/freebsd-9.3-release/contrib/ncurses/misc/ |
H A D | terminfo.src | 14445 # p12 - Prism-12 in ANSI mode. 14446 # p12-w - 132 column version of p12. 14447 # p12-m - Prism-12 in MDC emulation mode. 14448 # p12-m-w - As p12-m, but with 132 columns. 14619 # p12: Prism-12 in ANSI mode 14624 prism12|p12|P12|MDC Prism-12 in ANSI mode, 14627 # p12-w: Prism-12 in 132 column mode 14630 # 'Wide' version of p12 [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 1616 static int tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, argument 1628 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1631 PKCS12_free(p12); 1681 PKCS12_free(p12); 1696 PKCS12 *p12; local 1702 p12 = d2i_PKCS12_fp(f, NULL); 1705 if (p12 == NULL) { 1711 return tls_parse_pkcs12(ssl_ctx, ssl, p12, passwd); 1715 "p12/pfx files"); 1725 PKCS12 *p12; local [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/data/ |
H A D | gen-req.sh | 116 -out test.p12 \ 126 -out sub-cert.p12 \ 139 -out test-nopw.p12 \
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ks_p12.c | 325 struct ks_pkcs12 *p12; local 342 p12 = calloc(1, sizeof(*p12)); 343 if (p12 == NULL) { 349 p12->fn = strdup(residue); 350 if (p12->fn == NULL) { 358 0, lock, &p12->certs); 360 *data = p12; 427 ret = _hx509_collector_collect_certs(context, c, &p12->certs); 429 *data = p12; 564 struct ks_pkcs12 *p12 = data; local 642 struct ks_pkcs12 *p12 = data; local 652 struct ks_pkcs12 *p12 = data; local 662 struct ks_pkcs12 *p12 = data; local 673 struct ks_pkcs12 *p12 = data; local 683 struct ks_pkcs12 *p12 = data; local [all...] |
H A D | test_cms.in | 156 echo "create signed data (p12)" 159 --certificate=PKCS12:$srcdir/data/test.p12 \
|
H A D | test_nist_pkcs12.in | 64 for a in $nistdir/pkcs12/*.p12 ; do
|
H A D | test_query.in | 47 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 52 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 58 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 64 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1 69 PKCS12:$srcdir/data/test-nopw.p12 >/dev/null 2>/dev/null || exit 1 75 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null || exit 1 81 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1 88 PKCS12:$srcdir/data/test.p12 > /dev/null || exit 1 95 PKCS12:$srcdir/data/test.p12 >/dev/null 2>/dev/null && exit 1
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | CA.sh | 151 -out newcert.p12 -export -name "$CNAME"
|
H A D | apps.c | 263 || (strcmp(s, "P12") == 0) || (strcmp(s, "p12") == 0)) 709 PKCS12 *p12; local 710 p12 = d2i_PKCS12_bio(in, NULL); 711 if (p12 == NULL) { 716 if (PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0)) 728 if (!PKCS12_verify_mac(p12, tpass, len)) { 736 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 738 if (p12) 739 PKCS12_free(p12); [all...] |
H A D | pkcs12.c | 89 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, 114 PKCS12 *p12 = NULL; local 663 p12 = PKCS12_create(cpass, name, key, ucert, certs, 666 if (!p12) { 672 PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, NULL); 679 i2d_PKCS12_bio(out, p12); 704 if (!(p12 = d2i_PKCS12_bio(in, NULL))) { 724 if ((options & INFO) && p12->mac) 726 p12->mac->iter ? ASN1_INTEGER_get(p12 778 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 212 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) argument 215 &p12->authsafes->d.data)) 220 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12) 222 if (!PKCS7_type_is_data(p12->authsafes)) { 227 return ASN1_item_unpack(p12->authsafes->d.data,
|
H A D | p12_crt.c | 87 PKCS12 *p12 = NULL; local 169 p12 = PKCS12_add_safes(safes, 0); 171 if (!p12) 179 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 182 return p12; 186 if (p12) 187 PKCS12_free(p12); 346 PKCS12 *p12; local 349 p12 = PKCS12_init(nid_p7); 351 if (!p12) [all...] |
