Home
last modified time | relevance | path

Searched refs:PKCS (Results 1 – 25 of 169) sorted by relevance

1234567

/third_party/mbedtls/tests/suites/
Dtest_suite_pkparse.data73 Parse RSA Key #19 (PKCS#8 wrapped)
77 Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES)
81 Parse RSA Key #20.1 (PKCS#8 encrypted SHA1-3DES, wrong PW)
85 Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW)
89 Parse RSA Key #21 (PKCS#8 encrypted SHA1-3DES, 2048-bit)
93 Parse RSA Key #21.1 (PKCS#8 encrypted SHA1-3DES, 2048-bit, wrong PW)
97 Parse RSA Key #21.2 (PKCS#8 encrypted SHA1-3DES, 2048-bit, no PW)
101 Parse RSA Key #22 (PKCS#8 encrypted SHA1-3DES, 4096-bit)
105 Parse RSA Key #22.1 (PKCS#8 encrypted SHA1-3DES, 4096-bit, wrong PW)
109 Parse RSA Key #22.2 (PKCS#8 encrypted SHA1-3DES, 4096-bit, no PW)
[all …]
Dtest_suite_cipher.padding.data48 Check PKCS padding #1 (correct)
52 Check PKCS padding #2 (correct)
56 Check PKCS padding #3 (correct)
60 Check PKCS padding #4 (correct)
64 Check PKCS padding #5 (null padding)
68 Check PKCS padding #6 (too few padding bytes)
72 Check PKCS padding #7 (non-uniform padding bytes #1)
76 Check PKCS padding #7 (non-uniform padding bytes #2)
80 Check PKCS padding #7 (non-uniform padding bytes #3)
84 Check PKCS padding #7 (non-uniform padding bytes #4)
[all …]
Dtest_suite_pkcs12.data1 PKCS#12 derive key : MD5: Zero length password and hash
5 PKCS#12 derive key: MD5: NULL password and hash
9 PKCS#12 derive key: MD5: Zero length password
13 PKCS#12 derive key: MD5: NULL password
17 PKCS#12 derive key: MD5: Invalid length NULL password
21 PKCS#12 derive key: MD5: Zero length salt
25 PKCS#12 derive key: MD5: NULL salt
29 PKCS#12 derive key: MD5: Invalid length NULL salt
33 PKCS#12 derive key: MD5: Valid password and salt
/third_party/openssl/doc/man1/
Dopenssl-pkcs8.pod.in6 openssl-pkcs8 - PKCS#8 format private key conversion command
35 This command processes private keys in PKCS#8 format. It can handle
36 both unencrypted PKCS#8 PrivateKeyInfo format and EncryptedPrivateKeyInfo
37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms.
49 Normally a PKCS#8 private key is expected on input and a private key will be
51 reversed: it reads a private key and writes a PKCS#8 format key.
58 If a key is being converted from PKCS#8 form (i.e. the B<-topk8> option is
59 not used) then the input file must be in PKCS#8 format. An encrypted
63 unencrypted private key in PKCS#8 format. If the B<-traditional> option is
71 PKCS#8 format using the specified encryption parameters unless B<-nocrypt>
[all …]
Dopenssl-pkcs12.pod.in6 openssl-pkcs12 - PKCS#12 file command
25 PKCS#12 input (parsing) options:
46 PKCS#12 output (export) options:
73 This command allows PKCS#12 files (sometimes referred to as
74 PFX files) to be created and parsed. PKCS#12 files are used by several
79 There are a lot of options the meaning of some depends of whether a PKCS#12 file
80 is being created or parsed. By default a PKCS#12 file is parsed.
