HomeSort by relevance Sort by last modified time
    Searched refs:pem (Results 101 - 125 of 186) sorted by null

1 2 3 45 6 7 8

  /external/autotest/client/cros/
ownership.py 273 """Returns the mock owner private key in PEM format.
275 @return: mock owner private key in PEM format.
295 The key is 2048 bits. The generated material is stored in PEM format
303 certfile = scoped_tempfile.tempdir.name + '/cert.pem'
314 PEM-encoded private key and the DER-encoded public key.
316 @return: (PEM-encoded private key, DER-encoded public key)
328 Given paths to a private key and cert in PEM format, stores the pair
331 @param keyfile: path to PEM-formatted private key file.
332 @param certfile: path to PEM-formatted cert file for associated public key.
346 def cert_extract_pubkey_der(pem)
    [all...]
  /system/tpm/attestation/server/
attestation_service_test.cc 98 std::string pem = kBeginCertificate; local
99 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_cert");
100 pem += kEndCertificate + "\n" + kBeginCertificate;
101 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert");
102 pem += kEndCertificate + "\n" + kBeginCertificate;
103 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert2");
104 pem += kEndCertificate;
105 return pem;
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
pem_decrypt_test.go 11 "encoding/pem"
19 block, rest := pem.Decode(data.pemData)
55 t.Error("PEM block does not appear to be encrypted")
238 block, _ := pem.Decode([]byte(incompleteBlockPEM))
241 t.Fatal("Bad PEM data decrypted successfully")
  /prebuilts/go/darwin-x86/src/encoding/pem/
pem.go 5 // Package pem implements the PEM data encoding, which originated in Privacy
6 // Enhanced Mail. The most common use of PEM encoding today is in TLS keys and
8 package pem package
19 // A Block represents a PEM encoded structure.
74 // Decode will find the next PEM formatted block (certificate, private key
76 // no PEM data is found, p is nil and the whole of the input is returned in
144 // leading newline if the PEM block was empty.
152 // ultimately invalid PEM block. We need to start over from a new
262 return errors.New("pem: cannot encode a header key that contains a colon"
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
pem_decrypt_test.go 11 "encoding/pem"
19 block, rest := pem.Decode(data.pemData)
55 t.Error("PEM block does not appear to be encrypted")
238 block, _ := pem.Decode([]byte(incompleteBlockPEM))
241 t.Fatal("Bad PEM data decrypted successfully")
  /prebuilts/go/linux-x86/src/encoding/pem/
pem.go 5 // Package pem implements the PEM data encoding, which originated in Privacy
6 // Enhanced Mail. The most common use of PEM encoding today is in TLS keys and
8 package pem package
19 // A Block represents a PEM encoded structure.
74 // Decode will find the next PEM formatted block (certificate, private key
76 // no PEM data is found, p is nil and the whole of the input is returned in
144 // leading newline if the PEM block was empty.
152 // ultimately invalid PEM block. We need to start over from a new
262 return errors.New("pem: cannot encode a header key that contains a colon"
    [all...]
  /build/core/
Makefile 393 # exist with the suffixes ".x509.pem" and ".pk8".
514 VERITY_KEYID := veritykeyid=id:`openssl x509 -in $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem -text \
546 $(BOOT_SIGNER) /boot $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $@
553 $(BOOT_SIGNER) /boot $(INSTALLED_BOOTIMAGE_TARGET) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(INSTALLED_BOOTIMAGE_TARGET)
702 $(TARGET_OUT_ETC)/security/otacerts.zip: $(addsuffix .x509.pem,$(DEFAULT_KEY_CERT_PAIR)) | $(ZIPTIME)
713 ALL_DEFAULT_INSTALLED_MODULES += $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem
714 $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem: $(addsuffix .x509.pem,$(DEFAULT_KEY_CERT_PAIR))
719 ALL_DEFAULT_INSTALLED_MODULES += $(TARGET_RECOVERY_ROOT_OUT)/etc/update_engine/update-payload-key.pub.pem
720 $(TARGET_RECOVERY_ROOT_OUT)/etc/update_engine/update-payload-key.pub.pem: $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pe
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_ssl.py 128 pem = f.read()
129 d1 = ssl.PEM_cert_to_DER_cert(pem)
134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2)
136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2)
