/system/update_engine/ |
Android.mk | 777 # $(1): The path to the private key in pem format. 780 $(eval LOCAL_MODULE := ue_$(1).pem) \ 783 $(eval LOCAL_SRC_FILES := $(1).pem) \ 786 $(eval LOCAL_MODULE_STEM := $(1).pem) \ 790 $(eval LOCAL_MODULE := ue_$(1).pub.pem) \ 795 $(eval LOCAL_MODULE_STEM := $(1).pub.pem) \ 797 $(eval $(LOCAL_BUILT_MODULE) : $(LOCAL_PATH)/$(1).pem ; \ 873 ue_unittest_key.pem \ 874 ue_unittest_key.pub.pem \ 875 ue_unittest_key2.pem \ [all...] |
/external/vboot_reference/tests/ |
run_vbutil_tests.sh | 80 --key ${TESTKEY_DIR}/key_rsa${signing_keylen}.pem \ 141 ${TESTKEY_DIR}/key_rsa${signing_keylen}.pem \
|
/external/curl/lib/ |
mk-ca-bundle.pl | 25 # then parses certdata.txt and extracts CA Root Certificates into PEM format. 358 ## It contains the certificates in ${format}PEM format and therefore 435 my $pem = "-----BEGIN CERTIFICATE-----\n" 450 print CRT $pem; 454 $pipe = "|$openssl x509 -" . $hash . " -fingerprint -noout -inform PEM"; 460 print TMP $pem; 466 $pipe = "|$openssl x509 -text -inform PEM"; 472 print TMP $pem;
|
/external/curl/tests/certs/scripts/ |
genserv.sh | 81 echo "openssl rsa -in $PREFIX-sv.key -pubout -outform PEM -out $PREFIX-sv.pub.pem" 82 $OPENSSL rsa -in $PREFIX-sv.key -pubout -outform PEM -out $PREFIX-sv.pub.pem 113 cat $PREFIX-sv.prm $PREFIX-sv.key $PREFIX-sv.crt $PREFIX-sv.dhp >$PREFIX-sv.pem 116 echo "$PREFIX-sv.pem done"
|
/external/vboot_reference/host/lib/ |
signature_digest.c | 6 #include <openssl/pem.h>
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 24 import com.android.org.bouncycastle.util.io.pem.PemObject; 25 import com.android.org.bouncycastle.util.io.pem.PemReader; 26 import com.android.org.bouncycastle.util.io.pem.PemWriter; 103 * Intent extra: data for the user's private key in PEM-encoded PKCS#8. 113 * Intent extra: data for the user's certificate in PEM-encoded X.509. 123 * Intent extra: data for CA certificate chain in PEM-encoded X.509. 128 * Convert objects to a PEM format which is used for 143 * Convert objects from PEM format, which is used for
|
/external/boringssl/src/ssl/test/runner/ |
tls.go | 13 "encoding/pem" 173 // files. The files must contain PEM encoded data. 187 // PEM encoded data. 189 var certDERBlock *pem.Block 191 certDERBlock, certPEMBlock = pem.Decode(certPEMBlock) 201 err = errors.New("crypto/tls: failed to parse certificate PEM data") 205 var keyDERBlock *pem.Block 207 keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock) 209 err = errors.New("crypto/tls: failed to parse key PEM data")
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt.go | 7 // RFC 1423 describes the encryption of PEM blocks. The algorithm used to 17 "encoding/pem" 35 // rfc1423Algo holds a method for enciphering a PEM block. 44 // rfc1423Algos holds a slice of the possible ways to encrypt a PEM 98 // IsEncryptedPEMBlock returns if the PEM block is password encrypted. 99 func IsEncryptedPEMBlock(b *pem.Block) bool { 107 // DecryptPEMBlock takes a password encrypted PEM block and the password used to 112 // in the encrypted-PEM format, it's not always possible to detect an incorrect 115 func DecryptPEMBlock(b *pem.Block, password []byte) ([]byte, error) { 148 return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size" [all...] |
x509_test.go | 20 "encoding/pem" 31 block, _ := pem.Decode([]byte(pemPrivateKey)) 54 block, _ := pem.Decode([]byte(pemPublicKey)) 316 block, _ := pem.Decode([]byte(pemPrivateKey)) 654 pemBlock, _ := pem.Decode([]byte(test.pemCert)) 711 pemBlock, _ := pem.Decode([]byte(dsaCertPem)) 732 pemBlock, _ := pem.Decode([]byte(dsaCertPem)) 743 pemBlock, _ := pem.Decode([]byte(dsaCertPem)) 767 block, _ := pem.Decode([]byte(pemPrivateKey)) 769 block, _ = pem.Decode([]byte(pemCertificate) [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt.go | 7 // RFC 1423 describes the encryption of PEM blocks. The algorithm used to 17 "encoding/pem" 35 // rfc1423Algo holds a method for enciphering a PEM block. 44 // rfc1423Algos holds a slice of the possible ways to encrypt a PEM 98 // IsEncryptedPEMBlock returns if the PEM block is password encrypted. 99 func IsEncryptedPEMBlock(b *pem.Block) bool { 107 // DecryptPEMBlock takes a password encrypted PEM block and the password used to 112 // in the encrypted-PEM format, it's not always possible to detect an incorrect 115 func DecryptPEMBlock(b *pem.Block, password []byte) ([]byte, error) { 148 return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size" [all...] |
