Home
last modified time | relevance | path

Searched refs:pem (Results 1 – 25 of 57) sorted by relevance

123

/external/wpa_supplicant_8/hs20/server/ca/
Dsetup.sh101 if [ -e rootCA/private/cakey.pem ]; then
105 …f.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail …
107pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions …
108 …$OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create …
122 if [ -e demoCA/private/cakey.pem ]; then
126 …f.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail …
128 …cert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:…
130 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS
131 …$OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create …
144 …tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.
[all …]
Docsp-req.sh3 for i in *.pem; do
5 …openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cace…
Docsp-update-cache.sh5 -CAfile ca.pem \
6 -verify_other demoCA/cacert.pem \
7 -issuer demoCA/cacert.pem \
8 -cert server.pem \
Docsp-responder-ica.sh3 …xt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/c…
Docsp-responder.sh3 …index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -…
Dopenssl-root.cnf26 certificate = $dir/cacert.pem # The CA certificate
30 crl = $dir/crl.pem # The current CRL
31 private_key = $dir/private/cakey.pem# The private key
67 default_keyfile = privkey.pem
Dclean.sh4 rm -f $i.csr $i.key $i.pem
11 rm -f ca.pem logo.asn1 logo.der server.der ocsp-server-cache.der
Dopenssl.cnf26 certificate = $dir/cacert.pem # The CA certificate
30 crl = $dir/crl.pem # The current CRL
31 private_key = $dir/private/cakey.pem# The private key
78 default_keyfile = privkey.pem
/external/google-tv-pairing-protocol/cpp/src/polo/util/
Dcertificateutil.cc24 X509* CertificateUtil::X509FromPEM(std::string pem) { in X509FromPEM() argument
25 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size()); in X509FromPEM()
48 std::string pem(data, data_size); in X509ToPEM() local
51 return pem; in X509ToPEM()
54 EVP_PKEY* CertificateUtil::PKEYFromPEM(std::string pem, in PKEYFromPEM() argument
56 BIO* bio = BIO_new_mem_buf(&pem[0], pem.size()); in PKEYFromPEM()
73 std::string pem(data, data_size); in PKEYToPEM() local
76 return pem; in PKEYToPEM()
Dcertificateutil.h34 static X509* X509FromPEM(std::string pem);
46 static EVP_PKEY* PKEYFromPEM(std::string pem,
/external/sepolicy/
Dkeys.conf12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem
15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem
18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem
22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
DREADME47 mac_permissions.xml to public keys found in pem files. This script takes
56 pem files. The configuration file is processed via m4.
59 with specific path to a pem file. Typically TARGET_BUILD_VARIANT is either
69 organization and may need to extract the pem file for the insertkeys/keys.conf tools.
70 Extraction of the public key in the pem format is possible via openssl. First you need
72 openssl pkcs7 -inform DER -in CERT.RSA -out CERT.pem -outform PEM -print_certs
74 After extracting the pem, you can rename it, and configure keys.conf and
75 mac_permissions.xml to pick up the change. You MUST open the generated pem file in a text
79 NOTE: The pem files are base64 encoded and PackageManagerService, mac_permissions.xml
/external/google-tv-pairing-protocol/cpp/tests/polo/util/
Dcertificateutiltest.cc27 std::string pem = "-----BEGIN CERTIFICATE-----\n" in TEST() local
41 X509* x509 = CertificateUtil::X509FromPEM(pem); in TEST()
94 std::string pem = CertificateUtil::X509ToPEM(x509); in TEST() local
111 ASSERT_EQ(expected, pem); in TEST()
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" in TEST() local
135 EVP_PKEY* pkey = CertificateUtil::PKEYFromPEM(pem, "testing"); in TEST()
151 std::string pem = CertificateUtil::PKEYToPEM(pkey, "testing"); in TEST() local
153 ASSERT_TRUE(pem.size()); in TEST()
157 EVP_PKEY* verify = CertificateUtil::PKEYFromPEM(pem, "testing"); in TEST()
/external/conscrypt/src/test/java/org/conscrypt/
DChainStrengthAnalyzerTest.java255 private static void assertBad(String pem, String msg) throws Exception { in assertBad() argument
257 check(createCert(pem)); in assertBad()
265 private static void assertGood(String pem) throws Exception { in assertGood() argument
266 check(createCert(pem)); in assertGood()
274 private static X509Certificate createCert(String pem) throws Exception { in createCert() argument
276 InputStream pemInput = new ByteArrayInputStream(pem.getBytes()); in createCert()
/external/boringssl/src/crypto/x509/
Dpkcs7_test.c598 static int test_pem_certs(const char *pem) { in test_pem_certs() argument
599 BIO *bio = BIO_new_mem_buf((char *) pem, strlen(pem)); in test_pem_certs()
620 static int test_pem_crls(const char *pem) { in test_pem_crls() argument
621 BIO *bio = BIO_new_mem_buf((char *) pem, strlen(pem)); in test_pem_crls()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml68 ca_cert="/etc/cert/ca.pem"
69 client_cert="/etc/cert/user.pem"
90 ca_cert="/etc/cert/ca.pem"
113 ca_cert="/etc/cert/ca.pem"
133 ca_cert="/etc/cert/ca.pem"
134 client_cert="/etc/cert/user.pem"
162 ca_cert="/etc/cert/ca.pem"
163 client_cert="/etc/cert/user.pem"
167 ca_cert2="/etc/cert/ca2.pem"
168 client_cert2="/etc/cer/user.pem"
[all …]
/external/vboot_reference/tests/futility/
Dtest_sign_keyblocks.sh64 --signprivate_pem ${TESTKEYS}/key_rsa4096.pem \
74 --pem_signpriv ${TESTKEYS}/key_rsa4096.pem \
87 --signprivate_pem ${TESTKEYS}/key_rsa4096.pem \
98 --pem_signpriv ${TESTKEYS}/key_rsa4096.pem \
/external/vboot_reference/
DREADME101 $ openssl genrsa -F4 -out root_key.pem 8192
105 $ openssl genrsa -F4 -out signing_key.pem <1024|2048|4096|8192>
116 $ openssl req -batch -new -x509 -key root_key.pem -out root_key.crt
117 $ openssl req -batch -new -x509 -key signing_key.pem -out signing_key.crt
126 .pem RSA Public/Private Key Pair
134 --root_key root_key.pem \
135 --firmware_sign_key signing_key.pem \
/external/vboot_reference/scripts/image_signing/
Dinsert_au_publickey.sh19 Usage: $PROG <image.bin> <au_public_key.pem>
20 Installs the update verification public key <au_public_key.pem> to <image.bin>.
/external/boringssl/src/ssl/test/runner/
Dtls.go189 var certDERBlock *pem.Block
191 certDERBlock, certPEMBlock = pem.Decode(certPEMBlock)
205 var keyDERBlock *pem.Block
207 keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock)
/external/vboot_reference/tests/
Dgen_test_keys.sh27 openssl genrsa -F4 -out ${key_base}.pem $i
29 openssl req -batch -new -x509 -key ${key_base}.pem \
Drun_vbutil_tests.sh80 --key ${TESTKEY_DIR}/key_rsa${signing_keylen}.pem \
141 ${TESTKEY_DIR}/key_rsa${signing_keylen}.pem \
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-inherit16 certificate_type x509 "my.cert.pem" "my.key.pem";
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/util/io/pem/
DPemObjectGenerator.java1 package org.bouncycastle.util.io.pem;
DPemObjectParser.java1 package org.bouncycastle.util.io.pem;

123