/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 101 if [ -e rootCA/private/cakey.pem ]; then 105 …f.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail … 107 …pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions … 108 …$OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create … 122 if [ -e demoCA/private/cakey.pem ]; then 126 …f.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail … 128 …cert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:… 130 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS 131 …$OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create … 144 …tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.… [all …]
|
D | ocsp-req.sh | 3 for i in *.pem; do 5 …openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cace…
|
D | ocsp-update-cache.sh | 5 -CAfile ca.pem \ 6 -verify_other demoCA/cacert.pem \ 7 -issuer demoCA/cacert.pem \ 8 -cert server.pem \
|
D | ocsp-responder-ica.sh | 3 …xt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/c…
|
D | ocsp-responder.sh | 3 …index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -…
|
D | openssl-root.cnf | 26 certificate = $dir/cacert.pem # The CA certificate 30 crl = $dir/crl.pem # The current CRL 31 private_key = $dir/private/cakey.pem# The private key 67 default_keyfile = privkey.pem
|
D | clean.sh | 4 rm -f $i.csr $i.key $i.pem 11 rm -f ca.pem logo.asn1 logo.der server.der ocsp-server-cache.der
|
D | openssl.cnf | 26 certificate = $dir/cacert.pem # The CA certificate 30 crl = $dir/crl.pem # The current CRL 31 private_key = $dir/private/cakey.pem# The private key 78 default_keyfile = privkey.pem
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
D | certificateutil.cc | 24 X509* CertificateUtil::X509FromPEM(std::string pem) { in X509FromPEM() argument 25 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size()); in X509FromPEM() 48 std::string pem(data, data_size); in X509ToPEM() local 51 return pem; in X509ToPEM() 54 EVP_PKEY* CertificateUtil::PKEYFromPEM(std::string pem, in PKEYFromPEM() argument 56 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size()); in PKEYFromPEM() 73 std::string pem(data, data_size); in PKEYToPEM() local 76 return pem; in PKEYToPEM()
|
D | certificateutil.h | 34 static X509* X509FromPEM(std::string pem); 46 static EVP_PKEY* PKEYFromPEM(std::string pem,
|
/external/sepolicy/ |
D | keys.conf | 12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem 15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem 18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem 22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem 23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem 24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
|
D | README | 47 mac_permissions.xml to public keys found in pem files. This script takes 56 pem files. The configuration file is processed via m4. 59 with specific path to a pem file. Typically TARGET_BUILD_VARIANT is either 69 organization and may need to extract the pem file for the insertkeys/keys.conf tools. 70 Extraction of the public key in the pem format is possible via openssl. First you need 72 openssl pkcs7 -inform DER -in CERT.RSA -out CERT.pem -outform PEM -print_certs 74 After extracting the pem, you can rename it, and configure keys.conf and 75 mac_permissions.xml to pick up the change. You MUST open the generated pem file in a text 79 NOTE: The pem files are base64 encoded and PackageManagerService, mac_permissions.xml
|
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
D | certificateutiltest.cc | 27 std::string pem = "-----BEGIN CERTIFICATE-----\n" in TEST() local 41 X509* x509 = CertificateUtil::X509FromPEM(pem); in TEST() 94 std::string pem = CertificateUtil::X509ToPEM(x509); in TEST() local 111 ASSERT_EQ(expected, pem); in TEST() 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" in TEST() local 135 EVP_PKEY* pkey = CertificateUtil::PKEYFromPEM(pem, "testing"); in TEST() 151 std::string pem = CertificateUtil::PKEYToPEM(pkey, "testing"); in TEST() local 153 ASSERT_TRUE(pem.size()); in TEST() 157 EVP_PKEY* verify = CertificateUtil::PKEYFromPEM(pem, "testing"); in TEST()
|
/external/conscrypt/src/test/java/org/conscrypt/ |
D | ChainStrengthAnalyzerTest.java | 255 private static void assertBad(String pem, String msg) throws Exception { in assertBad() argument 257 check(createCert(pem)); in assertBad() 265 private static void assertGood(String pem) throws Exception { in assertGood() argument 266 check(createCert(pem)); in assertGood() 274 private static X509Certificate createCert(String pem) throws Exception { in createCert() argument 276 InputStream pemInput = new ByteArrayInputStream(pem.getBytes()); in createCert()
|
/external/boringssl/src/crypto/x509/ |
D | pkcs7_test.c | 598 static int test_pem_certs(const char *pem) { in test_pem_certs() argument 599 BIO *bio = BIO_new_mem_buf((char *) pem, strlen(pem)); in test_pem_certs() 620 static int test_pem_crls(const char *pem) { in test_pem_crls() argument 621 BIO *bio = BIO_new_mem_buf((char *) pem, strlen(pem)); in test_pem_crls()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 68 ca_cert="/etc/cert/ca.pem" 69 client_cert="/etc/cert/user.pem" 90 ca_cert="/etc/cert/ca.pem" 113 ca_cert="/etc/cert/ca.pem" 133 ca_cert="/etc/cert/ca.pem" 134 client_cert="/etc/cert/user.pem" 162 ca_cert="/etc/cert/ca.pem" 163 client_cert="/etc/cert/user.pem" 167 ca_cert2="/etc/cert/ca2.pem" 168 client_cert2="/etc/cer/user.pem" [all …]
|
/external/vboot_reference/tests/futility/ |
D | test_sign_keyblocks.sh | 64 --signprivate_pem ${TESTKEYS}/key_rsa4096.pem \ 74 --pem_signpriv ${TESTKEYS}/key_rsa4096.pem \ 87 --signprivate_pem ${TESTKEYS}/key_rsa4096.pem \ 98 --pem_signpriv ${TESTKEYS}/key_rsa4096.pem \
|
/external/vboot_reference/ |
D | README | 101 $ openssl genrsa -F4 -out root_key.pem 8192 105 $ openssl genrsa -F4 -out signing_key.pem <1024|2048|4096|8192> 116 $ openssl req -batch -new -x509 -key root_key.pem -out root_key.crt 117 $ openssl req -batch -new -x509 -key signing_key.pem -out signing_key.crt 126 .pem RSA Public/Private Key Pair 134 --root_key root_key.pem \ 135 --firmware_sign_key signing_key.pem \
|
/external/vboot_reference/scripts/image_signing/ |
D | insert_au_publickey.sh | 19 Usage: $PROG <image.bin> <au_public_key.pem> 20 Installs the update verification public key <au_public_key.pem> to <image.bin>.
|
/external/boringssl/src/ssl/test/runner/ |
D | tls.go | 189 var certDERBlock *pem.Block 191 certDERBlock, certPEMBlock = pem.Decode(certPEMBlock) 205 var keyDERBlock *pem.Block 207 keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock)
|
/external/vboot_reference/tests/ |
D | gen_test_keys.sh | 27 openssl genrsa -F4 -out ${key_base}.pem $i 29 openssl req -batch -new -x509 -key ${key_base}.pem \
|
D | run_vbutil_tests.sh | 80 --key ${TESTKEY_DIR}/key_rsa${signing_keylen}.pem \ 141 ${TESTKEY_DIR}/key_rsa${signing_keylen}.pem \
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-inherit | 16 certificate_type x509 "my.cert.pem" "my.key.pem";
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/util/io/pem/ |
D | PemObjectGenerator.java | 1 package org.bouncycastle.util.io.pem;
|
D | PemObjectParser.java | 1 package org.bouncycastle.util.io.pem;
|