Searched
full:pkcs (Results
301 -
325 of
621) sorted by null
<<11121314151617181920>>
/external/chromium_org/net/cert/ |
x509_certificate_mac.cc | 179 // other formats (eg: PKCS#12) are supported, this may also include 185 // block headers. If a PKCS#7 blob is encoded with a PEM block of 192 // is properly decoded as a PKCS#7, whether PEM or not, which avoids
|
/external/chromium_org/net/data/ssl/certificates/ |
README | 28 - client.p12 : A PKCS #12 file containing a client certificate and a private 31 - client-nokey.p12 : A PKCS #12 file containing a client certificate (the same 129 - websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_test.c | 252 printf("PKCS#1 v1.5 encryption failed!\n"); 261 printf("PKCS#1 v1.5 decryption failed!\n"); 265 printf("PKCS #1 v1.5 encryption/decryption ok\n");
|
/external/openssh/ |
ssh-add.c | 269 pin = read_passphrase("Enter passphrase for PKCS#11: ", RP_ALLOW_STDIN); 375 fprintf(stderr, " -s pkcs11 Add keys from PKCS#11 provider.\n"); 376 fprintf(stderr, " -e pkcs11 Remove keys provided by PKCS#11 provider.\n");
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 252 printf("PKCS#1 v1.5 encryption failed!\n"); 261 printf("PKCS#1 v1.5 decryption failed!\n"); 265 printf("PKCS #1 v1.5 encryption/decryption ok\n");
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 112 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 114 * from the PKCS#12 file in this case. Full path to the file should be 394 * pkcs11_engine_path - Path to the OpenSSL engine for PKCS#11 396 * This is an OpenSSL specific configuration option for loading PKCS#11 402 * pkcs11_module_path - Path to the OpenSSL OpenSC/PKCS#11 module 405 * path to OpenSC/PKCS#11 engine (opensc-pkcs11.so); if %NULL, this
|
/device/asus/grouper/keymaster/ |
pkcs11.h | 32 * This header file contains the definition of the PKCS#11 types and functions 34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
|
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
pkcs11.h | 32 * This header file contains the definition of the PKCS#11 types and functions 34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
|
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
pkcs11.h | 32 * This header file contains the definition of the PKCS#11 types and functions 34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
OperatorHelper.java | 30 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers; 31 import org.bouncycastle.asn1.pkcs.RSASSAPSSparams;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509Util.java | 33 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers; 34 import org.bouncycastle.asn1.pkcs.RSASSAPSSparams;
|
/external/chromium/crypto/ |
rsa_private_key.cc | 15 // from PKCS #8 and RSAPrivateKey from PKCS #1. These structures are:
|
/external/chromium_org/crypto/ |
rsa_private_key.cc | 15 // from PKCS #8 and RSAPrivateKey from PKCS #1. These structures are:
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkcs8.c | 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
/external/dropbear/ |
rsa.c | 249 /* create the magic PKCS padded value */ 367 /* Creates the message value as expected by PKCS, see rfc2437 etc */
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
PEMDecoder.java | 108 /* Removes RFC 1423/PKCS #7 padding */ 288 /* Now check and remove RFC 1423/PKCS #7 padding */
|
/external/openssl/apps/ |
pkcs8.c | 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.h | 259 * pkcs11_engine_path - PKCS#11 engine for OpenSSL engine support 265 * pkcs11_module_path - OpenSC PKCS#11 module for OpenSSL engine
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 80 * PKCS #1, 7.1: 156 * PKCS #1, 7.2:
|
/hardware/ti/omap4xxx/security/tf_crypto_sst/ |
pkcs11_global.c | 35 * only supports option 1 defined in PKCS#11, section 6.5.2: 258 "PKCS#11", /* libraryDescription */
|
/hardware/ti/omap4xxx/security/tf_sdk/include/ |
pkcs11.h | 32 * This header file contains the definition of the PKCS#11 types and functions 34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
|
/external/dropbear/libtomcrypt/ |
changes | 38 -- Andreas contributed PKCS #1 v1.5 code that merged cleanly with the existing PKCS code. w00t. 63 -- Added RSA PKCS #1 v1.5 signature/encrypt tests to rsa_test.c 218 -- rsa_import() can now read OpenSSL format DER public keys as well as the PKCS #1 RSAPublicKey format. 219 Note that rsa_export() **ONLY** writes PKCS #1 formats 274 -- Pekka helped me clean up the PKCS #1 v2.1 [OAEP/PSS] code 285 -- Added DERs for missing hashes, but just the OID not the PKCS #1 v1.5 additions. 286 -- Removed PKCS #1 v1.5 from the tree since it's taking up space and you ought to use v2.1 anyways [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
DefaultCMSSignatureAlgorithmNameGenerator.java | 13 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
PKCS1Encoding.java | 14 * this does your basic PKCS 1 v1.5 padding - whether or not you should be using this
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
RSADigestSigner.java | 10 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
|
Completed in 802 milliseconds
<<11121314151617181920>>