/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
KeyUsage.java | 8 * The KeyUsage object. 10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } 12 * KeyUsage ::= BIT STRING { 24 public class KeyUsage 39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs 41 if (obj instanceof KeyUsage) 43 return (KeyUsage)obj; 47 return new KeyUsage(DERBitString.getInstance(obj)); 53 public static KeyUsage fromExtensions(Extensions extensions) 55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage)) [all...] |
/external/curl/tests/certs/ |
EdelCurlRoot-ca.prm | 16 keyUsage = critical,keyCertSign,cRLSign
|
Server-localhost-sv.prm | 4 keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
Server-localhost.nn-sv.prm | 4 keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
Server-localhost0h-sv.prm | 5 keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 206 boolean[] keyUsage = x509Cert.getKeyUsage(); 207 if (keyUsage != null && keyUsage.length < 9) { 209 "incorrect KeyUsage extension", 213 if (keyUsage != null) { 217 if (keyUsage[0] || keyUsage[1] || keyUsage[5] || keyUsage[6]) { 218 // keyUsage[0]: KeyUsage.digitalSignatur [all...] |
KeyChecker.java | 37 * keyCertSign bit is set in the keyUsage extension in an intermediate CA 98 * Checks that keyUsage and target constraints are satisfied by 133 // the index of keyCertSign in the boolean KeyUsage array 151 // getKeyUsage returns null if the KeyUsage extension is not present
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
CsrUtil.java | 9 import org.bouncycastle.asn1.x509.KeyUsage; 78 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 79 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign)); 146 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 147 | KeyUsage.keyEncipherment)) [all...] |
SslUtil.java | 27 import org.bouncycastle.asn1.x509.KeyUsage; 160 // addition the keyUsage extension of the candidate issuer (if present) 164 // - the KeyUsage extension permits cert signing (KeyUsage.keyCertSign); 171 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 172 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
|
/system/tpm/attestation/common/ |
print_common_proto.h | 30 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size); 31 std::string GetProtoDebugString(KeyUsage value);
|
interface.proto | 38 optional KeyUsage key_usage = 3; 70 optional KeyUsage key_usage = 3; 131 optional KeyUsage key_usage = 4;
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
ca.conf | 117 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 124 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 133 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment 143 keyUsage = critical, digitalSignature, keyEncipherment 155 keyUsage = critical, digitalSignature
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
NetscapeCertTypeExtension.java | 297 * as it maps to the KeyUsage extension. 299 * of the KeyUsage extension as an array of booleans. 302 KeyUsageExtension keyUsage = new KeyUsageExtension(); 309 keyUsage.set(keyUsage.DIGITAL_SIGNATURE, val); 312 keyUsage.set(keyUsage.KEY_ENCIPHERMENT, val); 317 keyUsage.set(keyUsage.KEY_CERTSIGN, val); 319 return keyUsage.getBits() [all...] |
KeyUsageExtension.java | 55 public static final String IDENT = "x509.info.extensions.KeyUsage"; 59 public static final String NAME = "KeyUsage"; 212 + " CertAttrSet:KeyUsage."); 241 + " CertAttrSet:KeyUsage."); 269 + " CertAttrSet:KeyUsage."); 275 * Returns a printable representation of the KeyUsage. 278 String s = super.toString() + "KeyUsage [\n";
|
/libcore/ojluni/src/main/java/sun/security/validator/ |
EndEntityChecker.java | 210 boolean[] keyUsage = cert.getKeyUsage(); 211 if (keyUsage == null) { 214 return (keyUsage.length > bit) && keyUsage[bit]; 228 ("KeyUsage does not allow digital signatures", 265 ("KeyUsage does not allow key encipherment", 271 ("KeyUsage does not allow digital signatures", 277 ("KeyUsage does not allow key agreement", 320 ("KeyUsage does not allow digital signatures", 359 ("KeyUsage does not allow digital signatures" [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
openssl-root.cnf | 106 keyUsage = nonRepudiation, digitalSignature, keyEncipherment 114 keyUsage = critical, cRLSign, keyCertSign 124 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
openssl.cnf | 119 keyUsage = critical, cRLSign, keyCertSign 129 keyUsage = critical, keyEncipherment 179 keyUsage = nonRepudiation, digitalSignature, keyEncipherment 200 keyUsage = critical, keyEncipherment
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test_import.go | 36 KeyUsage: x509.KeyUsageCertSign,
|
verify.go | 132 // KeyUsage specifies which Extended Key Usage values are acceptable. 172 // KeyUsage status flags are ignored. From Engineering Security, Peter 181 // the order of the bit flags in the keyUsage due to confusion over 182 // encoding endianness, essentially setting a random keyUsage in 186 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test_import.go | 36 KeyUsage: x509.KeyUsageCertSign,
|
verify.go | 132 // KeyUsage specifies which Extended Key Usage values are acceptable. 172 // KeyUsage status flags are ignored. From Engineering Security, Peter 181 // the order of the bit flags in the keyUsage due to confusion over 182 // encoding endianness, essentially setting a random keyUsage in 186 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
/system/tpm/attestation/server/ |
mock_key_store.h | 47 KeyUsage key_usage,
|
/libcore/support/src/test/java/tests/resources/x509/ |
default.cnf | 181 keyUsage = critical, decipherOnly, keyAgreement 184 keyUsage=ASN1:FORMAT:BITLIST,BITSTRING:0,1,2,3,4,5,6,7,8,9,10 188 keyUsage = encipherOnly, keyEncipherment, dataEncipherment, keyCertSign, cRLSign, cRLSign, keyEncipherment, dataEncipherment, keyCertSign, cRLSign 218 keyUsage = nonRepudiation, digitalSignature, keyEncipherment 282 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 58 import org.bouncycastle.asn1.x509.KeyUsage; 78 private boolean[] keyUsage; 116 keyUsage = new boolean[(length < 9) ? 9 : length]; 120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; 125 keyUsage = null; 130 throw new CertificateParsingException("cannot construct KeyUsage: " + e); 325 return keyUsage; 505 if (oid.equals(Extension.keyUsage) 700 else if (oid.equals(Extension.keyUsage)) 702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl) [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 27 import com.android.org.bouncycastle.asn1.x509.KeyUsage; 315 private int keyUsage; 362 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */ 363 public Builder keyUsage(int keyUsage) { 364 this.keyUsage = keyUsage; 568 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca, 626 int keyUsage, 674 if (keyUsage != 0) [all...] |