/system/sepolicy/ |
keys.conf | 4 # name it after the base file name of the pem file. 12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem 15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem 18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem 22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem 23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem 24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
|
/external/wpa_supplicant_8/hs20/server/ca/ |
ocsp-req.sh | 3 for i in *.pem; do 5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888 [all...] |
ocsp-update-cache.sh | 5 -CAfile ca.pem \ 6 -verify_other demoCA/cacert.pem \ 7 -issuer demoCA/cacert.pem \ 8 -cert server.pem \
|
ocsp-responder-ica.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/cacert.pem -resp_no_certs -text
|
ocsp-responder.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -text
|
setup.sh | 101 if [ -e rootCA/private/cakey.pem ]; then 105 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key" 107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 108 $OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create rootCA DER" 122 if [ -e demoCA/private/cakey.pem ]; then 126 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail "Failed to generate Intermediate CA private key [all...] |
/device/google/dragon/sepolicy/ |
keys.conf | 2 ALL : device/google/dragon/sepolicy/certs/app.x509.pem
|
/device/google/marlin/sepolicy/ |
keys.conf | 2 ALL : device/google/marlin/sepolicy/certs/app.x509.pem
|
/device/google/marlin/sepolicy/verizon/ |
keys.conf | 2 ALL : device/google/marlin/sepolicy/verizon/verizon.x509.pem
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/util/io/pem/ |
PemObjectGenerator.java | 1 package org.bouncycastle.util.io.pem; 4 * Base interface for generators of PEM objects. 9 * Generate a PEM object.
|
PemObjectParser.java | 1 package org.bouncycastle.util.io.pem; 6 * Base interface for parsers to convert PEM objects into specific objects. 11 * Parse an object out of the PEM object passed in. 13 * @param obj the PEM object containing the details for the specific object. 14 * @return a specific object represented by the PEM object.
|
PemGenerationException.java | 1 package org.bouncycastle.util.io.pem; 6 * Exception thrown on failure to generate a PEM object.
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
generate-client-cert-chain.sh | 29 -keyout private/ca.key.pem \ 30 -out certs/ca.cert.pem 44 -keyout intermediate/private/intermediate.key.pem \ 45 -out intermediate/csr/intermediate.csr.pem 54 -in intermediate/csr/intermediate.csr.pem \ 55 -out intermediate/certs/intermediate.cert.pem 61 -keyout user.key.pem \ 64 -out user.csr.pem 73 -in user.csr.pem \ 74 -out user.cert.pem [all...] |
/external/boringssl/src/crypto/pem/ |
pem_x509.c | 61 #include <openssl/pem.h>
|
pem_xaux.c | 61 #include <openssl/pem.h>
|
/external/conscrypt/src/test/java/org/conscrypt/ |
ChainStrengthAnalyzerTest.java | 30 //-newkey rsa:2048 -sha256 -keyout k.pem -out good.pem 54 //openssl ecparam -genkey -name prime256v1 -out eckey.pem && \ 56 //-newkey ec:eckey.pem -sha256 -keyout k.pem -out good.pem 71 //openssl dsaparam -genkey 1024 -out dsakey.pem && \ 73 //-newkey dsa:dsakey.pem -sha256 -keyout k.pem -out good.pem [all...] |
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 21 if [ ! -f "$DIR/privkey.pem" ]; then 22 openssl genrsa -out "$DIR/privkey.pem" 2048 25 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch > /tmp/cert-rsa-req.pem 26 openssl req -in /tmp/cert-rsa-req.pem -pubkey -noout | openssl rsa -pubin -pubout -outform der > "$DIR/cert-rsa-pubkey.der" 27 openssl x509 -extfile "$DIR/default.cnf" -days 3650 -extensions usr_cert -req -signkey "$DIR/privkey.pem" -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > "$DIR/cert-rsa.der" 28 rm /tmp/cert-rsa-req.pem 40 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions keyUsage_extraLong_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-keyUsage-extraLong.der [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.cc | 24 X509* CertificateUtil::X509FromPEM(std::string pem) { 25 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size()); 48 std::string pem(data, data_size); 51 return pem; 54 EVP_PKEY* CertificateUtil::PKEYFromPEM(std::string pem, 56 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size()); 73 std::string pem(data, data_size); 76 return pem; [all...] |
certificateutil.h | 30 // Reads an X509 certificate from a PEM encoded string. 31 // @param pem the PEM encoded string 34 static X509* X509FromPEM(std::string pem); 36 // Converts an X509 certificate to a PEM encoded string. 38 // @return a PEM encoded string of the given certificate 41 // Loads a private key from a PEM encoded string. 42 // @param pem the PEM encoded string 46 static EVP_PKEY* PKEYFromPEM(std::string pem, [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 25 // Tests reading an X509 certificate from a PEM encoded string. 27 std::string pem = "-----BEGIN CERTIFICATE-----\n" local 41 X509* x509 = CertificateUtil::X509FromPEM(pem); 51 // Tests converting an X509 certificate to a PEM encoded string. 94 std::string pem = CertificateUtil::X509ToPEM(x509); local 111 ASSERT_EQ(expected, pem); 114 // Tests reading a private key from a PEM encoded string. 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" local 135 EVP_PKEY* pkey = CertificateUtil::PKEYFromPEM(pem, "testing"); 145 // Tests converting a private key to a PEM encoded string 151 std::string pem = CertificateUtil::PKEYToPEM(pkey, "testing"); local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/tools/ |
crmfdump.py | 2 # Read ASN.1/PEM X.509 CRMF request on stdin, parse into 5 from pyasn1_modules import rfc2511, pem 10 $ cat crmf.pem | %s""" % sys.argv[0]) 15 substrate = pem.readBase64FromFile(sys.stdin)
|
ocspreqdump.py | 3 # Read ASN.1/PEM X.509 CRMF request on stdin, parse into 7 from pyasn1_modules import rfc2560, pem 12 $ cat ocsp-request.pem | %s""" % sys.argv[0]) 17 substrate = pem.readBase64FromFile(sys.stdin)
|
ocsprspdump.py | 3 # Read ASN.1/PEM OCSP response on stdin, parse into 7 from pyasn1_modules import rfc2560, pem 12 $ cat ocsp-response.pem | %s""" % sys.argv[0]) 17 substrate = pem.readBase64FromFile(sys.stdin)
|
/external/vboot_reference/scripts/image_signing/ |
insert_au_publickey.sh | 19 Usage: $PROG <image.bin> <au_public_key.pem> 20 Installs the update verification public key <au_public_key.pem> to <image.bin>. 28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem" 29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem" 30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_pem.py | 7 from rsa.pem import _markers
|