x509_test.go | 20 "encoding/pem" 31 block, _ := pem.Decode([]byte(pemPrivateKey)) 54 block, _ := pem.Decode([]byte(pemPublicKey)) 316 block, _ := pem.Decode([]byte(pemPrivateKey)) 654 pemBlock, _ := pem.Decode([]byte(test.pemCert)) 711 pemBlock, _ := pem.Decode([]byte(dsaCertPem)) 732 pemBlock, _ := pem.Decode([]byte(dsaCertPem)) 743 pemBlock, _ := pem.Decode([]byte(dsaCertPem)) 767 block, _ := pem.Decode([]byte(pemPrivateKey)) 769 block, _ = pem.Decode([]byte(pemCertificate) [all...] |
/system/tpm/attestation/server/ |
attestation_service.cc | 841 std::string pem = CreatePEMCertificate(key.certified_key_credential()); local 843 pem += "\n"; 844 pem += CreatePEMCertificate(key.intermediate_ca_cert()); 847 pem += "\n"; 848 pem += CreatePEMCertificate(key.additional_intermediate_ca_cert(i)); 850 return pem; 858 std::string pem = kBeginCertificate; local 859 pem += brillo::data_encoding::Base64EncodeWrapLines(certificate); 860 pem += kEndCertificate; 861 return pem; [all...] |
/build/core/ |
prebuilt_internal.mk | 204 $(built_module) : PRIVATE_CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem 226 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem 230 $(built_module) : PRIVATE_CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem 309 $(built_apk_splits) : PRIVATE_CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem
|
dpi_specific_apk.mk | 31 $(LOCAL_ADDITIONAL_CERTIFICATES), $(c).x509.pem $(c).pk8)
|
/external/boringssl/src/tool/ |
pkcs12.cc | 35 #include <openssl/pem.h>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/util/io/pem/ |
PemWriter.java | 1 package org.bouncycastle.util.io.pem; 12 * A generic PEM writer, based on RFC 1421 44 * passed in object if it is PEM encoded. 46 * @param obj pem object to be output
|
/external/curl/docs/examples/ |
usercertinmem.c | 22 /* Example using an in memory PEM user certificate and RSA key to retrieve an 32 #include <openssl/pem.h> 124 /* use it to read the PEM formatted certificate from memory into an X509 188 rv = curl_easy_setopt(ch,CURLOPT_SSLCERTTYPE,"PEM"); 196 rv = curl_easy_setopt(ch, CURLOPT_SSLKEYTYPE, "PEM");
|
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/ |
certutils.py | 22 key: a private crypto.PKey (from ca or pem) 177 For example, if cert_path is "mycert.pem": 178 mycert.pem - CA plus private key 179 mycert-cert.pem - CA in PEM format 183 cert_path: path string such as "mycert.pem" 192 ca_cert_path = root_path + '-cert.pem' 201 # Dump the certificate in PEM format 224 root_ca_cert_str: PEM formatted string representing the root cert 225 server_cert_str: PEM formatted string representing cer [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
tls.go | 13 "encoding/pem" 169 // files. The files must contain PEM encoded data. 183 // PEM encoded data. 186 var certDERBlock *pem.Block 189 certDERBlock, certPEMBlock = pem.Decode(certPEMBlock) 199 return fail(errors.New("crypto/tls: failed to parse certificate PEM data")) 202 var keyDERBlock *pem.Block 204 keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock) 206 return fail(errors.New("crypto/tls: failed to parse key PEM data"))
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
tls.go | 13 "encoding/pem" 169 // files. The files must contain PEM encoded data. 183 // PEM encoded data. 186 var certDERBlock *pem.Block 189 certDERBlock, certPEMBlock = pem.Decode(certPEMBlock) 199 return fail(errors.New("crypto/tls: failed to parse certificate PEM data")) 202 var keyDERBlock *pem.Block 204 keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock) 206 return fail(errors.New("crypto/tls: failed to parse key PEM data"))
|
/external/boringssl/ |
sources.mk | 167 src/crypto/pem/pem_all.c\ 168 src/crypto/pem/pem_info.c\ 169 src/crypto/pem/pem_lib.c\ 170 src/crypto/pem/pem_oth.c\ 171 src/crypto/pem/pem_pk8.c\ 172 src/crypto/pem/pem_pkey.c\ 173 src/crypto/pem/pem_x509.c\ 174 src/crypto/pem/pem_xaux.c\
|
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 77 #include <openssl/pem.h> 84 // name parameter and single block, decode it as a PEM private key, and save it
|
/external/boringssl/src/crypto/pem/ |
pem_all.c | 115 #include <openssl/pem.h>
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
service_account.py | 135 der = rsa.pem.load_pem(private_key_pkcs8_text, 'PRIVATE KEY')
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 11 #include <openssl/pem.h> 180 /* Read the pubkey in .PEM format. */
|