/external/boringssl/src/include/openssl/ |
D | pkcs8.h | 148 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, 152 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12); 155 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12); 165 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 177 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 181 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12);
|
D | base.h | 224 typedef struct pkcs12_st PKCS12; typedef
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 224 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA1, 128, 16); in PBEWithSHA1AESCBC128() 233 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA1, 192, 16); in PBEWithSHA1AESCBC192() 242 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA1AESCBC256() 254 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA256, 128, 16); in PBEWithSHA256AESCBC128() 263 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA256, 192, 16); in PBEWithSHA256AESCBC192() 272 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA256, 256, 16); in PBEWithSHA256AESCBC256() 329 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); in PBEWithSHAAnd128BitAESBC() 341 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); in PBEWithSHAAnd192BitAESBC() 353 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAAnd256BitAESBC() 365 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); in PBEWithSHA256And128BitAESBC() [all …]
|
D | RC2.java | 123 …Aand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAnd128BitKeyFactory() 135 …hSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); in PBEWithSHAAnd40BitKeyFactory() 171 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAnd128BitRC2() 183 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8); in PBEWithSHAAnd40BitRC2()
|
D | DESede.java | 221 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); in PBEWithSHAAndDES3Key() 233 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAndDES2Key() 245 …dDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); in PBEWithSHAAndDES3KeyFactory() 257 …dDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAndDES2KeyFactory()
|
D | Twofish.java | 93 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAKeyFactory() 105 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA()
|
D | ARC4.java | 46 …PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); in PBEWithSHAAnd128BitKeyFactory() 58 …"PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); in PBEWithSHAAnd40BitKeyFactory()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 1066 PKCS12* d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, size_t ber_len) { in d2i_PKCS12() 1067 PKCS12 *p12; in d2i_PKCS12() 1072 p12 = OPENSSL_malloc(sizeof(PKCS12)); in d2i_PKCS12() 1090 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) { in d2i_PKCS12_bio() 1095 PKCS12 *ret = NULL; in d2i_PKCS12_bio() 1134 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) { in d2i_PKCS12_fp() 1136 PKCS12 *ret; in d2i_PKCS12_fp() 1148 int PKCS12_parse(const PKCS12 *p12, const char *password, EVP_PKEY **out_pkey, in PKCS12_parse() 1189 int PKCS12_verify_mac(const PKCS12 *p12, const char *password, in PKCS12_verify_mac() 1214 void PKCS12_free(PKCS12 *p12) { in PKCS12_free()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
D | BaseMac.java | 34 private int scheme = PKCS12; 113 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec); in engineInit()
|
D | PBE.java | 51 static final int PKCS12 = 2; field 131 else if (type == PKCS12) in makePBEGenerator() 432 if (type == PKCS12) in convertPassword()
|
D | BCPBEKey.java | 77 if (type == PBE.PKCS12) in getEncoded()
|
D | BaseStreamCipher.java | 177 …param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pb… in engineInit()
|
D | BaseWrapCipher.java | 60 protected int pbeType = PKCS12;
|
D | BaseBlockCipher.java | 533 if ((scheme == PKCS12 || key instanceof PKCS12Key) && !isBCPBEKeyWithoutIV(key)) in engineInit() 593 …param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pb… in engineInit()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
D | PKCS12.java | 6 public class PKCS12 class
|
/external/bouncycastle/patches/ |
D | README | 22 - removed references to SecretKeyFactory.PBE/PKCS5 SecretKeyFactory.PBE/PKCS12
|
D | bcprov.patch | 3799 - super("PBEwithHmacSHA256", null, false, PKCS12, SHA256, 256, 0); 3811 + // super("PBEwithHmacSHA256", null, false, PKCS12, SHA256, 256, 0); 4144 …ouncycastle/jcajce/provider/keystore/PKCS12.java bcprov-jdk15on-152/org/bouncycastle/jcajce/provid… 4145 --- bcprov-jdk15on-152.orig/org/bouncycastle/jcajce/provider/keystore/PKCS12.java 2015-03-01 12:03:… 4146 +++ bcprov-jdk15on-152/org/bouncycastle/jcajce/provider/keystore/PKCS12.java 2013-05-25 02:14:15.00… 4150 … provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 4152 - provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyS… 4154 - provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS… 4155 - provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS1… 4157 - provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$De… [all …]
|
/external/boringssl/src/crypto/test/ |
D | scoped_types.h | 112 using ScopedPKCS12 = ScopedOpenSSLType<PKCS12, PKCS12_free>;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
D | SHA1.java | 91 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0); in PBEWithMacKeyFactory()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/ |
D | CHANGELOG.md | 40 * Add utility function to convert PKCS12 key to PEM. (#115) 107 * Better unicode handling with PKCS12 passwords (#31, thanks @jterrace). 143 PKCS12 formatted keys). Note that if you use PEM formatted keys you can use
|
D | CONTRIBUTING.md | 116 P12/PKCS12 key file. You can download this in the same way as a JSON 119 corresponding to the P12/PKCS12 key file.
|
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/ |
D | certutils.py | 213 p12 = crypto.PKCS12()
|
/external/curl/docs/examples/ |
D | curlx.c | 130 PKCS12 * p12 ;
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 2425 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, in tls_parse_pkcs12() 2561 PKCS12 *p12; in tls_read_pkcs12() 2590 PKCS12 *p12; in tls_read_pkcs12_blob()
|
/external/curl/lib/vtls/ |
D | openssl.c | 450 PKCS12 *p12; in cert_stuff()
|