HomeSort by relevance Sort by last modified time
    Searched full:pkcs (Results 301 - 325 of 621) sorted by null

<<11121314151617181920>>

  /external/chromium_org/net/cert/
x509_certificate_mac.cc 179 // other formats (eg: PKCS#12) are supported, this may also include
185 // block headers. If a PKCS#7 blob is encoded with a PEM block of
192 // is properly decoded as a PKCS#7, whether PEM or not, which avoids
  /external/chromium_org/net/data/ssl/certificates/
README 28 - client.p12 : A PKCS #12 file containing a client certificate and a private
31 - client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
129 - websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_test.c 252 printf("PKCS#1 v1.5 encryption failed!\n");
261 printf("PKCS#1 v1.5 decryption failed!\n");
265 printf("PKCS #1 v1.5 encryption/decryption ok\n");
  /external/openssh/
ssh-add.c 269 pin = read_passphrase("Enter passphrase for PKCS#11: ", RP_ALLOW_STDIN);
375 fprintf(stderr, " -s pkcs11 Add keys from PKCS#11 provider.\n");
376 fprintf(stderr, " -e pkcs11 Remove keys provided by PKCS#11 provider.\n");
  /external/openssl/crypto/rsa/
rsa_test.c 252 printf("PKCS#1 v1.5 encryption failed!\n");
261 printf("PKCS#1 v1.5 decryption failed!\n");
265 printf("PKCS #1 v1.5 encryption/decryption ok\n");
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 112 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
114 * from the PKCS#12 file in this case. Full path to the file should be
394 * pkcs11_engine_path - Path to the OpenSSL engine for PKCS#11
396 * This is an OpenSSL specific configuration option for loading PKCS#11
402 * pkcs11_module_path - Path to the OpenSSL OpenSC/PKCS#11 module
405 * path to OpenSC/PKCS#11 engine (opensc-pkcs11.so); if %NULL, this
  /device/asus/grouper/keymaster/
pkcs11.h 32 * This header file contains the definition of the PKCS#11 types and functions
34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
  /device/asus/grouper/self-extractors/nvidia/staging/keymaster/
pkcs11.h 32 * This header file contains the definition of the PKCS#11 types and functions
34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
  /device/asus/tilapia/self-extractors/nvidia/staging/keymaster/
pkcs11.h 32 * This header file contains the definition of the PKCS#11 types and functions
34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
OperatorHelper.java 30 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
31 import org.bouncycastle.asn1.pkcs.RSASSAPSSparams;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509Util.java 33 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
34 import org.bouncycastle.asn1.pkcs.RSASSAPSSparams;
  /external/chromium/crypto/
rsa_private_key.cc 15 // from PKCS #8 and RSAPrivateKey from PKCS #1. These structures are:
  /external/chromium_org/crypto/
rsa_private_key.cc 15 // from PKCS #8 and RSAPrivateKey from PKCS #1. These structures are:
  /external/chromium_org/third_party/openssl/openssl/apps/
pkcs8.c 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
  /external/dropbear/
rsa.c 249 /* create the magic PKCS padded value */
367 /* Creates the message value as expected by PKCS, see rfc2437 etc */
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/
PEMDecoder.java 108 /* Removes RFC 1423/PKCS #7 padding */
288 /* Now check and remove RFC 1423/PKCS #7 padding */
  /external/openssl/apps/
pkcs8.c 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
  /external/wpa_supplicant_8/src/eap_peer/
eap.h 259 * pkcs11_engine_path - PKCS#11 engine for OpenSSL engine support
265 * pkcs11_module_path - OpenSC PKCS#11 module for OpenSSL engine
  /external/wpa_supplicant_8/src/tls/
rsa.c 80 * PKCS #1, 7.1:
156 * PKCS #1, 7.2:
  /hardware/ti/omap4xxx/security/tf_crypto_sst/
pkcs11_global.c 35 * only supports option 1 defined in PKCS#11, section 6.5.2:
258 "PKCS#11", /* libraryDescription */
  /hardware/ti/omap4xxx/security/tf_sdk/include/
pkcs11.h 32 * This header file contains the definition of the PKCS#11 types and functions
34 * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface
  /external/dropbear/libtomcrypt/
changes 38 -- Andreas contributed PKCS #1 v1.5 code that merged cleanly with the existing PKCS code. w00t.
63 -- Added RSA PKCS #1 v1.5 signature/encrypt tests to rsa_test.c
218 -- rsa_import() can now read OpenSSL format DER public keys as well as the PKCS #1 RSAPublicKey format.
219 Note that rsa_export() **ONLY** writes PKCS #1 formats
274 -- Pekka helped me clean up the PKCS #1 v2.1 [OAEP/PSS] code
285 -- Added DERs for missing hashes, but just the OID not the PKCS #1 v1.5 additions.
286 -- Removed PKCS #1 v1.5 from the tree since it's taking up space and you ought to use v2.1 anyways
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
DefaultCMSSignatureAlgorithmNameGenerator.java 13 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/
PKCS1Encoding.java 14 * this does your basic PKCS 1 v1.5 padding - whether or not you should be using this
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/
RSADigestSigner.java 10 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;

Completed in 802 milliseconds

<<11121314151617181920>>