/dragonfly/crypto/libressl/crypto/pkcs12/ |
H A D | p12_mutl.c | 79 return p12->mac != NULL; in PKCS12_mac_present() 85 const PKCS12 *p12) in PKCS12_get0_mac() argument 87 if (p12->mac == NULL) { in PKCS12_get0_mac() 100 *pmac = p12->mac->dinfo->digest; in PKCS12_get0_mac() 104 *psalt = p12->mac->salt; in PKCS12_get0_mac() 106 *piter = p12->mac->iter; in PKCS12_get0_mac() 126 salt = p12->mac->salt->data; in PKCS12_gen_mac() 127 saltlen = p12->mac->salt->length; in PKCS12_gen_mac() 130 if (p12->mac->iter != NULL) { in PKCS12_gen_mac() 178 if (p12->mac == NULL) { in PKCS12_verify_mac() [all …]
|
H A D | p12_crt.c | 89 PKCS12 *p12 = NULL; in PKCS12_create() local 162 p12 = PKCS12_add_safes(safes, 0); in PKCS12_create() 164 if (!p12) in PKCS12_create() 175 return p12; in PKCS12_create() 178 if (p12) in PKCS12_create() 179 PKCS12_free(p12); in PKCS12_create() 336 PKCS12 *p12; in PKCS12_add_safes() local 340 p12 = PKCS12_init(nid_p7); in PKCS12_add_safes() 342 if (!p12) in PKCS12_add_safes() 346 PKCS12_free(p12); in PKCS12_add_safes() [all …]
|
H A D | p12_utl.c | 130 i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) in i2d_PKCS12_bio() argument 132 return ASN1_item_i2d_bio(&PKCS12_it, bp, p12); in i2d_PKCS12_bio() 136 i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) in i2d_PKCS12_fp() argument 138 return ASN1_item_i2d_fp(&PKCS12_it, fp, p12); in i2d_PKCS12_fp() 142 d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) in d2i_PKCS12_bio() argument 144 return ASN1_item_d2i_bio(&PKCS12_it, bp, p12); in d2i_PKCS12_bio() 148 d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) in d2i_PKCS12_fp() argument 150 return ASN1_item_d2i_fp(&PKCS12_it, fp, p12); in d2i_PKCS12_fp()
|
H A D | p12_kiss.c | 68 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 84 PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 95 if (p12 == NULL) { in PKCS12_parse() 109 if (PKCS12_verify_mac(p12, NULL, 0)) in PKCS12_parse() 111 else if (PKCS12_verify_mac(p12, "", 0)) in PKCS12_parse() 117 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 128 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { in PKCS12_parse() 175 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, in parse_pk12() argument 183 if (!(asafes = PKCS12_unpack_authsafes(p12))) in parse_pk12()
|
H A D | p12_add.c | 195 PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) in PKCS12_pack_authsafes() argument 198 &p12->authsafes->d.data)) in PKCS12_pack_authsafes() 204 PKCS12_unpack_authsafes(const PKCS12 *p12) in STACK_OF() 206 if (!PKCS7_type_is_data(p12->authsafes)) { in STACK_OF() 210 return ASN1_item_unpack(p12->authsafes->d.data, in STACK_OF()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | pkcs12.h | 159 int PKCS12_mac_present(const PKCS12 *p12); 162 const PKCS12 *p12); 194 int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); 195 STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12); 226 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 229 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 232 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 276 int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); 277 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); 278 PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12); [all …]
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | pkcs12.c | 533 PKCS12 *p12 = NULL; in pkcs12_main() local 742 p12 = PKCS12_create(cpass, pkcs12_config.name, key, ucert, in pkcs12_main() 746 if (p12 == NULL) { in pkcs12_main() 759 PKCS12_set_mac(p12, mpass, -1, NULL, 0, in pkcs12_main() 762 i2d_PKCS12_bio(out, p12); in pkcs12_main() 774 if ((p12 = d2i_PKCS12_bio(in, NULL)) == NULL) { in pkcs12_main() 790 PKCS12_get0_mac(NULL, NULL, NULL, &iter, p12); in pkcs12_main() 796 if (!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in pkcs12_main() 800 } else if (!PKCS12_verify_mac(p12, mpass, -1)) { in pkcs12_main() 816 PKCS12_free(p12); in pkcs12_main() [all …]
|
H A D | apps.c | 547 PKCS12 *p12; in load_pkcs12() local 549 p12 = d2i_PKCS12_bio(in, NULL); in load_pkcs12() 550 if (p12 == NULL) { in load_pkcs12() 555 if (PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0)) in load_pkcs12() 568 if (!PKCS12_verify_mac(p12, tpass, len)) { in load_pkcs12() 575 ret = PKCS12_parse(p12, pass, pkey, cert, ca); in load_pkcs12() 578 PKCS12_free(p12); in load_pkcs12()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 3322 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12() 3325 PKCS12_free(p12); in tls_parse_pkcs12() 3429 PKCS12_free(p12); in tls_parse_pkcs12() 3444 PKCS12 *p12; in tls_read_pkcs12() local 3450 p12 = d2i_PKCS12_fp(f, NULL); in tls_read_pkcs12() 3453 if (p12 == NULL) { in tls_read_pkcs12() 3459 return tls_parse_pkcs12(data, ssl, p12, passwd); in tls_read_pkcs12() 3473 PKCS12 *p12; in tls_read_pkcs12_blob() local 3475 p12 = d2i_PKCS12(NULL, (const unsigned char **) &blob, len); in tls_read_pkcs12_blob() 3476 if (p12 == NULL) { in tls_read_pkcs12_blob() [all …]
|
/dragonfly/sbin/init/ |
H A D | NOTES | 75 The glossary p12 describes a 'controlling process' as the first
|
/dragonfly/share/terminfo/ |
H A D | Makefile.entries | 1558 p/p12 \ 1559 p/p12-m \ 1560 p/p12-m-w \ 1561 p/p12-w \
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | README-HS20 | 142 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
|
/dragonfly/contrib/ncurses/misc/ |
H A D | terminfo.src | 17891 # p12 - Prism-12 in ANSI mode. 17892 # p12-w - 132 column version of p12. 17893 # p12-m - Prism-12 in MDC emulation mode. 17894 # p12-m-w - As p12-m, but with 132 columns. 18073 # p12: Prism-12 in ANSI mode 18078 prism12|p12|P12|MDC Prism-12 in ANSI mode, 18081 # p12-w: Prism-12 in 132 column mode 18084 # 'Wide' version of p12. 18086 prism12-w|p12-w|P12-W|MDC Prism-12 in 132 column mode, 18089 # p12-m: Prism-12 in MDC emulation mode [all …]
|