357 pem = ssl.get_server_certificate(("svn.python.org", 443))
358 if not pem:
362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE)
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
370 if not pem
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_ssl.py 128 pem = f.read()
129 d1 = ssl.PEM_cert_to_DER_cert(pem)
134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2)
136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2)
357 pem = ssl.get_server_certificate(("svn.python.org", 443))
358 if not pem:
362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE)
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
370 if not pem
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_ssl.py 128 pem = f.read()
129 d1 = ssl.PEM_cert_to_DER_cert(pem)
134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2)
136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2)
357 pem = ssl.get_server_certificate(("svn.python.org", 443))
358 if not pem:
362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE)
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
370 if not pem
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_ssl.py 128 pem = f.read()
129 d1 = ssl.PEM_cert_to_DER_cert(pem)
134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2)
136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2)
357 pem = ssl.get_server_certificate(("svn.python.org", 443))
358 if not pem:
362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE)
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
370 if not pem
    [all...]
  /external/boringssl/src/crypto/pem/
pem_pk8.c 57 #include <openssl/pem.h>
121 OPENSSL_PUT_ERROR(PEM, PEM_R_ERROR_CONVERTING_PRIVATE_KEY);
130 OPENSSL_PUT_ERROR(PEM, PEM_R_READ_KEY);
166 OPENSSL_PUT_ERROR(PEM, PEM_R_BAD_PASSWORD_READ);
219 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
232 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
pem_pkey.c 57 #include <openssl/pem.h>
112 OPENSSL_PUT_ERROR(PEM, PEM_R_BAD_PASSWORD_READ);
135 OPENSSL_PUT_ERROR(PEM, ERR_R_ASN1_LIB);
213 OPENSSL_PUT_ERROR(PEM, ERR_R_ASN1_LIB);
239 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
257 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
286 OPENSSL_PUT_ERROR(PEM, ERR_R_ASN1_LIB);
300 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
  /external/boringssl/src/crypto/x509/
by_file.c 63 #include <openssl/pem.h>
x509_req.c 66 #include <openssl/pem.h>
  /external/boringssl/src/tool/
client.cc 20 #include <openssl/pem.h>
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 39 import org.bouncycastle.util.io.pem.PemObject;
41 // import org.bouncycastle.util.io.pem.PemWriter;
60 // encodings.add("PEM");
199 else if (encoding.equalsIgnoreCase("PKCS7") || encoding.equalsIgnoreCase("PEM"))
309 // else if (encoding.equalsIgnoreCase("PEM"))
325 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path");
  /external/curl/tests/
secureserver.pl 67 my $capath; # certificate chain PEM folder
68 my $certfile; # certificate chain PEM file
185 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem");
251 print "pem cert file: $certfile\n";
322 # Set file permissions on certificate pem file.
  /external/vboot_reference/futility/
cmd_create.c 10 #include <openssl/pem.h>
59 "Create a keypair from an RSA key (.pem file).\n"
362 s = infile; /* based on pem file name */
400 "Create a keypair from an RSA .pem file",
  /external/vboot_reference/host/lib/
host_key.c 10 #include <openssl/pem.h>
  /system/extras/verity/
generate_verity_key.c 34 #include <openssl/pem.h>
134 printf("Failed to read PEM certificate from file '%s'\n", pem_file);
219 printf("Usage: generate_verity_key <path-to-key> | -convert <path-to-x509-pem> <path-to-key>\n");
  /system/update_engine/payload_consumer/
payload_verifier.cc 20 #include <openssl/pem.h>
  /system/webservd/webservd/
utils.cc 21 #include <openssl/pem.h>
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_client_test.go 14 "encoding/pem"
100 pem.Encode(&pemOut, &pem.Block{Type: pemType + " PRIVATE KEY", Bytes: derBytes})
123 pem.Encode(&serverInfo, &pem.Block{
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_client_test.go 14 "encoding/pem"
100 pem.Encode(&pemOut, &pem.Block{Type: pemType + " PRIVATE KEY", Bytes: derBytes})
123 pem.Encode(&serverInfo, &pem.Block{

Completed in 560 milliseconds

1 2 3 45 6 7 8