Home
last modified time | relevance | path

Searched refs:PKCS12 (Results 1 – 25 of 28) sorted by relevance

12

/external/boringssl/src/include/openssl/
Dpkcs8.h148 OPENSSL_EXPORT PKCS12 *d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes,
152 OPENSSL_EXPORT PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12);
155 OPENSSL_EXPORT PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12);
165 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
177 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password,
181 OPENSSL_EXPORT void PKCS12_free(PKCS12 *p12);
Dbase.h224 typedef struct pkcs12_st PKCS12; typedef
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
DAES.java224 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA1, 128, 16); in PBEWithSHA1AESCBC128()
233 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA1, 192, 16); in PBEWithSHA1AESCBC192()
242 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA1AESCBC256()
254 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA256, 128, 16); in PBEWithSHA256AESCBC128()
263 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA256, 192, 16); in PBEWithSHA256AESCBC192()
272 super(new CBCBlockCipher(new AESFastEngine()), PKCS12, SHA256, 256, 16); in PBEWithSHA256AESCBC256()
329 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); in PBEWithSHAAnd128BitAESBC()
341 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); in PBEWithSHAAnd192BitAESBC()
353 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAAnd256BitAESBC()
365 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); in PBEWithSHA256And128BitAESBC()
[all …]
DRC2.java123 …Aand128BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC2_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAnd128BitKeyFactory()
135 …hSHAand40BitRC2-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd40BitRC2_CBC, true, PKCS12, SHA1, 40, 64); in PBEWithSHAAnd40BitKeyFactory()
171 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAnd128BitRC2()
183 super(new CBCBlockCipher(new RC2Engine()), PKCS12, SHA1, 40, 8); in PBEWithSHAAnd40BitRC2()
DDESede.java221 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); in PBEWithSHAAndDES3Key()
233 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); in PBEWithSHAAndDES2Key()
245 …dDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); in PBEWithSHAAndDES3KeyFactory()
257 …dDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); in PBEWithSHAAndDES2KeyFactory()
DTwofish.java93 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); in PBEWithSHAKeyFactory()
105 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16); in PBEWithSHA()
DARC4.java46 …PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 128, 0); in PBEWithSHAAnd128BitKeyFactory()
58 …"PBEWithSHAAnd128BitRC4", PKCSObjectIdentifiers.pbeWithSHAAnd128BitRC4, true, PKCS12, SHA1, 40, 0); in PBEWithSHAAnd40BitKeyFactory()
/external/boringssl/src/crypto/pkcs8/
Dpkcs8.c1066 PKCS12* d2i_PKCS12(PKCS12 **out_p12, const uint8_t **ber_bytes, size_t ber_len) { in d2i_PKCS12()
1067 PKCS12 *p12; in d2i_PKCS12()
1072 p12 = OPENSSL_malloc(sizeof(PKCS12)); in d2i_PKCS12()
1090 PKCS12* d2i_PKCS12_bio(BIO *bio, PKCS12 **out_p12) { in d2i_PKCS12_bio()
1095 PKCS12 *ret = NULL; in d2i_PKCS12_bio()
1134 PKCS12* d2i_PKCS12_fp(FILE *fp, PKCS12 **out_p12) { in d2i_PKCS12_fp()
1136 PKCS12 *ret; in d2i_PKCS12_fp()
1148 int PKCS12_parse(const PKCS12 *p12, const char *password, EVP_PKEY **out_pkey, in PKCS12_parse()
1189 int PKCS12_verify_mac(const PKCS12 *p12, const char *password, in PKCS12_verify_mac()
1214 void PKCS12_free(PKCS12 *p12) { in PKCS12_free()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
DBaseMac.java34 private int scheme = PKCS12;
113 param = PBE.Util.makePBEMacParameters(k, PKCS12, digest, keySize, pbeSpec); in engineInit()
DPBE.java51 static final int PKCS12 = 2; field
131 else if (type == PKCS12) in makePBEGenerator()
432 if (type == PKCS12) in convertPassword()
DBCPBEKey.java77 if (type == PBE.PKCS12) in getEncoded()
DBaseStreamCipher.java177 …param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pb… in engineInit()
DBaseWrapCipher.java60 protected int pbeType = PKCS12;
DBaseBlockCipher.java533 if ((scheme == PKCS12 || key instanceof PKCS12Key) && !isBCPBEKeyWithoutIV(key)) in engineInit()
593 …param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pb… in engineInit()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/
DPKCS12.java6 public class PKCS12 class
/external/bouncycastle/patches/
DREADME22 - removed references to SecretKeyFactory.PBE/PKCS5 SecretKeyFactory.PBE/PKCS12
Dbcprov.patch3799 - super("PBEwithHmacSHA256", null, false, PKCS12, SHA256, 256, 0);
3811 + // super("PBEwithHmacSHA256", null, false, PKCS12, SHA256, 256, 0);
4144 …ouncycastle/jcajce/provider/keystore/PKCS12.java bcprov-jdk15on-152/org/bouncycastle/jcajce/provid…
4145 --- bcprov-jdk15on-152.orig/org/bouncycastle/jcajce/provider/keystore/PKCS12.java 2015-03-01 12:03:…
4146 +++ bcprov-jdk15on-152/org/bouncycastle/jcajce/provider/keystore/PKCS12.java 2013-05-25 02:14:15.00…
4150 … provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
4152 - provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyS…
4154 - provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS…
4155 - provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS1…
4157 - provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$De…
[all …]
/external/boringssl/src/crypto/test/
Dscoped_types.h112 using ScopedPKCS12 = ScopedOpenSSLType<PKCS12, PKCS12_free>;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
DSHA1.java91 super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0); in PBEWithMacKeyFactory()
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/
DCHANGELOG.md40 * Add utility function to convert PKCS12 key to PEM. (#115)
107 * Better unicode handling with PKCS12 passwords (#31, thanks @jterrace).
143 PKCS12 formatted keys). Note that if you use PEM formatted keys you can use
DCONTRIBUTING.md116 P12/PKCS12 key file. You can download this in the same way as a JSON
119 corresponding to the P12/PKCS12 key file.
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/
Dcertutils.py213 p12 = crypto.PKCS12()
/external/curl/docs/examples/
Dcurlx.c130 PKCS12 * p12 ;
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl.c2425 static int tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, in tls_parse_pkcs12()
2561 PKCS12 *p12; in tls_read_pkcs12()
2590 PKCS12 *p12; in tls_read_pkcs12_blob()
/external/curl/lib/vtls/
Dopenssl.c450 PKCS12 *p12; in cert_stuff()

12