/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/ |
H A D | p12_utl.c | 98 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) 100 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 104 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) 106 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 110 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) 112 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 115 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) 117 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), f [all...] |
H A D | p12_init.c | 63 /* Initialise a PKCS12 structure to take data */ 65 PKCS12 *PKCS12_init(int mode) 67 PKCS12 *pkcs12;
|
H A D | pkcs12.h | 109 } PKCS12; typedef in typeref:struct:__anon2249 198 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 199 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); 219 PKCS12 *PKCS12_init(int mode); 227 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 229 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 230 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 238 DECLARE_ASN1_FUNCTIONS(PKCS12) 247 int PKCS12_parse(PKCS12 *p1 [all...] |
H A D | p12_asn.c | 66 ASN1_SEQUENCE(PKCS12) = { variable 67 ASN1_SIMPLE(PKCS12, version, ASN1_INTEGER), 68 ASN1_SIMPLE(PKCS12, authsafes, PKCS7), 69 ASN1_OPT(PKCS12, mac, PKCS12_MAC_DATA) 70 } ASN1_SEQUENCE_END(PKCS12) 72 IMPLEMENT_ASN1_FUNCTIONS(PKCS12)
|
H A D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 105 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) 124 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
|
H A D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) 80 /* Check for NULL PKCS12 structure */ 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
|
H A D | p12_crt.c | 66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 70 PKCS12 *p12 = NULL; 330 PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) 332 PKCS12 *p12;
|
H A D | p12_add.c | 208 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) 216 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12)
|
H A D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 87 /* Check for NULL PKCS12 structure */ 144 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
|
/opensolaris-onvv-gate/usr/src/common/net/wanboot/ |
H A D | p12access.c | 58 static PKCS12 *p12_read_file(char *); 59 static int p12_doparse(PKCS12 *, char *, int, EVP_PKEY **, 62 static int check_password(PKCS12 *, char *); 196 PKCS12 *p12 = NULL; 251 PKCS12 *p12 = NULL; 308 PKCS12 *p12 = NULL; 354 static PKCS12 * 357 PKCS12 *p12 = NULL; 410 p12_doparse(PKCS12 *p12, char *passwd, int matchty, 474 check_password(PKCS12 *p1 [all...] |
H A D | p12aux.h | 161 int sunw_PKCS12_parse(PKCS12 *, const char *, int, char *, int, char *, 169 * return an encrypted PKCS12 structure containing them. 185 * != NULL - Address of PKCS12 structure. The user is responsible for 188 PKCS12 *sunw_PKCS12_create(const char *, STACK_OF(EVP_PKEY) *, STACK_OF(X509) *, 253 * a PKCS12 cert is pointless since it will be lost.
|
H A D | p12auxpars.c | 138 static int parse_pkcs12(PKCS12 *, const char *, int, char *, int, char *, 141 static int parse_outer(PKCS12 *, const char *, STACK_OF(EVP_PKEY) *, 150 static int sunw_PKCS12_contents(PKCS12 *p12, const char *pass, 154 * sunw_PKCS12_parse - Parse a PKCS12 structure and break it into its parts. 208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, 215 /* If NULL PKCS12 structure, this is an error */ 319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, 498 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, 549 * 1 - PKCS12 data object was parsed and lists of certs and private keys 553 parse_outer(PKCS12 *p1 [all...] |
