Searched refs:p12 (Results 1 - 11 of 11) sorted by relevance

/illumos-gate/usr/src/common/net/wanboot/
H A Dp12access.c196 PKCS12 *p12 = NULL; local
206 p12 = p12_read_file(filename);
207 if (p12 != NULL) {
208 ret = p12_doparse(p12, passwd, DO_UNMATCHING, NULL,
220 if (p12 != NULL)
221 PKCS12_free(p12);
251 PKCS12 *p12 = NULL; local
260 p12 = p12_read_file(filename);
261 if (p12 != NULL) {
262 ret = p12_doparse(p12, passw
308 PKCS12 *p12 = NULL; local
357 PKCS12 *p12 = NULL; local
410 p12_doparse(PKCS12 *p12, char *passwd, int matchty, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
474 check_password(PKCS12 *p12, char *pass) argument
[all...]
H A Dp12auxutl.c114 PKCS12 *p12 = NULL; local
333 if ((p12 = PKCS12_init(NID_pkcs7_data)) == NULL) {
342 if (M_PKCS12_pack_authsafes(p12, safes) == 0) {
346 if (PKCS12_set_mac(p12, pass, -1, NULL, 0, 2048, NULL) == 0) {
351 ret_p12 = p12;
352 p12 = NULL;
372 if (p12 != NULL)
373 PKCS12_free(p12);
H A Dp12auxpars.c150 static int sunw_PKCS12_contents(PKCS12 *p12, const char *pass,
162 * p12 - Structure with pkcs12 info to be parsed
208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, argument
216 if (p12 == NULL) {
250 if (PKCS12_verify_mac(p12, NULL, 0))
252 else if (PKCS12_verify_mac(p12, "", 0))
259 } else if (PKCS12_verify_mac(p12, pass, -1) == 0) {
264 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len,
291 * p12 - Structure with pkcs12 info to be parsed
319 parse_pkcs12(PKCS12 *p12, cons argument
498 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument
553 parse_outer(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument
[all...]
/illumos-gate/usr/src/lib/libpkg/common/
H A Dkeystore.c100 static boolean_t get_keystore_passwd(PKG_ERR *err, PKCS12 *p12,
1212 PKCS12 *p12; local
1232 if ((p12 =
1247 PKCS12_free(p12);
1650 PKCS12 *p12 = NULL; local
1669 if ((p12 = read_keystore_file(err,
1679 if (!get_keystore_passwd(err, p12, cb, keystore)) {
1687 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1696 PKCS12_free(p12);
1697 p12
1845 get_keystore_passwd(PKG_ERR *err, PKCS12 *p12, keystore_passphrase_cb cb, keystore_t *keystore) argument
1899 PKCS12 *p12 = NULL; local
2263 PKCS12 *p12 = NULL; local
2454 check_password(PKCS12 *p12, char *pass) argument
[all...]
H A Dp12lib.c230 * p12 - Structure with pkcs12 info to be parsed
276 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid,
284 if (p12 == NULL) {
318 if (PKCS12_verify_mac(p12, NULL, 0))
320 else if (PKCS12_verify_mac(p12, "", 0))
327 } else if (PKCS12_verify_mac(p12, pass, -1) == 0) {
332 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len,
440 * p12 - Structure with pkcs12 info to be parsed
455 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, argument
476 if (parse_outer(p12, pas
648 PKCS12 *p12 = NULL; local
1541 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
1711 parse_outer(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument
[all...]
H A Dpkgweb.c1830 PKCS12 *p12 = NULL; local
1868 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) {
1874 if (i2d_PKCS12_fp(fp, p12) == 0) {
1888 if (p12 != NULL)
1889 PKCS12_free(p12);
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/
H A Dp12split.c489 PKCS12 *p12; local
504 p12 = d2i_PKCS12_fp(fp, NULL);
505 if (p12 == NULL) {
512 ret = sunw_PKCS12_parse(p12, pass, matchty, k_matchval, k_len,
520 PKCS12_free(p12);
531 PKCS12 *p12 = NULL; local
565 p12 = sunw_PKCS12_create(WANBOOT_PASSPHRASE, klist, clist, ta);
566 if (p12 == NULL) {
572 if (i2d_PKCS12_fp(fp, p12) == 0) {
580 if (p12 !
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c785 PKCS12 *p12 = NULL; local
817 if ((p12 = d2i_PKCS12_fp(wfp, NULL)) == NULL) {
821 i = sunw_PKCS12_parse(p12, WANBOOT_PASSPHRASE, DO_NONE, NULL,
828 PKCS12_free(p12);
829 p12 = NULL;
863 if ((p12 = d2i_PKCS12_fp(rfp, NULL)) == NULL) {
867 i = sunw_PKCS12_parse(p12, WANBOOT_PASSPHRASE, DO_NONE, NULL, 0, NULL,
873 PKCS12_free(p12);
874 p12 = NULL;
889 p12
1065 PKCS12 *p12 = NULL; local
[all...]
/illumos-gate/usr/src/lib/libm/common/Q/
H A Datanl.c96 p12 = 3.983031914579635037502589204647752042736e-0002L, variable
143 z * (p10 + z * (p11 + z * (p12 + z * p13)))))))))))));
158 z * (p12 + z * p13)))))))))))));
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c614 PKCS12 *p12 = d2i_PKCS12_bio(bcert, NULL); local
615 if (p12 != NULL) {
616 (void) PKCS12_parse(p12, NULL, NULL, &xcert, NULL);
617 PKCS12_free(p12);
618 p12 = NULL;
3924 openssl_pkcs12_parse(PKCS12 *p12, char *pin, argument
3936 if (p12 == NULL || (keys == NULL && certs == NULL))
3940 if (PKCS12_verify_mac(p12, NULL, 0)) {
3942 } else if (PKCS12_verify_mac(p12, "", 0)) {
3947 } else if (!PKCS12_verify_mac(p12, pi
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c4854 PKCS12 *p12 = NULL; local
4886 p12 = d2i_PKCS12_fp(fp, NULL);
4888 if (p12 == NULL) {
4900 ret = PKCS12_parse(p12, NULL, &y, &x, NULL);
4941 ret = PKCS12_parse(p12, rdat.data, &y, &x, NULL);
4965 if (p12)
4966 PKCS12_free(p12);

Completed in 132 milliseconds