HomeSort by relevance Sort by last modified time
    Searched full:pkcs (Results 1 - 25 of 341) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/tls/
pkcs8.c 2 * PKCS #8 (Private-key information syntax)
27 /* PKCS #8, Chapter 6 */
33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
34 "header (SEQUENCE); assume PKCS #8 not used");
43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
44 "class %d tag 0x%x; assume PKCS #8 not used",
54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
63 "PKCS #8 not used")
    [all...]
pkcs5.c 2 * PKCS #5 (Password-based Encryption)
36 oid->oid[4] == 1 /* pkcs */ &&
37 oid->oid[5] == 5 /* pkcs-5 */ &&
60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID "
66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
69 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption "
75 * PKCS#5, Section 8
84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE "
97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) "
105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt"
    [all...]
pkcs5.h 2 * PKCS #5 (Password-based Encryption)
pkcs8.h 2 * PKCS #8 (Private-key information syntax)
pkcs1.c 2 * PKCS #1 (RSA Encryption)
24 * PKCS #1 v1.5, 8.1:
34 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
57 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
68 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
120 /* Strip PKCS #1 header */
139 * PKCS #1 v1.5, 8.1:
176 /* PKCS #1 v1.5, 8.1: At least eight octets long PS */
190 /* Strip PKCS #1 header */
pkcs1.h 2 * PKCS #1 (RSA Encryption)
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 0 /* PKCS Header Info */
3 /* ===> PKCS #1 -- RSA Cryptography <=== */
8 LTC_PKCS_1_EMSA = 1, /* Block type 1 (PKCS #1 v1.5 signature padding) */
9 LTC_PKCS_1_EME = 2 /* Block type 2 (PKCS #1 v1.5 encryption padding) */
14 LTC_PKCS_1_V1_5 = 1, /* PKCS #1 v1.5 padding (\sa ltc_pkcs_1_v1_5_blocks) */
15 LTC_PKCS_1_OAEP = 2, /* PKCS #1 v2.0 encryption padding */
16 LTC_PKCS_1_PSS = 3 /* PKCS #1 v2.1 signature padding */
70 /* ===> PKCS #5 -- Password Based Cryptography <=== */
  /libcore/luni/src/main/java/java/security/spec/
package.html 10 (1) PKCS#1 RSA encryption standard;
12 (3) PKCS#8 private key information standard.
PKCS8EncodedKeySpec.java 22 * in the PKCS#8 standard.
52 * @return the string "PKCS#8".
55 return "PKCS#8";
RSAPrivateKeySpec.java 26 * href="http://www.rsa.com/rsalabs/pubs/PKCS/html/pkcs-1.html">PKCS #1 v2.1</a>
RSAPublicKeySpec.java 26 * href="http://www.rsa.com/rsalabs/pubs/PKCS/html/pkcs-1.html">PKCS #1 v2.1</a>
  /libcore/luni/src/main/java/javax/crypto/spec/
package.html 7 <li>PKCS#3 Diffie-Hellman Key Agreement standard;
9 <li>PKCS#5 Password-Based Cryptography standard.
  /external/bouncycastle/src/main/java/org/bouncycastle/asn1/pkcs/
KeyDerivationFunc.java 1 package org.bouncycastle.asn1.pkcs;
PKCSObjectIdentifiers.java 1 package org.bouncycastle.asn1.pkcs;
8 // pkcs-1 OBJECT IDENTIFIER ::= {
9 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 }
32 // pkcs-3 OBJECT IDENTIFIER ::= {
33 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 3 }
39 // pkcs-5 OBJECT IDENTIFIER ::= {
40 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 }
99 // pkcs-7 OBJECT IDENTIFIER ::= {
100 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 7 }
111 // pkcs-9 OBJECT IDENTIFIER ::=
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/examples/
openCryptoki.conf 1 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
4 # This example uses following PKCS#11 objects:
18 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module
28 # use OpenSSL PKCS#11 engine for this network
wpa2-eap-ccmp.conf 14 private_key_passwd="PKCS#12 passhrase"
  /external/wpa_supplicant_8/wpa_supplicant/examples/
openCryptoki.conf 1 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
4 # This example uses following PKCS#11 objects:
18 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module
28 # use OpenSSL PKCS#11 engine for this network
wpa2-eap-ccmp.conf 14 private_key_passwd="PKCS#12 passhrase"
  /libcore/luni/src/main/java/javax/crypto/interfaces/
package.html 5 Diffie-Hellman (DH) key agreement's algorithm as specified by PKCS#3.
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-rsa.c 35 /* First, check for possible PKCS #8 encoding */
41 /* Try to parse as encrypted PKCS #8 */
47 /* Not PKCS#8, so try to import PKCS #1 encoded RSA private key */
48 wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private "
  /external/openssh/
ssh-pkcs11-helper.0 4 ssh-pkcs11-helper - ssh-agent helper program for PKCS#11 support
11 PKCS#11 token.
  /libcore/luni/src/main/java/java/security/interfaces/
package.html 9 (1) Keys for the RSA asymmetric encryption algorithm using the PKCS#1 standard;
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCERSAPrivateKey.java 7 import org.bouncycastle.asn1.pkcs.PrivateKeyInfo;
8 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
9 import org.bouncycastle.asn1.pkcs.RSAPrivateKeyStructure;
75 return "PKCS#8";
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_encrypt_key.c 15 RSA PKCS #1 encryption, Tom St Denis and Andreas Lange
21 (PKCS #1 v2.0) OAEP pad then encrypt
85 /* PKCS #1 v1.5 pad the key */
94 /* rsa exptmod the OAEP or PKCS #1 v1.5 pad */
  /external/dropbear/libtomcrypt/notes/
tech0005.txt 12 The following build with GCC 3.4.4 on an AMD64 box gets you AES, CTR mode, SHA-256, HMAC, Yarrow, full RSA PKCS #1, PKCS #5 and ASN.1 DER in

Completed in 371 milliseconds

1 2 3 4 5 6 7 8 91011>>