H A D | p12auxutl.c | 83 * return an encrypted PKCS12 structure containing them. 99 * != NULL - Address of PKCS12 structure. The user is responsible for 102 PKCS12 * 113 PKCS12 *ret_p12 = NULL; 114 PKCS12 *p12 = NULL;
|
/opensolaris-onvv-gate/usr/src/common/openssl/apps/ |
H A D | CA.pl | 54 $PKCS12="$openssl pkcs12"; 123 system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
H A D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 103 PKCS12 *p12 = NULL; 281 BIO_printf (bio_err, "-export output PKCS12 file\n"); 670 int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
|
H A D | apps.c | 248 || (strcmp(s,"PKCS12") == 0) || (strcmp(s,"pkcs12") == 0) 707 PKCS12 *p12; 711 BIO_printf(err, "Error loading PKCS12 file for %s\n", desc); 733 "Mac verify error (wrong password?) in PKCS12 file for %s\n", desc);
|
/opensolaris-onvv-gate/usr/src/lib/libkmsagent/common/ |
H A D | KMSAgentPKICert.cpp | 186 PKCS12* pPKCS12Request = d2i_PKCS12_bio(pFileBio, NULL); 192 // convert PKCS12 to X509 233 PKCS12 *p12 = PKCS12_create(i_sPassphrase, 308 #endif /* PKCS12 */
|
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/ |
H A D | p12lib.h | 69 * PKCS12 file routines borrowed from SNT's libwanboot. 215 PKCS12 *sunw_PKCS12_create(const char *, STACK_OF(EVP_PKEY) *, 235 int sunw_PKCS12_contents(PKCS12 *, const char *,
|
H A D | keystore.c | 79 static boolean_t check_password(PKCS12 *, char *); 89 static boolean_t write_keystore_file(PKG_ERR *, char *, PKCS12 *); 91 static PKCS12 *read_keystore_file(PKG_ERR *, char *); 100 static boolean_t get_keystore_passwd(PKG_ERR *err, PKCS12 *p12, 1212 PKCS12 *p12; 1650 PKCS12 *p12 = NULL; 1830 * decrypt PKCS12 structure. 1834 * p12 - PKCS12 structure which returned password should 1837 * keystore - The keystore in which the PKCS12 structure 1845 get_keystore_passwd(PKG_ERR *err, PKCS12 *p1 [all...] |
H A D | p12lib.c | 80 * Our PKCS12 code plugs into this framework by calling 82 * of a function code and an error code) onto the stack our PKCS12 code 85 * Consumers of our PKCS12 code can then call the OpenSSL error routines 138 { SUNW_R_PKCS12_PARSE_ERR, "PKCS12 parse error" }, 139 { SUNW_R_PKCS12_CREATE_ERR, "PKCS12 create error" }, 141 { SUNW_R_PARSE_CERT_ERR, "error parsing PKCS12 certificate" }, 142 { SUNW_R_PARSE_BAG_ERR, "error parsing PKCS12 bag" }, 143 { SUNW_R_MAKE_BAG_ERR, "error making PKCS12 bag" }, 155 { SUNW_R_PKCS12_EMPTY_ERR, "empty PKCS12 structure" }, 178 static int parse_pkcs12(PKCS12 *, cons [all...] |
H A D | pkgweb.c | 1805 * Description: Writes out a PKCS12 file containing all trusted certs 1811 * SSL connection. They must be in a PKCS12, which is 1828 PKCS12 *p12 = NULL;
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/ |
H A D | p12split.c | 52 /* The following match/cert values require PKCS12 */ 320 * and key in order to write a PKCS12 file. 489 PKCS12 *p12; 531 PKCS12 *p12 = NULL;
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/ |
H A D | wanboot-cgi.c | 785 PKCS12 *p12 = NULL; 904 "(internal PKCS12 error while copying %s to %s)", 1065 PKCS12 *p12 = NULL; 1106 "(internal PKCS12 error reading %s)", path);
|
/opensolaris-onvv-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 611 PKCS12 *p12 = d2i_PKCS12_bio(bcert, NULL); 3320 PKCS12 *p12_elem = NULL; 3913 openssl_pkcs12_parse(PKCS12 *p12, char *pin, 3983 PKCS12 *pk12, *pk12_tmp;
|
/opensolaris-onvv-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 4849 PKCS12 *p12 = NULL; 4874 gettext("Failed to open PKCS12 file '%s': %s"), 4876 pkiDebug("Failed to open PKCS12 file '%s', error %d\n", 4885 gettext("Failed to decode PKCS12 file '%s' contents"), 4887 pkiDebug("Failed to decode PKCS12 file '%s' contents\n", 4940 gettext("Failed to parse PKCS12 file '%s' with password"),
|