/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 213 boolean[] keyUsage = ((X509Certificate) cert).getKeyUsage(); 214 if (keyUsage != null && keyUsage.length < 9) { 216 "incorrect KeyUsage extension", 223 if (keyUsage != null) { 226 if (keyUsage[0] || keyUsage[1] || keyUsage[5] || keyUsage[6]) { 227 // keyUsage[0]: KeyUsage.digitalSignatur [all...] |
RevocationChecker.java | 779 boolean[] keyUsage = cert.getKeyUsage(); 780 if (keyUsage != null) { 781 return keyUsage[6]; [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
ca.conf | 117 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 124 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 133 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment 143 keyUsage = critical, digitalSignature, keyEncipherment 155 keyUsage = critical, digitalSignature
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
NetscapeCertTypeExtension.java | 305 * as it maps to the KeyUsage extension. 307 * of the KeyUsage extension as an array of booleans. 310 KeyUsageExtension keyUsage = new KeyUsageExtension(); 317 keyUsage.set(KeyUsageExtension.DIGITAL_SIGNATURE, val); 320 keyUsage.set(KeyUsageExtension.KEY_ENCIPHERMENT, val); 325 keyUsage.set(KeyUsageExtension.KEY_CERTSIGN, val); 327 return keyUsage.getBits();
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
KeyUsage.java | 8 * The KeyUsage object. 10 * id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } 12 * KeyUsage ::= BIT STRING { 24 public class KeyUsage 39 public static KeyUsage getInstance(Object obj) // needs to be DERBitString for other VMs 41 if (obj instanceof KeyUsage) 43 return (KeyUsage)obj; 47 return new KeyUsage(DERBitString.getInstance(obj)); 53 public static KeyUsage fromExtensions(Extensions extensions) 55 return KeyUsage.getInstance(extensions.getExtensionParsedValue(Extension.keyUsage)) [all...] |
X509Extension.java | 30 public static final ASN1ObjectIdentifier keyUsage = new ASN1ObjectIdentifier("2.5.29.15");
|
Extension.java | 35 public static final ASN1ObjectIdentifier keyUsage = new ASN1ObjectIdentifier("2.5.29.15").intern();
|
/libcore/ojluni/src/main/java/java/security/cert/ |
X509CertSelector.java | 108 private boolean[] keyUsage; 576 * Sets the keyUsage criterion. The {@code X509Certificate} 577 * must allow the specified keyUsage values. If {@code null}, no 578 * keyUsage check will be done. Note that an {@code X509Certificate} 579 * that has no keyUsage extension implicitly allows all keyUsage values. 584 * @param keyUsage a boolean array in the same format as the boolean 590 public void setKeyUsage(boolean[] keyUsage) { 591 if (keyUsage == null) { 592 this.keyUsage = null [all...] |
/external/conscrypt/testing/src/main/java/libcore/java/security/ |
TestKeyStore.java | 67 import org.bouncycastle.asn1.x509.KeyUsage; 363 private int keyUsage; 410 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */ 411 public Builder keyUsage(int keyUsage) { 412 this.keyUsage = keyUsage; 612 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca, 658 X500Principal subject, X500Principal issuer, int keyUsage, boolean ca, 700 if (keyUsage != 0) [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 31 import com.android.org.bouncycastle.asn1.x509.KeyUsage; 361 private int keyUsage; 408 /** {@link KeyUsage} bit mask for 2.5.29.15 extension */ 409 public Builder keyUsage(int keyUsage) { 410 this.keyUsage = keyUsage; 614 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca, 672 int keyUsage, 717 if (keyUsage != 0) [all...] |
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
SignerInfo.java | 441 KeyUsageExtension keyUsage; 447 keyUsage = new KeyUsageExtension(keyUsageBits); 449 throw new SignatureException("Failed to parse keyUsage " 453 boolean digSigAllowed = keyUsage.get( 456 boolean nonRepuAllowed = keyUsage.get(
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
tpmtoken_import_openssl.cnf | 181 # This is typical in keyUsage for a client certificate. 182 # keyUsage = nonRepudiation, digitalSignature, keyEncipherment 213 keyUsage = nonRepudiation, digitalSignature, keyEncipherment 236 # keyUsage = cRLSign, keyCertSign
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 58 import org.bouncycastle.asn1.x509.KeyUsage; 78 private boolean[] keyUsage; 116 keyUsage = new boolean[(length < 9) ? 9 : length]; 120 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; 125 keyUsage = null; 130 throw new CertificateParsingException("cannot construct KeyUsage: " + e); 325 return keyUsage; 505 if (oid.equals(Extension.keyUsage) 700 else if (oid.equals(Extension.keyUsage)) 702 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 60 import org.bouncycastle.asn1.x509.KeyUsage; 81 private boolean[] keyUsage; 117 keyUsage = new boolean[(length < 9) ? 9 : length]; 121 keyUsage[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; 126 keyUsage = null; 131 throw new CertificateParsingException("cannot construct KeyUsage: " + e); 352 return keyUsage; 725 else if (oid.equals(Extension.keyUsage)) 727 buf.append(KeyUsage.getInstance(dIn.readObject())).append(nl);
|
CertPathValidatorUtilities.java | 91 protected static final String KEY_USAGE = Extension.keyUsage.getId(); [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
X509CertSelectorTest.java | 442 assertTrue("The returned keyUsage should be equal to specified", [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 154 // KeyUsage specifies which Extended Key Usage values are acceptable. 223 // KeyUsage status flags are ignored. From Engineering Security, Peter 232 // the order of the bit flags in the keyUsage due to confusion over 233 // encoding endianness, essentially setting a random keyUsage in 237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
x509.go | 526 // KeyUsage represents the set of actions that are valid for a given key. It's 527 // a bitmap of the KeyUsage* constants. 528 type KeyUsage int 531 KeyUsageDigitalSignature KeyUsage = 1 << iota 644 KeyUsage KeyUsage 790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 { [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 154 // KeyUsage specifies which Extended Key Usage values are acceptable. 223 // KeyUsage status flags are ignored. From Engineering Security, Peter 232 // the order of the bit flags in the keyUsage due to confusion over 233 // encoding endianness, essentially setting a random keyUsage in 237 // keyUsage, and a keyUsage containing a flag indicating that the RSA
|
x509.go | 526 // KeyUsage represents the set of actions that are valid for a given key. It's 527 // a bitmap of the KeyUsage* constants. 528 type KeyUsage int 531 KeyUsageDigitalSignature KeyUsage = 1 << iota 644 KeyUsage KeyUsage 790 if parent.KeyUsage != 0 && parent.KeyUsage&KeyUsageCertSign == 0 { [all...] |
/external/libcups/cups/ |
http-private.h | 212 CFStringRef idString, CSSM_KEYUSE keyUsage,
|
/external/curl/tests/ |
stunnel.pem | 14 keyUsage = digitalSignature,keyEncipherment
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Include/IndustryStandard/ |
Tpm12.h | [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
Tpm12.h | [all...] |
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-kms/1.11.18/ |
aws-java-sdk-kms-1.11.18.jar | |