/external/autotest/client/cros/ |
ownership.py | 273 """Returns the mock owner private key in PEM format. 275 @return: mock owner private key in PEM format. 295 The key is 2048 bits. The generated material is stored in PEM format 303 certfile = scoped_tempfile.tempdir.name + '/cert.pem' 314 PEM-encoded private key and the DER-encoded public key. 316 @return: (PEM-encoded private key, DER-encoded public key) 328 Given paths to a private key and cert in PEM format, stores the pair 331 @param keyfile: path to PEM-formatted private key file. 332 @param certfile: path to PEM-formatted cert file for associated public key. 346 def cert_extract_pubkey_der(pem) [all...] |
/system/tpm/attestation/server/ |
attestation_service_test.cc | 98 std::string pem = kBeginCertificate; local 99 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_cert"); 100 pem += kEndCertificate + "\n" + kBeginCertificate; 101 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert"); 102 pem += kEndCertificate + "\n" + kBeginCertificate; 103 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert2"); 104 pem += kEndCertificate; 105 return pem; [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt_test.go | 11 "encoding/pem" 19 block, rest := pem.Decode(data.pemData) 55 t.Error("PEM block does not appear to be encrypted") 238 block, _ := pem.Decode([]byte(incompleteBlockPEM)) 241 t.Fatal("Bad PEM data decrypted successfully")
|
/prebuilts/go/darwin-x86/src/encoding/pem/ |
pem.go | 5 // Package pem implements the PEM data encoding, which originated in Privacy 6 // Enhanced Mail. The most common use of PEM encoding today is in TLS keys and 8 package pem package 19 // A Block represents a PEM encoded structure. 74 // Decode will find the next PEM formatted block (certificate, private key 76 // no PEM data is found, p is nil and the whole of the input is returned in 144 // leading newline if the PEM block was empty. 152 // ultimately invalid PEM block. We need to start over from a new 262 return errors.New("pem: cannot encode a header key that contains a colon" [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt_test.go | 11 "encoding/pem" 19 block, rest := pem.Decode(data.pemData) 55 t.Error("PEM block does not appear to be encrypted") 238 block, _ := pem.Decode([]byte(incompleteBlockPEM)) 241 t.Fatal("Bad PEM data decrypted successfully")
|
/prebuilts/go/linux-x86/src/encoding/pem/ |
pem.go | 5 // Package pem implements the PEM data encoding, which originated in Privacy 6 // Enhanced Mail. The most common use of PEM encoding today is in TLS keys and 8 package pem package 19 // A Block represents a PEM encoded structure. 74 // Decode will find the next PEM formatted block (certificate, private key 76 // no PEM data is found, p is nil and the whole of the input is returned in 144 // leading newline if the PEM block was empty. 152 // ultimately invalid PEM block. We need to start over from a new 262 return errors.New("pem: cannot encode a header key that contains a colon" [all...] |
/build/core/ |
Makefile | 393 # exist with the suffixes ".x509.pem" and ".pk8". 514 VERITY_KEYID := veritykeyid=id:`openssl x509 -in $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem -text \ 546 $(BOOT_SIGNER) /boot $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $@ 553 $(BOOT_SIGNER) /boot $(INSTALLED_BOOTIMAGE_TARGET) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(INSTALLED_BOOTIMAGE_TARGET) 702 $(TARGET_OUT_ETC)/security/otacerts.zip: $(addsuffix .x509.pem,$(DEFAULT_KEY_CERT_PAIR)) | $(ZIPTIME) 713 ALL_DEFAULT_INSTALLED_MODULES += $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem 714 $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem: $(addsuffix .x509.pem,$(DEFAULT_KEY_CERT_PAIR)) 719 ALL_DEFAULT_INSTALLED_MODULES += $(TARGET_RECOVERY_ROOT_OUT)/etc/update_engine/update-payload-key.pub.pem 720 $(TARGET_RECOVERY_ROOT_OUT)/etc/update_engine/update-payload-key.pub.pem: $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pe [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_ssl.py | 128 pem = f.read() 129 d1 = ssl.PEM_cert_to_DER_cert(pem) 134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2) 136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2) 357 pem = ssl.get_server_certificate(("svn.python.org", 443)) 358 if not pem: 