Searched refs:x509 (Results 1 – 11 of 11) sorted by relevance
/system/sepolicy/ |
D | keys.conf | 12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem 15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem 18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem 22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem 23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem 24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
|
/system/ca-certificates/google/ |
D | extract_from_pem.py | 47 def GetFingerprintString(x509): argument 57 return ':'.join(re.findall(r'..', x509.get_fingerprint('sha1').zfill(40))) 77 x509 = M2Crypto.X509.load_cert_string(pem_cert) 78 content = '%s%sSHA1 Fingerprint=%s\n' % (x509.as_pem(), 79 x509.as_text(), 80 GetFingerprintString(x509)) 81 base_name = '%08x' % x509.get_subject().as_hash()
|
/system/connectivity/shill/shims/ |
D | crypto_util.cc | 210 X509* x509 = *x509_ptr; in VerifyCredentialsImpl() local 211 if (!x509) { in VerifyCredentialsImpl() 216 if (X509_verify(x509, pkey) <= 0) { in VerifyCredentialsImpl() 224 x509->cert_info->subject, in VerifyCredentialsImpl() 253 EVP_PKEY* cert_pubkey = X509_get_pubkey(x509); in VerifyCredentialsImpl() 319 X509* x509 = NULL; in VerifyCredentials() local 322 &rsa, &pkey, &raw_certificate_bio, &x509); in VerifyCredentials() 323 if (x509) { in VerifyCredentials() 324 X509_free(x509); in VerifyCredentials() 325 x509 = NULL; in VerifyCredentials()
|
/system/tpm/attestation/server/ |
D | pkcs11_key_store.cc | 620 ScopedX509 x509(d2i_X509(nullptr, &asn1_ptr, certificate.size())); in GetCertificateFields() local 621 if (!x509.get() || !x509->cert_info || !x509->cert_info->subject) { in GetCertificateFields() 626 int length = i2d_X509_NAME(x509->cert_info->subject, &subject_buffer); in GetCertificateFields() 635 length = i2d_X509_NAME(x509->cert_info->issuer, &issuer_buffer); in GetCertificateFields() 644 length = i2d_ASN1_INTEGER(x509->cert_info->serialNumber, in GetCertificateFields()
|
/system/ca-certificates/ |
D | README.cacerts | 4 openssl x509 -subject_hash_old -in filename
|
/system/extras/verity/ |
D | KeystoreSigner.java | 39 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
|
D | BootSignature.java | 44 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
|
D | Utils.java | 56 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
|
/system/ca-certificates/files/ |
D | 7a819ef2.0 | 37 Serial Number: 1289 (0x509)
|
/system/connectivity/shill/doc/ |
D | service-api.txt | 504 An x509 CA certificate in PEM format; specifically 710 x509 CA certificates to be used to verify the remote 712 the server certificate. Each x509 CA certificate 758 additonal x509 CA certificates to be used to complete 760 certificates. Each x509 CA certificate must be in in 1028 passes this as the "--verify-x509-name" argument to 1038 "--verify-x509-name" flag sent to OpenVPN, which 1044 "--verify-x509-name" flag in the OpenVPN documentation
|
D | manager-api.txt | 377 |signed_data|. |certificate| is a x509 certificate in
|