HomeSort by relevance Sort by last modified time
    Searched refs:keyUsage (Results 1 - 25 of 54) sorted by null

1 2 3

  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
AlgorithmChecker.java 213 boolean[] keyUsage = ((X509Certificate) cert).getKeyUsage();
214 if (keyUsage != null && keyUsage.length < 9) {
216 "incorrect KeyUsage extension",
223 if (keyUsage != null) {
226 if (keyUsage[0] || keyUsage[1] || keyUsage[5] || keyUsage[6]) {
227 // keyUsage[0]: KeyUsage.digitalSignatur
    [all...]
RevocationChecker.java 779 boolean[] keyUsage = cert.getKeyUsage();
780 if (keyUsage != null) {
781 return keyUsage[6];
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
ca.conf 117 keyUsage = critical, digitalSignature, cRLSign, keyCertSign
124 keyUsage = critical, digitalSignature, cRLSign, keyCertSign
133 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
143 keyUsage = critical, digitalSignature, keyEncipherment
155 keyUsage = critical, digitalSignature
  /libcore/ojluni/src/main/java/sun/security/x509/
NetscapeCertTypeExtension.java 305 * as it maps to the KeyUsage extension.
307 * of the KeyUsage extension as an array of booleans.
310 KeyUsageExtension keyUsage = new KeyUsageExtension();
317 keyUsage.set(KeyUsageExtension.DIGITAL_SIGNATURE, val);
320 keyUsage.set(KeyUsageExtension.KEY_ENCIPHERMENT, val);
325 keyUsage.set(KeyUsageExtension.KEY_CERTSIGN, val);
327 return keyUsage.getBits();
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
KeyUsage.java 8 * The KeyUsage object.
10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
12 * KeyUsage ::= BIT STRING {
24 public class KeyUsage
39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs
41 if (obj instanceof KeyUsage)
43 return (KeyUsage)obj;
47 return new KeyUsage(DERBitString.getInstance(obj));
53 public static KeyUsage fromExtensions(Extensions extensions)
55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage))
    [all...]
X509Extension.java 30 public static final ASN1ObjectIdentifier keyUsage = new ASN1ObjectIdentifier("2.5.29.15");
Extension.java 35 public static final ASN1ObjectIdentifier keyUsage = new ASN1ObjectIdentifier("2.5.29.15").intern();
  /libcore/ojluni/src/main/java/java/security/cert/
X509CertSelector.java 108 private boolean[] keyUsage;
576 * Sets the keyUsage criterion. The {@code X509Certificate}
577 * must allow the specified keyUsage values. If {@code null}, no
578 * keyUsage check will be done. Note that an {@code X509Certificate}
579 * that has no keyUsage extension implicitly allows all keyUsage values.
584 * @param keyUsage a boolean array in the same format as the boolean
590 public void setKeyUsage(boolean[] keyUsage) {
591 if (keyUsage == null) {
592 this.keyUsage = null
    [all...]
  /external/conscrypt/testing/src/main/java/libcore/java/security/
TestKeyStore.java 67 import org.bouncycastle.asn1.x509.KeyUsage;
363 private int keyUsage;
410 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */
411 public Builder keyUsage(int keyUsage) {
412 this.keyUsage = keyUsage;
612 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca,
658 X500Principal subject, X500Principal issuer, int keyUsage, boolean ca,
700 if (keyUsage != 0)
    [all...]
  /libcore/support/src/test/java/libcore/java/security/
TestKeyStore.java 31 import com.android.org.bouncycastle.asn1.x509.KeyUsage;
361 private int keyUsage;
408 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */
409 public Builder keyUsage(int keyUsage) {
410 this.keyUsage = keyUsage;
614 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca,
672 int keyUsage,
717 if (keyUsage != 0)
    [all...]
  /libcore/ojluni/src/main/java/sun/security/pkcs/
SignerInfo.java 441 KeyUsageExtension keyUsage;
447 keyUsage = new KeyUsageExtension(keyUsageBits);
449 throw new SignatureException("Failed to parse keyUsage "
453 boolean digSigAllowed = keyUsage.get(
456 boolean nonRepuAllowed = keyUsage.get(
  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
tpmtoken_import_openssl.cnf 181 # This is typical in keyUsage for a client certificate.
182 # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
213 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
236 # keyUsage = cRLSign, keyCertSign
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 58 import org.bouncycastle.asn1.x509.KeyUsage;
78 private boolean[] keyUsage;
116 keyUsage = new boolean[(length < 9) ? 9 : length];
120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0;
125 keyUsage = null;
130 throw new CertificateParsingException("cannot construct KeyUsage: " + e);
325 return keyUsage;
505 if (oid.equals(Extension.keyUsage)
700 else if (oid.equals(Extension.keyUsage))
702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 60 import org.bouncycastle.asn1.x509.KeyUsage;
81 private boolean[] keyUsage;
117 keyUsage = new boolean[(length < 9) ? 9 : length];
121 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0;
126 keyUsage = null;
131 throw new CertificateParsingException("cannot construct KeyUsage: " + e);
352 return keyUsage;
725 else if (oid.equals(Extension.keyUsage))
727 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl);
CertPathValidatorUtilities.java 91 protected static final String KEY_USAGE = Extension.keyUsage.getId();
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
X509CertSelectorTest.java 442 assertTrue("The returned keyUsage should be equal to specified",
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
verify.go 154 // KeyUsage specifies which Extended Key Usage values are acceptable.
223 // KeyUsage status flags are ignored. From Engineering Security, Peter
232 // the order of the bit flags in the keyUsage due to confusion over
233 // encoding endianness, essentially setting a random keyUsage in
237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
x509.go 526 // KeyUsage represents the set of actions that are valid for a given key. It's
527 // a bitmap of the KeyUsage* constants.
528 type KeyUsage int
531 KeyUsageDigitalSignature KeyUsage = 1 << iota
644 KeyUsage KeyUsage
790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 {
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
verify.go 154 // KeyUsage specifies which Extended Key Usage values are acceptable.
223 // KeyUsage status flags are ignored. From Engineering Security, Peter
232 // the order of the bit flags in the keyUsage due to confusion over
233 // encoding endianness, essentially setting a random keyUsage in
237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
x509.go 526 // KeyUsage represents the set of actions that are valid for a given key. It's
527 // a bitmap of the KeyUsage* constants.
528 type KeyUsage int
531 KeyUsageDigitalSignature KeyUsage = 1 << iota
644 KeyUsage KeyUsage
790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 {
    [all...]
  /external/libcups/cups/
http-private.h 212 CFStringRef idString, CSSM_KEYUSE keyUsage,
  /external/curl/tests/
stunnel.pem 14 keyUsage = digitalSignature,keyEncipherment
  /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Include/IndustryStandard/
Tpm12.h     [all...]
  /device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/
Tpm12.h     [all...]
  /prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-kms/1.11.18/
aws-java-sdk-kms-1.11.18.jar 

Completed in 388 milliseconds

1 2 3