Searched refs:nid_cert (Results 1 – 3 of 3) sorted by relevance
/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 28 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex() argument 41 if (nid_cert == NID_undef) in PKCS12_create_ex() 42 nid_cert = NID_aes_256_cbc; in PKCS12_create_ex() 76 if (bags && !PKCS12_add_safe_ex(&safes, bags, nid_cert, iter, pass, in PKCS12_create_ex() 131 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create() argument 134 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
|
/openssl/doc/man3/ |
H A D | PKCS12_create.pod | 13 int nid_key, int nid_cert, int iter, int mac_iter, int keytype); 15 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 28 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used 39 The parameters I<nid_key>, I<nid_cert>, I<iter>, I<mac_iter> and I<keytype> 67 I<nid_key> or I<nid_cert> can be set to -1 indicating that no encryption
|
/openssl/include/openssl/ |
H A D | pkcs12.h.in | 290 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 293 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert,
|
Completed in 11 milliseconds