/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
KeyUsage.java | 8 * The KeyUsage object. 10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } 12 * KeyUsage ::= BIT STRING { 24 public class KeyUsage 39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs 41 if (obj instanceof KeyUsage) 43 return (KeyUsage)obj; 47 return new KeyUsage(DERBitString.getInstance(obj)); 53 public static KeyUsage fromExtensions(Extensions extensions) 55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage)) [all...] |
X509Extensions.java | 39 public static final ASN1ObjectIdentifier KeyUsage = new ASN1ObjectIdentifier("2.5.29.15");
|
/system/tpm/attestation/common/ |
print_common_proto.h | 30 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size); 31 std::string GetProtoDebugString(KeyUsage value);
|
mock_tpm_utility.h | 47 KeyUsage,
|
tpm_utility.h | 58 KeyUsage key_usage,
|
tpm_utility_v1.h | 49 KeyUsage key_usage,
|
print_common_proto.cc | 42 std::string GetProtoDebugString(KeyUsage value) { 46 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size) {
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
CsrUtil.java | 9 import org.bouncycastle.asn1.x509.KeyUsage; 78 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 79 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign)); 146 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 147 | KeyUsage.keyEncipherment)) [all...] |
SslUtil.java | 27 import org.bouncycastle.asn1.x509.KeyUsage; 160 // addition the keyUsage extension of the candidate issuer (if present) 164 // - the KeyUsage extension permits cert signing (KeyUsage.keyCertSign); 171 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 172 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
|
/system/tpm/attestation/server/ |
key_store.h | 66 KeyUsage key_usage,
|
mock_key_store.h | 47 KeyUsage key_usage,
|
pkcs11_key_store.h | 64 KeyUsage key_usage,
|
attestation_service.h | 232 KeyUsage key_usage,
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test_import.go | 36 KeyUsage: x509.KeyUsageCertSign,
|
x509.go | 361 // KeyUsage represents the set of actions that are valid for a given key. It's 362 // a bitmap of the KeyUsage* constants. 363 type KeyUsage int 366 KeyUsageDigitalSignature KeyUsage = 1 << iota 479 KeyUsage KeyUsage 618 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 { 946 return nil, errors.New("x509: trailing data after X.509 KeyUsage") 955 out.KeyUsage = KeyUsage(usage [all...] |
verify.go | 132 // KeyUsage specifies which Extended Key Usage values are acceptable. 172 // KeyUsage status flags are ignored. From Engineering Security, Peter 181 // the order of the bit flags in the keyUsage due to confusion over 182 // encoding endianness, essentially setting a random keyUsage in 186 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test_import.go | 36 KeyUsage: x509.KeyUsageCertSign,
|
x509.go | 361 // KeyUsage represents the set of actions that are valid for a given key. It's 362 // a bitmap of the KeyUsage* constants. 363 type KeyUsage int 366 KeyUsageDigitalSignature KeyUsage = 1 << iota 479 KeyUsage KeyUsage 618 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 { 946 return nil, errors.New("x509: trailing data after X.509 KeyUsage") 955 out.KeyUsage = KeyUsage(usage [all...] |
verify.go | 132 // KeyUsage specifies which Extended Key Usage values are acceptable. 172 // KeyUsage status flags are ignored. From Engineering Security, Peter 181 // the order of the bit flags in the keyUsage due to confusion over 182 // encoding endianness, essentially setting a random keyUsage in 186 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, 137 template.KeyUsage |= x509.KeyUsageCertSign
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, 137 template.KeyUsage |= x509.KeyUsageCertSign
|
/system/tpm/attestation/client/ |
main.cc | 139 KeyUsage usage; 389 KeyUsage usage) {
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 27 import com.android.org.bouncycastle.asn1.x509.KeyUsage; 315 private int keyUsage; 362 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */ 363 public Builder keyUsage(int keyUsage) { 364 this.keyUsage = keyUsage; 568 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca, 626 int keyUsage, 674 if (keyUsage != 0) [all...] |
/libcore/luni/src/test/java/libcore/javax/crypto/ |
CipherTest.java | 19 import com.android.org.bouncycastle.asn1.x509.KeyUsage; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 58 import org.bouncycastle.asn1.x509.KeyUsage; 78 private boolean[] keyUsage; 116 keyUsage = new boolean[(length < 9) ? 9 : length]; 120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; 125 keyUsage = null; 130 throw new CertificateParsingException("cannot construct KeyUsage: " + e); 325 return keyUsage; 505 if (oid.equals(Extension.keyUsage) 700 else if (oid.equals(Extension.keyUsage)) 702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl) [all...] |