81 A PKCS#12 file can be created by using the B<-export> option (see below).
82 The PKCS#12 export encryption and MAC options such as B<-certpbe> and B<-iter>
85 PKCS#12 input are relevant only when the B<-export> option is not given.
[all …]
Dopenssl-crl2pkcs7.pod.in6 openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates
23 certificates and converts them into a PKCS#7 degenerate "certificates
41 The output format of the PKCS#7 object; the default is B<PEM>.
51 Specifies the output filename to write the PKCS#7 structure to or standard
57 All certificates in the file will be added to the PKCS#7 structure. This
72 Create a PKCS#7 structure from a certificate and CRL:
76 Creates a PKCS#7 structure in DER format with no CRL from several
84 The output file is a PKCS#7 signed data structure containing no signers and
Dopenssl-pkcs7.pod.in10 openssl-pkcs7 - PKCS#7 command
28 This command processes PKCS#7 files. Note that it only understands PKCS#7
45 The data is a PKCS#7 Version 1.5 structure.
73 Don't output the encoded version of the PKCS#7 structure (or certificates
84 Convert a PKCS#7 file from PEM to DER:
/third_party/openssl/doc/man3/
DPKCS12_add_friendlyname_asc.pod7 PKCS#12 safeBag
24 PKCS12_add_friendlyname_asc() adds an ASCII string representation of the PKCS#9
25 friendlyName attribute to a PKCS#12 safeBag.
27 PKCS12_add_friendlyname_utf8() adds a UTF-8 string representation of the PKCS#9
28 friendlyName attribute to a PKCS#12 safeBag.
30 PKCS12_add_friendlyname_uni() adds a Unicode string representation of the PKCS#9
31 friendlyName attribute to a PKCS#12 safeBag.
DPKCS12_pack_p7encdata.pod5 PKCS12_pack_p7encdata, PKCS12_pack_p7encdata_ex - Pack a set of PKCS#12 safeBags
6 into a PKCS#7 encrypted data object
22 PKCS12_pack_p7encdata() generates a PKCS#7 ContentInfo object of encrypted-data
24 a PKCS#12 or PKCS#5 password based encryption algorithm, or a cipher algorithm.
25 If a cipher algorithm is passed, the PKCS#5 PBES2 algorithm will be used with
DPKCS12_init.pod5 PKCS12_init, PKCS12_init_ex - Create a new empty PKCS#12 structure
16 PKCS12_init() creates an empty PKCS#12 structure. Any PKCS#7 authSafes added
17 to this structure are enclosed first within a single PKCS#7 contentInfo
20 PKCS12_init_ex() creates an empty PKCS#12 structure and assigns the supplied
DPKCS12_add_cert.pod6 PKCS12_add_secret - Add an object to a set of PKCS#12 safeBags
29 PKCS12_add_cert() creates a PKCS#12 certBag containing the supplied
30 certificate and adds this to the set of PKCS#12 safeBags.
32 PKCS12_add_key() creates a PKCS#12 keyBag (unencrypted) or a pkcs8shroudedKeyBag
33 (encrypted) containing the supplied B<EVP_PKEY> and adds this to the set of PKCS#12
42 PKCS12_add_secret() creates a PKCS#12 secretBag with an OID corresponding to
44 This is then added to the set of PKCS#12 safeBags.
DPKCS12_gen_mac.pod6 PKCS12_verify_mac - Functions to create and manipulate a PKCS#12 structure
23 PKCS12_gen_mac() generates an HMAC over the entire PKCS#12 object using the
26 PKCS12_verify_mac() verifies the PKCS#12 object's HMAC using the supplied
29 PKCS12_setup_mac() sets the MAC part of the PKCS#12 structure with the supplied
32 PKCS12_set_mac() sets the MAC and MAC parameters into the PKCS#12 object.
42 If I<iter> is 1 then an iteration count will be omitted from the PKCS#12
Dd2i_PKCS8PrivateKey_bio.pod7 i2d_PKCS8PrivateKey_nid_bio, i2d_PKCS8PrivateKey_nid_fp - PKCS#8 format private key functions
34 The PKCS#8 functions encode and decode private keys in PKCS#8 format using both
35 PKCS#5 v1.5 and PKCS#5 v2.0 password based encryption algorithms.
DPKCS12_add_localkeyid.pod5 PKCS12_add_localkeyid - Add the localKeyId attribute to a PKCS#12 safeBag
16 PKCS12_add_localkeyid() adds an octet string representation of the PKCS#9
17 localKeyId attribute to a PKCS#12 safeBag.