362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE) 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT) 370 if not pem [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_ssl.py | 128 pem = f.read() 129 d1 = ssl.PEM_cert_to_DER_cert(pem) 134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2) 136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2) 357 pem = ssl.get_server_certificate(("svn.python.org", 443)) 358 if not pem: 362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE) 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT) 370 if not pem [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 128 pem = f.read() 129 d1 = ssl.PEM_cert_to_DER_cert(pem) 134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2) 136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2) 357 pem = ssl.get_server_certificate(("svn.python.org", 443)) 358 if not pem: 362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE) 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT) 370 if not pem [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 128 pem = f.read() 129 d1 = ssl.PEM_cert_to_DER_cert(pem) 134 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2) 136 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2) 357 pem = ssl.get_server_certificate(("svn.python.org", 443)) 358 if not pem: 362 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE) 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 369 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT) 370 if not pem [all...] |
/external/boringssl/src/crypto/pem/ |
pem_pk8.c | 57 #include <openssl/pem.h> 121 OPENSSL_PUT_ERROR(PEM, PEM_R_ERROR_CONVERTING_PRIVATE_KEY); 130 OPENSSL_PUT_ERROR(PEM, PEM_R_READ_KEY); 166 OPENSSL_PUT_ERROR(PEM, PEM_R_BAD_PASSWORD_READ); 219 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB); 232 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
|
pem_pkey.c | 57 #include <openssl/pem.h> 112 OPENSSL_PUT_ERROR(PEM, PEM_R_BAD_PASSWORD_READ); 135 OPENSSL_PUT_ERROR(PEM, ERR_R_ASN1_LIB); 213 OPENSSL_PUT_ERROR(PEM, ERR_R_ASN1_LIB); 239 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB); 257 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB); 286 OPENSSL_PUT_ERROR(PEM, ERR_R_ASN1_LIB); 300 OPENSSL_PUT_ERROR(PEM, ERR_R_BUF_LIB);
|
/external/boringssl/src/crypto/x509/ |
by_file.c | 63 #include <openssl/pem.h>
|
x509_req.c | 66 #include <openssl/pem.h>
|
/external/boringssl/src/tool/ |
client.cc | 20 #include <openssl/pem.h>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 39 import org.bouncycastle.util.io.pem.PemObject; 41 // import org.bouncycastle.util.io.pem.PemWriter; 60 // encodings.add("PEM"); 199 else if (encoding.equalsIgnoreCase("PKCS7") || encoding.equalsIgnoreCase("PEM")) 309 // else if (encoding.equalsIgnoreCase("PEM")) 325 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path");
|
/external/curl/tests/ |
secureserver.pl | 67 my $capath; # certificate chain PEM folder 68 my $certfile; # certificate chain PEM file 185 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem"); 251 print "pem cert file: $certfile\n"; 322 # Set file permissions on certificate pem file.
|
/external/vboot_reference/futility/ |
cmd_create.c | 10 #include <openssl/pem.h> 59 "Create a keypair from an RSA key (.pem file).\n" 362 s = infile; /* based on pem file name */ 400 "Create a keypair from an RSA .pem file",
|
/external/vboot_reference/host/lib/ |
host_key.c | 10 #include <openssl/pem.h>
|
/system/extras/verity/ |
generate_verity_key.c | 34 #include <openssl/pem.h> 134 printf("Failed to read PEM certificate from file '%s'\n", pem_file); 219 printf("Usage: generate_verity_key <path-to-key> | -convert <path-to-x509-pem> <path-to-key>\n");
|
/system/update_engine/payload_consumer/ |
payload_verifier.cc | 20 #include <openssl/pem.h>
|
/system/webservd/webservd/ |
utils.cc | 21 #include <openssl/pem.h>
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client_test.go | 14 "encoding/pem" 100 pem.Encode(&pemOut, &pem.Block{Type: pemType + " PRIVATE KEY", Bytes: derBytes}) 123 pem.Encode(&serverInfo, &pem.Block{
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client_test.go | 14 "encoding/pem" 100 pem.Encode(&pemOut, &pem.Block{Type: pemType + " PRIVATE KEY", Bytes: derBytes}) 123 pem.Encode(&serverInfo, &pem.Block{
|