Searched refs:PKCS (Results 1 – 25 of 169) sorted by relevance
1234567
/third_party/mbedtls/tests/suites/ |
D | test_suite_pkparse.data | 73 Parse RSA Key #19 (PKCS#8 wrapped) 77 Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES) 81 Parse RSA Key #20.1 (PKCS#8 encrypted SHA1-3DES, wrong PW) 85 Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW) 89 Parse RSA Key #21 (PKCS#8 encrypted SHA1-3DES, 2048-bit) 93 Parse RSA Key #21.1 (PKCS#8 encrypted SHA1-3DES, 2048-bit, wrong PW) 97 Parse RSA Key #21.2 (PKCS#8 encrypted SHA1-3DES, 2048-bit, no PW) 101 Parse RSA Key #22 (PKCS#8 encrypted SHA1-3DES, 4096-bit) 105 Parse RSA Key #22.1 (PKCS#8 encrypted SHA1-3DES, 4096-bit, wrong PW) 109 Parse RSA Key #22.2 (PKCS#8 encrypted SHA1-3DES, 4096-bit, no PW) [all …]
|
D | test_suite_cipher.padding.data | 48 Check PKCS padding #1 (correct) 52 Check PKCS padding #2 (correct) 56 Check PKCS padding #3 (correct) 60 Check PKCS padding #4 (correct) 64 Check PKCS padding #5 (null padding) 68 Check PKCS padding #6 (too few padding bytes) 72 Check PKCS padding #7 (non-uniform padding bytes #1) 76 Check PKCS padding #7 (non-uniform padding bytes #2) 80 Check PKCS padding #7 (non-uniform padding bytes #3) 84 Check PKCS padding #7 (non-uniform padding bytes #4) [all …]
|
D | test_suite_pkcs12.data | 1 PKCS#12 derive key : MD5: Zero length password and hash 5 PKCS#12 derive key: MD5: NULL password and hash 9 PKCS#12 derive key: MD5: Zero length password 13 PKCS#12 derive key: MD5: NULL password 17 PKCS#12 derive key: MD5: Invalid length NULL password 21 PKCS#12 derive key: MD5: Zero length salt 25 PKCS#12 derive key: MD5: NULL salt 29 PKCS#12 derive key: MD5: Invalid length NULL salt 33 PKCS#12 derive key: MD5: Valid password and salt
|
/third_party/openssl/doc/man1/ |
D | openssl-pkcs8.pod.in | 6 openssl-pkcs8 - PKCS#8 format private key conversion command 35 This command processes private keys in PKCS#8 format. It can handle 36 both unencrypted PKCS#8 PrivateKeyInfo format and EncryptedPrivateKeyInfo 37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms. 49 Normally a PKCS#8 private key is expected on input and a private key will be 51 reversed: it reads a private key and writes a PKCS#8 format key. 58 If a key is being converted from PKCS#8 form (i.e. the B<-topk8> option is 59 not used) then the input file must be in PKCS#8 format. An encrypted 63 unencrypted private key in PKCS#8 format. If the B<-traditional> option is 71 PKCS#8 format using the specified encryption parameters unless B<-nocrypt> [all …]
|
D | openssl-pkcs12.pod.in | 6 openssl-pkcs12 - PKCS#12 file command 25 PKCS#12 input (parsing) options: 46 PKCS#12 output (export) options: 73 This command allows PKCS#12 files (sometimes referred to as 74 PFX files) to be created and parsed. PKCS#12 files are used by several 79 There are a lot of options the meaning of some depends of whether a PKCS#12 file 80 is being created or parsed. By default a PKCS#12 file is parsed. 81 A PKCS#12 file can be created by using the B<-export> option (see below). 82 The PKCS#12 export encryption and MAC options such as B<-certpbe> and B<-iter> 85 PKCS#12 input are relevant only when the B<-export> option is not given. [all …]
|
