keystore - The keystore in which the PKCS12 structure
1845 get_keystore_passwd(PKG_ERR *err, PKCS12 *p1
[all...]
H A Dp12lib.c80 * Our PKCS12 code plugs into this framework by calling
82 * of a function code and an error code) onto the stack our PKCS12 code
85 * Consumers of our PKCS12 code can then call the OpenSSL error routines
138 { SUNW_R_PKCS12_PARSE_ERR, "PKCS12 parse error" },
139 { SUNW_R_PKCS12_CREATE_ERR, "PKCS12 create error" },
141 { SUNW_R_PARSE_CERT_ERR, "error parsing PKCS12 certificate" },
142 { SUNW_R_PARSE_BAG_ERR, "error parsing PKCS12 bag" },
143 { SUNW_R_MAKE_BAG_ERR, "error making PKCS12 bag" },
155 { SUNW_R_PKCS12_EMPTY_ERR, "empty PKCS12 structure" },
178 static int parse_pkcs12(PKCS12 *, cons
[all...]
H A Dpkgweb.c1805 * Description: Writes out a PKCS12 file containing all trusted certs
1811 * SSL connection. They must be in a PKCS12, which is
1828 PKCS12 *p12 = NULL;
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/
H A Dp12split.c52 /* The following match/cert values require PKCS12 */
320 * and key in order to write a PKCS12 file.
489 PKCS12 *p12;
531 PKCS12 *p12 = NULL;
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c785 PKCS12 *p12 = NULL;
904 "(internal PKCS12 error while copying %s to %s)",
1065 PKCS12 *p12 = NULL;
1106 "(internal PKCS12 error reading %s)", path);
/opensolaris-onvv-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c611 PKCS12 *p12 = d2i_PKCS12_bio(bcert, NULL);
3320 PKCS12 *p12_elem = NULL;
3913 openssl_pkcs12_parse(PKCS12 *p12, char *pin,
3983 PKCS12 *pk12, *pk12_tmp;
/opensolaris-onvv-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c4849 PKCS12 *p12 = NULL;
4874 gettext("Failed to open PKCS12 file '%s': %s"),
4876 pkiDebug("Failed to open PKCS12 file '%s', error %d\n",
4885 gettext("Failed to decode PKCS12 file '%s' contents"),
4887 pkiDebug("Failed to decode PKCS12 file '%s' contents\n",
4940 gettext("Failed to parse PKCS12 file '%s' with password"),

Completed in 142 milliseconds