DPKCS12_get_friendlyname.pod5 PKCS12_get_friendlyname - Retrieve the friendlyname attribute from a PKCS#12 safeBag
15 PKCS12_get_friendlyname() retrieves a UTF-8 string representation of the PKCS#9
16 friendlyName attribute for a PKCS#12 safeBag item.
DRSA_public_encrypt.pod38 PKCS #1 v1.5 padding. This currently is the most widely used mode.
44 EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty
55 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and
92 attack. This is an inherent weakness in the PKCS #1 v1.5 padding
97 SSL, PKCS #1 v2.0
DPKCS12_SAFEBAG_get0_attrs.pod6 - Retrieve attributes from a PKCS#12 safeBag
20 PKCS#12 safeBag. I<bag> is the B<PKCS12_SAFEBAG> to retrieve the attributes from.
28 PKCS#12 safeBag, which could be empty.
DRSA_padding_add_PKCS1_type_1.pod81 PKCS #1 v2.0 EMSA-PKCS1-v1_5 (PKCS #1 v1.5 block type 1); used for signatures
85 PKCS #1 v2.0 EME-PKCS1-v1_5 (PKCS #1 v1.5 block type 2)
89 PKCS #1 v2.0 EME-OAEP
126 padding oracle attack. This is an inherent weakness in the PKCS #1
DPKCS7_sign.pod6 - create a PKCS#7 signedData structure
20 PKCS7_sign_ex() creates and returns a PKCS#7 signedData structure.
23 in the PKCS#7 structure (for example any intermediate CAs in the chain).
54 The signedData structure includes several PKCS#7 authenticatedAttributes
55 including the signing time, the PKCS#7 content type and the supported list of
92 PKCS#7 structure is output.
DPKCS7_decrypt.pod5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure
15 PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData
23 to locate the appropriate (of possible several) recipients in the PKCS#7 structure.
DOSSL_ENCODER_to_bio.pod60 To encode a pkey as PKCS#8 with PEM format into a bio:
64 const char *structure = "PrivateKeyInfo"; /* PKCS#8 structure */
84 To encode a pkey as PKCS#8 with DER format encrypted with
89 const char *structure = "PrivateKeyInfo"; /* PKCS#8 structure */
DPKCS7_type_is_other.pod5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure
15 PKCS7_type_is_other() returns the whether the content type of a PKCS#7 envelopedData
/third_party/fsverity-utils/man/
Dfsverity.1.md135 file that contains the signature in PKCS#7 DER format, e.g. as produced by
156 be written to *OUT_SIGFILE* in PKCS#7 DER format.
158 The private key can be specified either by key file or by PKCS#11 token. To use
159 a key file, provide **\-\-key** and optionally **\-\-cert**. To use a PKCS#11
161 optionally **\-\-pkcs11-keyid**. PKCS#11 token support is unavailable when
176 the certificate, or if a PKCS#11 token is used.
183 option is required when not using a PKCS#11 token.
192 : Specifies the path to the OpenSSL PKCS#11 engine file. This typically will
194 PKCS#11 token.
197 : Specifies the key identifier in the form of a PKCS#11 URI. If not provided,
[all …]
/third_party/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_init/
D00_Descriptions.txt2 tpmtoken_init initializes the PKCS#11 store
4 tpmtoken_init re-initializes the PKCS#11 store
6 tpmtoken_init re-initializes the PKCS#11 store with -y flag
/third_party/openssl/doc/man7/
DEVP_KDF-PKCS12KDF.pod5 EVP_KDF-PKCS12KDF - The PKCS#12 EVP_KDF implementation
9 Support for computing the B<PKCS#12> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-PKCS12KDF algorithm implements the PKCS#12 password-based key
13 derivation function, as described in appendix B of RFC 7292 (PKCS #12:

1234567