D | openssl-crl2pkcs7.pod.in | 6 openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates 23 certificates and converts them into a PKCS#7 degenerate "certificates 41 The output format of the PKCS#7 object; the default is B<PEM>. 51 Specifies the output filename to write the PKCS#7 structure to or standard 57 All certificates in the file will be added to the PKCS#7 structure. This 72 Create a PKCS#7 structure from a certificate and CRL: 76 Creates a PKCS#7 structure in DER format with no CRL from several 84 The output file is a PKCS#7 signed data structure containing no signers and
|
D | openssl-pkcs7.pod.in | 10 openssl-pkcs7 - PKCS#7 command 28 This command processes PKCS#7 files. Note that it only understands PKCS#7 45 The data is a PKCS#7 Version 1.5 structure. 73 Don't output the encoded version of the PKCS#7 structure (or certificates 84 Convert a PKCS#7 file from PEM to DER:
|
/third_party/openssl/doc/man3/ |
D | PKCS12_add_friendlyname_asc.pod | 7 PKCS#12 safeBag 24 PKCS12_add_friendlyname_asc() adds an ASCII string representation of the PKCS#9 25 friendlyName attribute to a PKCS#12 safeBag. 27 PKCS12_add_friendlyname_utf8() adds a UTF-8 string representation of the PKCS#9 28 friendlyName attribute to a PKCS#12 safeBag. 30 PKCS12_add_friendlyname_uni() adds a Unicode string representation of the PKCS#9 31 friendlyName attribute to a PKCS#12 safeBag.
|
D | PKCS12_pack_p7encdata.pod | 5 PKCS12_pack_p7encdata, PKCS12_pack_p7encdata_ex - Pack a set of PKCS#12 safeBags 6 into a PKCS#7 encrypted data object 22 PKCS12_pack_p7encdata() generates a PKCS#7 ContentInfo object of encrypted-data 24 a PKCS#12 or PKCS#5 password based encryption algorithm, or a cipher algorithm. 25 If a cipher algorithm is passed, the PKCS#5 PBES2 algorithm will be used with
|
D | PKCS12_init.pod | 5 PKCS12_init, PKCS12_init_ex - Create a new empty PKCS#12 structure 16 PKCS12_init() creates an empty PKCS#12 structure. Any PKCS#7 authSafes added 17 to this structure are enclosed first within a single PKCS#7 contentInfo 20 PKCS12_init_ex() creates an empty PKCS#12 structure and assigns the supplied
|
D | PKCS12_add_cert.pod | 6 PKCS12_add_secret - Add an object to a set of PKCS#12 safeBags 29 PKCS12_add_cert() creates a PKCS#12 certBag containing the supplied 30 certificate and adds this to the set of PKCS#12 safeBags. 32 PKCS12_add_key() creates a PKCS#12 keyBag (unencrypted) or a pkcs8shroudedKeyBag 33 (encrypted) containing the supplied B<EVP_PKEY> and adds this to the set of PKCS#12 42 PKCS12_add_secret() creates a PKCS#12 secretBag with an OID corresponding to 44 This is then added to the set of PKCS#12 safeBags.
|
D | PKCS12_gen_mac.pod | 6 PKCS12_verify_mac - Functions to create and manipulate a PKCS#12 structure 23 PKCS12_gen_mac() generates an HMAC over the entire PKCS#12 object using the 26 PKCS12_verify_mac() verifies the PKCS#12 object's HMAC using the supplied 29 PKCS12_setup_mac() sets the MAC part of the PKCS#12 structure with the supplied 32 PKCS12_set_mac() sets the MAC and MAC parameters into the PKCS#12 object. 42 If I<iter> is 1 then an iteration count will be omitted from the PKCS#12
|
D | d2i_PKCS8PrivateKey_bio.pod | 7 i2d_PKCS8PrivateKey_nid_bio, i2d_PKCS8PrivateKey_nid_fp - PKCS#8 format private key functions 34 The PKCS#8 functions encode and decode private keys in PKCS#8 format using both 35 PKCS#5 v1.5 and PKCS#5 v2.0 password based encryption algorithms.
|
D | PKCS12_add_localkeyid.pod | 5 PKCS12_add_localkeyid - Add the localKeyId attribute to a PKCS#12 safeBag 16 PKCS12_add_localkeyid() adds an octet string representation of the PKCS#9 17 localKeyId attribute to a PKCS#12 safeBag.