H A D | p12_kiss.c | 66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 85 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 91 if (!p12) { 120 if (PKCS12_verify_mac(p12, NULL, 0)) 122 else if (PKCS12_verify_mac(p12, "", 0)) 128 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 133 if (!parse_pk12(p12, pass, -1, pkey, cert, ca)) { 154 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument 164 if (!(asafes = PKCS12_unpack_authsafes(p12)))
|
H A D | p12_mutl.c | 68 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 76 if (!PKCS7_type_is_data(p12->authsafes)) { 81 salt = p12->mac->salt->data; 82 saltlen = p12->mac->salt->length; 83 if (!p12->mac->iter) 86 iter = ASN1_INTEGER_get(p12->mac->iter); 87 if (!(md_type = EVP_get_digestbyobj(p12->mac->dinfo->algor->algorithm))) { 98 HMAC_Update(&hmac, p12->authsafes->d.data->data, 99 p12->authsafes->d.data->length); 106 int PKCS12_verify_mac(PKCS12 *p12, cons argument 126 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument 151 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) argument [all...] |
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 83 if (!p12) { 91 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 96 if (!newpass_p12(p12, oldpass, newpass)) { 106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 116 if (!(asafes = PKCS12_unpack_authsafes(p12))) 160 p12_data_tmp = p12->authsafes->d.data; 161 if (!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) 163 if (!PKCS12_pack_authsafes(p12, newsafe [all...] |
H A D | p12_utl.c | 113 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) argument 115 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 119 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) argument 121 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); 125 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) argument 127 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); 131 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) argument 133 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12);
|
H A D | pkcs12.h | 170 # define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) 199 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 200 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); variable 234 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 236 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 237 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 261 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 275 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-ia64.pl | 175 cmp.eq p12,p0=4,r8 } 240 (p12) br.cond.dpnt.many .L4byte };;
|
/freebsd-9.3-release/crypto/openssl/demos/pkcs12/ |
H A D | pkread.c | 17 PKCS12 *p12; local 29 p12 = d2i_PKCS12_fp(fp, NULL); 31 if (!p12) { 36 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { 41 PKCS12_free(p12);
|
H A D | pkwrite.c | 16 PKCS12 *p12; local 31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); 32 if (!p12) { 42 i2d_PKCS12_fp(fp, p12); 43 PKCS12_free(p12);
|
/freebsd-9.3-release/crypto/openssl/engines/ |
H A D | e_sureware.c | 467 SureWareHook_Dsa_Sign_t *p12 = NULL; local 509 || !(p12 = 534 p_surewarehk_Dsa_Sign = p12;
|
H A D | e_ubsec.c | 401 t_UBSEC_rng_ioctl *p12; local 446 || !(p12 = (t_UBSEC_rng_ioctl *) 472 p_UBSEC_rng_ioctl = p12;
|
/freebsd-9.3-release/sys/ia64/ia64/ |
H A D | exception.S | 124 * p12 interrupted from kernel backing store 234 cmp.le p12,p13=IA64_VM_MINKERN_REGION,r24 1024 cmp.eq p12,p13=7,r27 1029 (p12) dep r28=0,r30,61,3 1034 (p12) add r28=PTE_PRESENT+PTE_ACCESSED+PTE_DIRTY+PTE_PL_KERN+PTE_AR_RWX+PTE_MA_WB,r28 1041 (p12) br.cond.spnt.few 1f 1089 cmp.eq p12,p0=r29,r26 1095 (p12) br.cond.sptk.few exception_save_restart
|
/freebsd-9.3-release/usr.sbin/pc-sysinstall/backend/ |
H A D | functions-disk.sh | 522 p1|p2|p3|p4|p5|p6|p7|p8|p9|p10|p11|p12|p13|p14|p15|p16|p17|p18|p19|p20)
|