/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
KeyUsage.java | 8 * The KeyUsage object. 10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } 12 * KeyUsage ::= BIT STRING { 24 public class KeyUsage 39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs 41 if (obj instanceof KeyUsage) 43 return (KeyUsage)obj; 47 return new KeyUsage(DERBitString.getInstance(obj)); 53 public static KeyUsage fromExtensions(Extensions extensions) 55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage)) [all...] |
X509Extensions.java | 39 public static final ASN1ObjectIdentifier KeyUsage = new ASN1ObjectIdentifier("2.5.29.15");
|
/system/tpm/attestation/common/ |
print_common_proto.h | 30 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size); 31 std::string GetProtoDebugString(KeyUsage value);
|
mock_tpm_utility.h | 49 KeyUsage,
|
tpm_utility.h | 58 KeyUsage key_usage,
|
tpm_utility_v1.h | 49 KeyUsage key_usage,
|
print_common_proto.cc | 42 std::string GetProtoDebugString(KeyUsage value) { 46 std::string GetProtoDebugStringWithIndent(KeyUsage value, int indent_size) {
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
CsrUtil.java | 9 import org.bouncycastle.asn1.x509.KeyUsage; 78 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 79 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign)); 146 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 147 | KeyUsage.keyEncipherment)) [all...] |
SslUtil.java | 27 import org.bouncycastle.asn1.x509.KeyUsage; 160 // addition the keyUsage extension of the candidate issuer (if present) 164 // - the KeyUsage extension permits cert signing (KeyUsage.keyCertSign); 171 certGen.addExtension(X509Extensions.KeyUsage, true, new KeyUsage(KeyUsage.digitalSignature 172 | KeyUsage.keyEncipherment | KeyUsage.keyCertSign));
|
/system/tpm/attestation/server/ |
key_store.h | 66 KeyUsage key_usage,
|
mock_key_store.h | 51 KeyUsage key_usage,
|
pkcs11_key_store.h | 64 KeyUsage key_usage,
|
attestation_service.h | 223 KeyUsage key_usage,
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test_import.go | 36 KeyUsage: x509.KeyUsageCertSign,
|
x509.go | 526 // KeyUsage represents the set of actions that are valid for a given key. It's 527 // a bitmap of the KeyUsage* constants. 528 type KeyUsage int 531 KeyUsageDigitalSignature KeyUsage = 1 << iota 644 KeyUsage KeyUsage 790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 { [all...] |
verify.go | 154 // KeyUsage specifies which Extended Key Usage values are acceptable. 223 // KeyUsage status flags are ignored. From Engineering Security, Peter 232 // the order of the bit flags in the keyUsage due to confusion over 233 // encoding endianness, essentially setting a random keyUsage in 237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test_import.go | 36 KeyUsage: x509.KeyUsageCertSign,
|
x509.go | 526 // KeyUsage represents the set of actions that are valid for a given key. It's 527 // a bitmap of the KeyUsage* constants. 528 type KeyUsage int 531 KeyUsageDigitalSignature KeyUsage = 1 << iota 644 KeyUsage KeyUsage 790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 { [all...] |
verify.go | 154 // KeyUsage specifies which Extended Key Usage values are acceptable. 223 // KeyUsage status flags are ignored. From Engineering Security, Peter 232 // the order of the bit flags in the keyUsage due to confusion over 233 // encoding endianness, essentially setting a random keyUsage in 237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, 137 template.KeyUsage |= x509.KeyUsageCertSign
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, 137 template.KeyUsage |= x509.KeyUsageCertSign
|
/system/tpm/attestation/client/ |
main.cc | 139 KeyUsage usage; 369 KeyUsage usage) {
|
/external/pdfium/xfa/fxfa/parser/ |
xfa_basic_data_element_properties.cpp | 205 {XFA_Element::KeyUsage, 1, 0},
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 58 import org.bouncycastle.asn1.x509.KeyUsage; 78 private boolean[] keyUsage; 116 keyUsage = new boolean[(length < 9) ? 9 : length]; 120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; 125 keyUsage = null; 130 throw new CertificateParsingException("cannot construct KeyUsage: " + e); 325 return keyUsage; 505 if (oid.equals(Extension.keyUsage) 700 else if (oid.equals(Extension.keyUsage)) 702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 60 import org.bouncycastle.asn1.x509.KeyUsage; 81 private boolean[] keyUsage; 117 keyUsage = new boolean[(length < 9) ? 9 : length]; 121 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; 126 keyUsage = null; 131 throw new CertificateParsingException("cannot construct KeyUsage: " + e); 352 return keyUsage; 725 else if (oid.equals(Extension.keyUsage)) 727 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl);
|