Home
last modified time | relevance | path

Searched refs:x509 (Results 1 – 11 of 11) sorted by relevance

/system/sepolicy/
Dkeys.conf12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem
15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem
18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem
22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
/system/ca-certificates/google/
Dextract_from_pem.py47 def GetFingerprintString(x509): argument
57 return ':'.join(re.findall(r'..', x509.get_fingerprint('sha1').zfill(40)))
77 x509 = M2Crypto.X509.load_cert_string(pem_cert)
78 content = '%s%sSHA1 Fingerprint=%s\n' % (x509.as_pem(),
79 x509.as_text(),
80 GetFingerprintString(x509))
81 base_name = '%08x' % x509.get_subject().as_hash()
/system/connectivity/shill/shims/
Dcrypto_util.cc210 X509* x509 = *x509_ptr; in VerifyCredentialsImpl() local
211 if (!x509) { in VerifyCredentialsImpl()
216 if (X509_verify(x509, pkey) <= 0) { in VerifyCredentialsImpl()
224 x509->cert_info->subject, in VerifyCredentialsImpl()
253 EVP_PKEY* cert_pubkey = X509_get_pubkey(x509); in VerifyCredentialsImpl()
319 X509* x509 = NULL; in VerifyCredentials() local
322 &rsa, &pkey, &raw_certificate_bio, &x509); in VerifyCredentials()
323 if (x509) { in VerifyCredentials()
324 X509_free(x509); in VerifyCredentials()
325 x509 = NULL; in VerifyCredentials()
/system/tpm/attestation/server/
Dpkcs11_key_store.cc620 ScopedX509 x509(d2i_X509(nullptr, &asn1_ptr, certificate.size())); in GetCertificateFields() local
621 if (!x509.get() || !x509->cert_info || !x509->cert_info->subject) { in GetCertificateFields()
626 int length = i2d_X509_NAME(x509->cert_info->subject, &subject_buffer); in GetCertificateFields()
635 length = i2d_X509_NAME(x509->cert_info->issuer, &issuer_buffer); in GetCertificateFields()
644 length = i2d_ASN1_INTEGER(x509->cert_info->serialNumber, in GetCertificateFields()
/system/ca-certificates/
DREADME.cacerts4 openssl x509 -subject_hash_old -in filename
/system/extras/verity/
DKeystoreSigner.java39 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
DBootSignature.java44 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
DUtils.java56 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
/system/ca-certificates/files/
D7a819ef2.037 Serial Number: 1289 (0x509)
/system/connectivity/shill/doc/
Dservice-api.txt504 An x509 CA certificate in PEM format; specifically
710 x509 CA certificates to be used to verify the remote
712 the server certificate. Each x509 CA certificate
758 additonal x509 CA certificates to be used to complete
760 certificates. Each x509 CA certificate must be in in
1028 passes this as the "--verify-x509-name" argument to
1038 "--verify-x509-name" flag sent to OpenVPN, which
1044 "--verify-x509-name" flag in the OpenVPN documentation
Dmanager-api.txt377 |signed_data|. |certificate| is a x509 certificate in