HomeSort by relevance Sort by last modified time
    Searched refs:KeyUsage (Results 1 - 25 of 47) sorted by null

1 2

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
KeyUsage.java 8 * The KeyUsage object.
10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
12 * KeyUsage ::= BIT STRING {
24 public class KeyUsage
39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs
41 if (obj instanceof KeyUsage)
43 return (KeyUsage)obj;
47 return new KeyUsage(DERBitString.getInstance(obj));
53 public static KeyUsage fromExtensions(Extensions extensions)
55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage))
    [all...]
X509Extensions.java 39 public static final ASN1ObjectIdentifier KeyUsage = new ASN1ObjectIdentifier("2.5.29.15");
  /system/tpm/attestation/common/
print_common_proto.h 30 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size);
31 std::string GetProtoDebugString(KeyUsage value);
mock_tpm_utility.h 49 KeyUsage,
tpm_utility.h 58 KeyUsage key_usage,
tpm_utility_v1.h 49 KeyUsage key_usage,
print_common_proto.cc 42 std::string GetProtoDebugString(KeyUsage value) {
46 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size) {
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
CsrUtil.java 9 import org.bouncycastle.asn1.x509.KeyUsage;
78 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature
79 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
146 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature
147 | KeyUsage.keyEncipherment))
    [all...]
SslUtil.java 27 import org.bouncycastle.asn1.x509.KeyUsage;
160 // addition the keyUsage extension of the candidate issuer (if present)
164 // - the KeyUsage extension permits cert signing (KeyUsage.keyCertSign);
171 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature
172 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
  /system/tpm/attestation/server/
key_store.h 66 KeyUsage key_usage,
mock_key_store.h 51 KeyUsage key_usage,
pkcs11_key_store.h 64 KeyUsage key_usage,
attestation_service.h 223 KeyUsage key_usage,
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test_import.go 36 KeyUsage: x509.KeyUsageCertSign,
x509.go 526 // KeyUsage represents the set of actions that are valid for a given key. It's
527 // a bitmap of the KeyUsage* constants.
528 type KeyUsage int
531 KeyUsageDigitalSignature KeyUsage = 1 << iota
644 KeyUsage KeyUsage
790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 {
    [all...]
verify.go 154 // KeyUsage specifies which Extended Key Usage values are acceptable.
223 // KeyUsage status flags are ignored. From Engineering Security, Peter
232 // the order of the bit flags in the keyUsage due to confusion over
233 // encoding endianness, essentially setting a random keyUsage in
237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test_import.go 36 KeyUsage: x509.KeyUsageCertSign,
x509.go 526 // KeyUsage represents the set of actions that are valid for a given key. It's
527 // a bitmap of the KeyUsage* constants.
528 type KeyUsage int
531 KeyUsageDigitalSignature KeyUsage = 1 << iota
644 KeyUsage KeyUsage
790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 {
    [all...]
verify.go 154 // KeyUsage specifies which Extended Key Usage values are acceptable.
223 // KeyUsage status flags are ignored. From Engineering Security, Peter
232 // the order of the bit flags in the keyUsage due to confusion over
233 // encoding endianness, essentially setting a random keyUsage in
237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
  /prebuilts/go/darwin-x86/src/crypto/tls/
generate_cert.go 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
137 template.KeyUsage |= x509.KeyUsageCertSign
  /prebuilts/go/linux-x86/src/crypto/tls/
generate_cert.go 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
137 template.KeyUsage |= x509.KeyUsageCertSign
  /system/tpm/attestation/client/
main.cc 139 KeyUsage usage;
369 KeyUsage usage) {
  /external/pdfium/xfa/fxfa/parser/
xfa_basic_data_element_properties.cpp 205 {XFA_Element::KeyUsage, 1, 0},
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 58 import org.bouncycastle.asn1.x509.KeyUsage;
78 private boolean[] keyUsage;
116 keyUsage = new boolean[(length < 9) ? 9 : length];
120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0;
125 keyUsage = null;
130 throw new CertificateParsingException("cannot construct KeyUsage: " + e);
325 return keyUsage;
505 if (oid.equals(Extension.keyUsage)
700 else if (oid.equals(Extension.keyUsage))
702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 60 import org.bouncycastle.asn1.x509.KeyUsage;
81 private boolean[] keyUsage;
117 keyUsage = new boolean[(length < 9) ? 9 : length];
121 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0;
126 keyUsage = null;
131 throw new CertificateParsingException("cannot construct KeyUsage: " + e);
352 return keyUsage;
725 else if (oid.equals(Extension.keyUsage))
727 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl);

Completed in 460 milliseconds

1 2