HomeSort by relevance Sort by last modified time
    Searched full:keyusage (Results 1 - 25 of 134) sorted by null

1 2 3 4 5 6

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
KeyUsage.java 8 * The KeyUsage object.
10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
12 * KeyUsage ::= BIT STRING {
24 public class KeyUsage
39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs
41 if (obj instanceof KeyUsage)
43 return (KeyUsage)obj;
47 return new KeyUsage(DERBitString.getInstance(obj));
53 public static KeyUsage fromExtensions(Extensions extensions)
55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage))
    [all...]
  /external/curl/tests/certs/
EdelCurlRoot-ca.prm 16 keyUsage = critical,keyCertSign,cRLSign
Server-localhost-sv.prm 4 keyUsage = keyEncipherment,digitalSignature,keyAgreement
Server-localhost.nn-sv.prm 4 keyUsage = keyEncipherment,digitalSignature,keyAgreement
Server-localhost0h-sv.prm 5 keyUsage = keyEncipherment,digitalSignature,keyAgreement
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
AlgorithmChecker.java 206 boolean[] keyUsage = x509Cert.getKeyUsage();
207 if (keyUsage != null && keyUsage.length < 9) {
209 "incorrect KeyUsage extension",
213 if (keyUsage != null) {
217 if (keyUsage[0] || keyUsage[1] || keyUsage[5] || keyUsage[6]) {
218 // keyUsage[0]: KeyUsage.digitalSignatur
    [all...]
KeyChecker.java 37 * keyCertSign bit is set in the keyUsage extension in an intermediate CA
98 * Checks that keyUsage and target constraints are satisfied by
133 // the index of keyCertSign in the boolean KeyUsage array
151 // getKeyUsage returns null if the KeyUsage extension is not present
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
CsrUtil.java 9 import org.bouncycastle.asn1.x509.KeyUsage;
78 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature
79 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
146 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature
147 | KeyUsage.keyEncipherment))
    [all...]
SslUtil.java 27 import org.bouncycastle.asn1.x509.KeyUsage;
160 // addition the keyUsage extension of the candidate issuer (if present)
164 // - the KeyUsage extension permits cert signing (KeyUsage.keyCertSign);
171 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature
172 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
  /system/tpm/attestation/common/
print_common_proto.h 30 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size);
31 std::string GetProtoDebugString(KeyUsage value);
interface.proto 38 optional KeyUsage key_usage = 3;
70 optional KeyUsage key_usage = 3;
131 optional KeyUsage key_usage = 4;
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
ca.conf 117 keyUsage = critical, digitalSignature, cRLSign, keyCertSign
124 keyUsage = critical, digitalSignature, cRLSign, keyCertSign
133 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
143 keyUsage = critical, digitalSignature, keyEncipherment
155 keyUsage = critical, digitalSignature
  /libcore/ojluni/src/main/java/sun/security/x509/
NetscapeCertTypeExtension.java 297 * as it maps to the KeyUsage extension.
299 * of the KeyUsage extension as an array of booleans.
302 KeyUsageExtension keyUsage = new KeyUsageExtension();
309 keyUsage.set(keyUsage.DIGITAL_SIGNATURE, val);
312 keyUsage.set(keyUsage.KEY_ENCIPHERMENT, val);
317 keyUsage.set(keyUsage.KEY_CERTSIGN, val);
319 return keyUsage.getBits()
    [all...]
KeyUsageExtension.java 55 public static final String IDENT = "x509.info.extensions.KeyUsage";
59 public static final String NAME = "KeyUsage";
212 + " CertAttrSet:KeyUsage.");
241 + " CertAttrSet:KeyUsage.");
269 + " CertAttrSet:KeyUsage.");
275 * Returns a printable representation of the KeyUsage.
278 String s = super.toString() + "KeyUsage [\n";
  /libcore/ojluni/src/main/java/sun/security/validator/
EndEntityChecker.java 210 boolean[] keyUsage = cert.getKeyUsage();
211 if (keyUsage == null) {
214 return (keyUsage.length > bit) && keyUsage[bit];
228 ("KeyUsage does not allow digital signatures",
265 ("KeyUsage does not allow key encipherment",
271 ("KeyUsage does not allow digital signatures",
277 ("KeyUsage does not allow key agreement",
320 ("KeyUsage does not allow digital signatures",
359 ("KeyUsage does not allow digital signatures"
    [all...]
  /external/wpa_supplicant_8/hs20/server/ca/
openssl-root.cnf 106 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
114 keyUsage = critical, cRLSign, keyCertSign
124 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
openssl.cnf 119 keyUsage = critical, cRLSign, keyCertSign
129 keyUsage = critical, keyEncipherment
179 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
200 keyUsage = critical, keyEncipherment
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test_import.go 36 KeyUsage: x509.KeyUsageCertSign,
verify.go 132 // KeyUsage specifies which Extended Key Usage values are acceptable.
172 // KeyUsage status flags are ignored. From Engineering Security, Peter
181 // the order of the bit flags in the keyUsage due to confusion over
182 // encoding endianness, essentially setting a random keyUsage in
186 // keyUsage, and a keyUsage containing a flag indicating that the RSA
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test_import.go 36 KeyUsage: x509.KeyUsageCertSign,
verify.go 132 // KeyUsage specifies which Extended Key Usage values are acceptable.
172 // KeyUsage status flags are ignored. From Engineering Security, Peter
181 // the order of the bit flags in the keyUsage due to confusion over
182 // encoding endianness, essentially setting a random keyUsage in
186 // keyUsage, and a keyUsage containing a flag indicating that the RSA
  /system/tpm/attestation/server/
mock_key_store.h 47 KeyUsage key_usage,
  /libcore/support/src/test/java/tests/resources/x509/
default.cnf 181 keyUsage = critical, decipherOnly, keyAgreement
184 keyUsage=ASN1:FORMAT:BITLIST,BITSTRING:0,1,2,3,4,5,6,7,8,9,10
188 keyUsage = encipherOnly, keyEncipherment, dataEncipherment, keyCertSign, cRLSign, cRLSign, keyEncipherment, dataEncipherment, keyCertSign, cRLSign
218 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
282 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 58 import org.bouncycastle.asn1.x509.KeyUsage;
78 private boolean[] keyUsage;
116 keyUsage = new boolean[(length < 9) ? 9 : length];
120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0;
125 keyUsage = null;
130 throw new CertificateParsingException("cannot construct KeyUsage: " + e);
325 return keyUsage;
505 if (oid.equals(Extension.keyUsage)
700 else if (oid.equals(Extension.keyUsage))
702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl)
    [all...]
  /libcore/support/src/test/java/libcore/java/security/
TestKeyStore.java 27 import com.android.org.bouncycastle.asn1.x509.KeyUsage;
315 private int keyUsage;
362 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */
363 public Builder keyUsage(int keyUsage) {
364 this.keyUsage = keyUsage;
568 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca,
626 int keyUsage,
674 if (keyUsage != 0)
    [all...]

Completed in 1108 milliseconds

1 2 3 4 5 6