|
D | PKCS12_get_friendlyname.pod | 5 PKCS12_get_friendlyname - Retrieve the friendlyname attribute from a PKCS#12 safeBag 15 PKCS12_get_friendlyname() retrieves a UTF-8 string representation of the PKCS#9 16 friendlyName attribute for a PKCS#12 safeBag item.
|
D | RSA_public_encrypt.pod | 38 PKCS #1 v1.5 padding. This currently is the most widely used mode. 44 EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty 55 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and 92 attack. This is an inherent weakness in the PKCS #1 v1.5 padding 97 SSL, PKCS #1 v2.0
|
D | PKCS12_SAFEBAG_get0_attrs.pod | 6 - Retrieve attributes from a PKCS#12 safeBag 20 PKCS#12 safeBag. I<bag> is the B<PKCS12_SAFEBAG> to retrieve the attributes from. 28 PKCS#12 safeBag, which could be empty.
|
D | RSA_padding_add_PKCS1_type_1.pod | 81 PKCS #1 v2.0 EMSA-PKCS1-v1_5 (PKCS #1 v1.5 block type 1); used for signatures 85 PKCS #1 v2.0 EME-PKCS1-v1_5 (PKCS #1 v1.5 block type 2) 89 PKCS #1 v2.0 EME-OAEP 126 padding oracle attack. This is an inherent weakness in the PKCS #1
|
D | PKCS7_sign.pod | 6 - create a PKCS#7 signedData structure 20 PKCS7_sign_ex() creates and returns a PKCS#7 signedData structure. 23 in the PKCS#7 structure (for example any intermediate CAs in the chain). 54 The signedData structure includes several PKCS#7 authenticatedAttributes 55 including the signing time, the PKCS#7 content type and the supported list of 92 PKCS#7 structure is output.
|
D | PKCS7_decrypt.pod | 5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure 15 PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData 23 to locate the appropriate (of possible several) recipients in the PKCS#7 structure.
|
D | OSSL_ENCODER_to_bio.pod | 60 To encode a pkey as PKCS#8 with PEM format into a bio: 64 const char *structure = "PrivateKeyInfo"; /* PKCS#8 structure */ 84 To encode a pkey as PKCS#8 with DER format encrypted with 89 const char *structure = "PrivateKeyInfo"; /* PKCS#8 structure */
|
D | PKCS7_type_is_other.pod | 5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure 15 PKCS7_type_is_other() returns the whether the content type of a PKCS#7 envelopedData
|
/third_party/fsverity-utils/man/ |
D | fsverity.1.md | 135 file that contains the signature in PKCS#7 DER format, e.g. as produced by 156 be written to *OUT_SIGFILE* in PKCS#7 DER format. 158 The private key can be specified either by key file or by PKCS#11 token. To use 159 a key file, provide **\-\-key** and optionally **\-\-cert**. To use a PKCS#11 161 optionally **\-\-pkcs11-keyid**. PKCS#11 token support is unavailable when 176 the certificate, or if a PKCS#11 token is used. 183 option is required when not using a PKCS#11 token. 192 : Specifies the path to the OpenSSL PKCS#11 engine file. This typically will 194 PKCS#11 token. 197 : Specifies the key identifier in the form of a PKCS#11 URI. If not provided, [all …]
|
/third_party/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_init/ |
D | 00_Descriptions.txt | 2 tpmtoken_init initializes the PKCS#11 store 4 tpmtoken_init re-initializes the PKCS#11 store 6 tpmtoken_init re-initializes the PKCS#11 store with -y flag
|
/third_party/openssl/doc/man7/ |
D | EVP_KDF-PKCS12KDF.pod | 5 EVP_KDF-PKCS12KDF - The PKCS#12 EVP_KDF implementation 9 Support for computing the B<PKCS#12> password-based KDF through the B<EVP_KDF> 12 The EVP_KDF-PKCS12KDF algorithm implements the PKCS#12 password-based key 13 derivation function, as described in appendix B of RFC 7292 (PKCS #12:
|
1234567