HomeSort by relevance Sort by last modified time
    Searched full:pkcs (Results 201 - 225 of 621) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium/crypto/
rsa_private_key.h 37 // PKCS #8 PrivateKeyInfo and PublicKeyInfo.
41 // ASN.1 encoding of the AlgorithmIdentifier from PKCS #8.
187 // an ASN.1-encoded PrivateKeyInfo block from PKCS #8. This can return NULL if
193 // an ASN.1-encoded PrivateKeyInfo block from PKCS #8. This can return NULL if
225 // Exports the private key to a PKCS #1 PrivateKey block.
  /external/chromium_org/crypto/
rsa_private_key.h 34 // PKCS #8 PrivateKeyInfo and PublicKeyInfo.
38 // ASN.1 encoding of the AlgorithmIdentifier from PKCS #8.
178 // an ASN.1-encoded PrivateKeyInfo block from PKCS #8. This can return NULL if
190 // format is an ASN.1-encoded PrivateKeyInfo block from PKCS #8. This can
221 // Exports the private key to a PKCS #1 PrivateKey block.
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 494 * PKCS #1 v1.5, 8.1:
504 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
527 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
538 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
629 * PKCS #1 v1.5, 8.1:
648 /* PKCS #1 v1.5, 8.1: At least eight octets long PS */
662 /* Strip PKCS #1 header */
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/
X509CertPathImpl.java 66 *    - PKCS #7 SignedData object provided in the form of
71 * for more info on PKCS #7)
158 * Extract a CertPath from a PKCS#7 {@code contentInfo} object.
394 * Encoder for PKCS#7 SignedData. It is assumed that only certificate field
427 "Invalid use of encoder for PKCS#7 SignedData object");
448 "Invalid use of encoder for PKCS#7 SignedData object");
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
DefaultSignatureAlgorithmIdentifierFinder.java 17 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
18 import org.bouncycastle.asn1.pkcs.RSASSAPSSparams;
129 // PKCS 1.5 encrypted algorithms
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/util/
PublicKeyFactory.java 20 import org.bouncycastle.asn1.pkcs.DHParameter;
21 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
22 import org.bouncycastle.asn1.pkcs.RSAPublicKey;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 34 import org.bouncycastle.asn1.pkcs.ContentInfo;
35 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
36 import org.bouncycastle.asn1.pkcs.SignedData;
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_pk8.c 78 /* These functions write a private key in PKCS#8 format: it is a "drop in"
81 * uses PKCS#5 v1.5 PBE algorithms whereas the others use PKCS#5 v2.0.
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_add.c 134 /* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */
155 /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */
166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
p12_npas.c 66 /* PKCS#12 password change routine */
75 * Change the password on a PKCS#12 structure.
102 /* Parse the outer PKCS#12 structure */
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pk7_asn1.c 65 /* PKCS#7 ASN1 module */
67 /* This is the ANY DEFINED BY table for the top level PKCS#7 structure */
80 /* PKCS#7 streaming support */
  /external/openssl/crypto/pem/
pem_pk8.c 78 /* These functions write a private key in PKCS#8 format: it is a "drop in"
81 * uses PKCS#5 v1.5 PBE algorithms whereas the others use PKCS#5 v2.0.
  /external/openssl/crypto/pkcs12/
p12_add.c 134 /* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */
155 /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */
166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
p12_npas.c 66 /* PKCS#12 password change routine */
75 * Change the password on a PKCS#12 structure.
102 /* Parse the outer PKCS#12 structure */
  /external/openssl/crypto/pkcs7/
pk7_asn1.c 65 /* PKCS#7 ASN1 module */
67 /* This is the ANY DEFINED BY table for the top level PKCS#7 structure */
80 /* PKCS#7 streaming support */
  /libcore/crypto/src/main/java/org/conscrypt/
OpenSSLX509CertificateFactory.java 96 /* PKCS#7 bags have a byte 0x06 at position 4 in the stream. */
135 /* Attempt to see if this is a PKCS#7 bag. */
151 /* PKCS#7 bags have a byte 0x06 at position 4 in the stream. */
  /external/apache-harmony/support/src/test/java/tests/support/
Support_ProviderJCE.java 80 put("KeyStore.PKCS#12/Netscape",
Support_ProviderRSA.java 86 put("KeyStore.PKCS#12/Netscape",
Support_ProviderTrust.java 82 put("KeyStore.PKCS#12/Netscape",
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/
KeyFactorySpi.java 16 import org.bouncycastle.asn1.pkcs.PrivateKeyInfo;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
SHA256.java 4 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
JCERSAPublicKey.java 10 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
  /external/chromium_org/net/base/
keygen_handler.h 59 // The callback for requesting a password to the PKCS#11 token.
  /external/chromium_org/third_party/openssl/openssl/apps/
rsautl.c 163 else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING;
331 BIO_printf(bio_err, "-pkcs use PKCS#1 v1.5 padding (default)\n");
332 BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
  /external/openssl/apps/
rsautl.c 163 else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING;
331 BIO_printf(bio_err, "-pkcs use PKCS#1 v1.5 padding (default)\n");
332 BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");

Completed in 724 milliseconds

1 2 3 4 5 6 7 891011>>