HomeSort by relevance Sort by last modified time
    Searched refs:pem (Results 1 - 25 of 186) sorted by null

1 2 3 4 5 6 7 8

  /system/sepolicy/
keys.conf 4 # name it after the base file name of the pem file.
12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem
15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem
18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem
22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
  /external/wpa_supplicant_8/hs20/server/ca/
ocsp-req.sh 3 for i in *.pem; do
5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888
    [all...]
ocsp-update-cache.sh 5 -CAfile ca.pem \
6 -verify_other demoCA/cacert.pem \
7 -issuer demoCA/cacert.pem \
8 -cert server.pem \
ocsp-responder-ica.sh 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/cacert.pem -resp_no_certs -text
ocsp-responder.sh 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -text
setup.sh 101 if [ -e rootCA/private/cakey.pem ]; then
105 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key"
107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate"
108 $OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create rootCA DER"
122 if [ -e demoCA/private/cakey.pem ]; then
126 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail "Failed to generate Intermediate CA private key
    [all...]
  /device/google/dragon/sepolicy/
keys.conf 2 ALL : device/google/dragon/sepolicy/certs/app.x509.pem
  /device/google/marlin/sepolicy/
keys.conf 2 ALL : device/google/marlin/sepolicy/certs/app.x509.pem
  /device/google/marlin/sepolicy/verizon/
keys.conf 2 ALL : device/google/marlin/sepolicy/verizon/verizon.x509.pem
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/util/io/pem/
PemObjectGenerator.java 1 package org.bouncycastle.util.io.pem;
4 * Base interface for generators of PEM objects.
9 * Generate a PEM object.
PemObjectParser.java 1 package org.bouncycastle.util.io.pem;
6 * Base interface for parsers to convert PEM objects into specific objects.
11 * Parse an object out of the PEM object passed in.
13 * @param obj the PEM object containing the details for the specific object.
14 * @return a specific object represented by the PEM object.
PemGenerationException.java 1 package org.bouncycastle.util.io.pem;
6 * Exception thrown on failure to generate a PEM object.
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
generate-client-cert-chain.sh 29 -keyout private/ca.key.pem \
30 -out certs/ca.cert.pem
44 -keyout intermediate/private/intermediate.key.pem \
45 -out intermediate/csr/intermediate.csr.pem
54 -in intermediate/csr/intermediate.csr.pem \
55 -out intermediate/certs/intermediate.cert.pem
61 -keyout user.key.pem \
64 -out user.csr.pem
73 -in user.csr.pem \
74 -out user.cert.pem
    [all...]
  /external/boringssl/src/crypto/pem/
pem_x509.c 61 #include <openssl/pem.h>
pem_xaux.c 61 #include <openssl/pem.h>
  /external/conscrypt/src/test/java/org/conscrypt/
ChainStrengthAnalyzerTest.java 30 //-newkey rsa:2048 -sha256 -keyout k.pem -out good.pem
54 //openssl ecparam -genkey -name prime256v1 -out eckey.pem && \
56 //-newkey ec:eckey.pem -sha256 -keyout k.pem -out good.pem
71 //openssl dsaparam -genkey 1024 -out dsakey.pem && \
73 //-newkey dsa:dsakey.pem -sha256 -keyout k.pem -out good.pem
    [all...]
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 21 if [ ! -f "$DIR/privkey.pem" ]; then
22 openssl genrsa -out "$DIR/privkey.pem" 2048
25 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch > /tmp/cert-rsa-req.pem
26 openssl req -in /tmp/cert-rsa-req.pem -pubkey -noout | openssl rsa -pubin -pubout -outform der > "$DIR/cert-rsa-pubkey.der"
27 openssl x509 -extfile "$DIR/default.cnf" -days 3650 -extensions usr_cert -req -signkey "$DIR/privkey.pem" -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > "$DIR/cert-rsa.der"
28 rm /tmp/cert-rsa-req.pem
40 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions keyUsage_extraLong_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-keyUsage-extraLong.der
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.cc 24 X509* CertificateUtil::X509FromPEM(std::string pem) {
25 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size());
48 std::string pem(data, data_size);
51 return pem;
54 EVP_PKEY* CertificateUtil::PKEYFromPEM(std::string pem,
56 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size());
73 std::string pem(data, data_size);
76 return pem;
    [all...]
certificateutil.h 30 // Reads an X509 certificate from a PEM encoded string.
31 // @param pem the PEM encoded string
34 static X509* X509FromPEM(std::string pem);
36 // Converts an X509 certificate to a PEM encoded string.
38 // @return a PEM encoded string of the given certificate
41 // Loads a private key from a PEM encoded string.
42 // @param pem the PEM encoded string
46 static EVP_PKEY* PKEYFromPEM(std::string pem,
    [all...]
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 25 // Tests reading an X509 certificate from a PEM encoded string.
27 std::string pem = "-----BEGIN CERTIFICATE-----\n" local
41 X509* x509 = CertificateUtil::X509FromPEM(pem);
51 // Tests converting an X509 certificate to a PEM encoded string.
94 std::string pem = CertificateUtil::X509ToPEM(x509); local
111 ASSERT_EQ(expected, pem);
114 // Tests reading a private key from a PEM encoded string.
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" local
135 EVP_PKEY* pkey = CertificateUtil::PKEYFromPEM(pem, "testing");
145 // Tests converting a private key to a PEM encoded string
151 std::string pem = CertificateUtil::PKEYToPEM(pkey, "testing"); local
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/tools/
crmfdump.py 2 # Read ASN.1/PEM X.509 CRMF request on stdin, parse into
5 from pyasn1_modules import rfc2511, pem
10 $ cat crmf.pem | %s""" % sys.argv[0])
15 substrate = pem.readBase64FromFile(sys.stdin)
ocspreqdump.py 3 # Read ASN.1/PEM X.509 CRMF request on stdin, parse into
7 from pyasn1_modules import rfc2560, pem
12 $ cat ocsp-request.pem | %s""" % sys.argv[0])
17 substrate = pem.readBase64FromFile(sys.stdin)
ocsprspdump.py 3 # Read ASN.1/PEM OCSP response on stdin, parse into
7 from pyasn1_modules import rfc2560, pem
12 $ cat ocsp-response.pem | %s""" % sys.argv[0])
17 substrate = pem.readBase64FromFile(sys.stdin)
  /external/vboot_reference/scripts/image_signing/
insert_au_publickey.sh 19 Usage: $PROG <image.bin> <au_public_key.pem>
20 Installs the update verification public key <au_public_key.pem> to <image.bin>.
28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem"
29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem"
30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_pem.py 7 from rsa.pem import _markers

Completed in 1387 milliseconds

1 2 3 4 5 6 7 8