/external/wpa_supplicant_8/src/tls/ |
pkcs8.c | 2 * PKCS #8 (Private-key information syntax) 27 /* PKCS #8, Chapter 6 */ 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 34 "header (SEQUENCE); assume PKCS #8 not used"); 43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 44 "class %d tag 0x%x; assume PKCS #8 not used", 54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 63 "PKCS #8 not used") [all...] |
pkcs5.c | 2 * PKCS #5 (Password-based Encryption) 36 oid->oid[4] == 1 /* pkcs */ && 37 oid->oid[5] == 5 /* pkcs-5 */ && 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " 66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 69 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption " 75 * PKCS#5, Section 8 84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " 97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " 105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt" [all...] |
pkcs5.h | 2 * PKCS #5 (Password-based Encryption)
|
pkcs8.h | 2 * PKCS #8 (Private-key information syntax)
|
pkcs1.c | 2 * PKCS #1 (RSA Encryption) 24 * PKCS #1 v1.5, 8.1: 34 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 57 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 68 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " 120 /* Strip PKCS #1 header */ 139 * PKCS #1 v1.5, 8.1: 176 /* PKCS #1 v1.5, 8.1: At least eight octets long PS */ 190 /* Strip PKCS #1 header */
|
pkcs1.h | 2 * PKCS #1 (RSA Encryption)
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 0 /* PKCS Header Info */ 3 /* ===> PKCS #1 -- RSA Cryptography <=== */ 8 LTC_PKCS_1_EMSA = 1, /* Block type 1 (PKCS #1 v1.5 signature padding) */ 9 LTC_PKCS_1_EME = 2 /* Block type 2 (PKCS #1 v1.5 encryption padding) */ 14 LTC_PKCS_1_V1_5 = 1, /* PKCS #1 v1.5 padding (\sa ltc_pkcs_1_v1_5_blocks) */ 15 LTC_PKCS_1_OAEP = 2, /* PKCS #1 v2.0 encryption padding */ 16 LTC_PKCS_1_PSS = 3 /* PKCS #1 v2.1 signature padding */ 70 /* ===> PKCS #5 -- Password Based Cryptography <=== */
|
/libcore/luni/src/main/java/java/security/spec/ |
package.html | 10 (1) PKCS#1 RSA encryption standard; 12 (3) PKCS#8 private key information standard.
|
PKCS8EncodedKeySpec.java | 22 * in the PKCS#8 standard. 52 * @return the string "PKCS#8". 55 return "PKCS#8";
|
RSAPrivateKeySpec.java | 26 * href="http://www.rsa.com/rsalabs/pubs/PKCS/html/pkcs-1.html">PKCS #1 v2.1</a>
|
RSAPublicKeySpec.java | 26 * href="http://www.rsa.com/rsalabs/pubs/PKCS/html/pkcs-1.html">PKCS #1 v2.1</a>
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
package.html | 7 <li>PKCS#3 Diffie-Hellman Key Agreement standard; 9 <li>PKCS#5 Password-Based Cryptography standard.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/ |
AsymmetricKeyInfoConverter.java | 7 import org.bouncycastle.asn1.pkcs.PrivateKeyInfo;
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 1 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and 4 # This example uses following PKCS#11 objects: 18 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module 28 # use OpenSSL PKCS#11 engine for this network
|
wpa2-eap-ccmp.conf | 14 private_key_passwd="PKCS#12 passhrase"
|
/libcore/luni/src/main/java/javax/crypto/interfaces/ |
package.html | 5 Diffie-Hellman (DH) key agreement's algorithm as specified by PKCS#3.
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-rsa.c | 35 /* First, check for possible PKCS #8 encoding */ 41 /* Try to parse as encrypted PKCS #8 */ 47 /* Not PKCS#8, so try to import PKCS #1 encoded RSA private key */ 48 wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private "
|
/external/openssh/ |
ssh-pkcs11-helper.0 | 4 ssh-pkcs11-helper - ssh-agent helper program for PKCS#11 support 11 PKCS#11 token.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
CMSAttributes.java | 4 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
|
/external/chromium_org/net/data/ssl/scripts/ |
generate-android-test-keys.sh | 10 # These are test RSA / DSA / ECDSA private keys in PKCS#8 format, as well 20 # Generate a single 2048-bits RSA private key in PKCS#8 format. 26 # Generate a 2048-bits DSA private key in PKCS#8 format, 45 # Generate an ECDSA private key, in PKCS#8 format,
|
/libcore/luni/src/main/java/java/security/interfaces/ |
package.html | 9 (1) Keys for the RSA asymmetric encryption algorithm using the PKCS#1 standard;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PKCSObjectIdentifiers.java | 1 package org.bouncycastle.asn1.pkcs; 8 // pkcs-1 OBJECT IDENTIFIER ::= { 9 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } 32 // pkcs-3 OBJECT IDENTIFIER ::= { 33 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 3 } 39 // pkcs-5 OBJECT IDENTIFIER ::= { 40 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } 100 // pkcs-7 OBJECT IDENTIFIER ::= { 101 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 7 } 112 // pkcs-9 OBJECT IDENTIFIER ::= [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
BCRSAPublicKey.java | 9 import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers; 49 org.bouncycastle.asn1.pkcs.RSAPublicKey pubKey = org.bouncycastle.asn1.pkcs.RSAPublicKey.getInstance(info.parsePublicKey()); 92 return KeyUtil.getEncodedSubjectPublicKeyInfo(new AlgorithmIdentifier(PKCSObjectIdentifiers.rsaEncryption, DERNull.INSTANCE), new org.bouncycastle.asn1.pkcs.RSAPublicKey(getModulus(), getPublicExponent()));
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_encrypt_key.c | 15 RSA PKCS #1 encryption, Tom St Denis and Andreas Lange 21 (PKCS #1 v2.0) OAEP pad then encrypt 85 /* PKCS #1 v1.5 pad the key */ 94 /* rsa exptmod the OAEP or PKCS #1 v1.5 pad */
|
/external/dropbear/libtomcrypt/notes/ |
tech0005.txt | 12 The following build with GCC 3.4.4 on an AMD64 box gets you AES, CTR mode, SHA-256, HMAC, Yarrow, full RSA PKCS #1, PKCS #5 and ASN.1 DER in
|