/system/webservd/webservd/ |
D | utils.cc | 60 auto cert = X509Ptr{X509_new(), X509_free}; in CreateCertificate() 61 CHECK(cert.get()); in CreateCertificate() 62 X509_set_version(cert.get(), 2); // Using X.509 v3 certificate... in CreateCertificate() 65 ASN1_INTEGER* sn = X509_get_serialNumber(cert.get()); in CreateCertificate() 68 X509_time_adj(X509_get_notBefore(cert.get()), 0, ¤t_time); in CreateCertificate() 69 X509_time_adj(X509_get_notAfter(cert.get()), cert_expiration.InSeconds(), in CreateCertificate() 73 X509_NAME* name = X509_get_subject_name(cert.get()); in CreateCertificate() 80 X509_set_issuer_name(cert.get(), name); in CreateCertificate() 81 return cert; in CreateCertificate() 120 brillo::Blob StoreCertificate(X509* cert) { in StoreCertificate() argument [all …]
|
D | server.cc | 180 auto cert = LoadAndValidateCertificate(certificate_file); in InitTlsData() local 183 if (!cert || private_key.empty()) { in InitTlsData() 187 cert = CreateCertificate(cert_serial_number, kCertExpiration, kCommonName); in InitTlsData() 203 CHECK(X509_set_pubkey(cert.get(), key.get())); in InitTlsData() 206 CHECK(X509_sign(cert.get(), key.get(), EVP_sha256())); in InitTlsData() 209 StoreCertificate(cert.get(), certificate_file); in InitTlsData() 216 TLS_certificate_ = StoreCertificate(cert.get()); in InitTlsData() 217 TLS_certificate_fingerprint_ = GetSha256Fingerprint(cert.get()); in InitTlsData()
|
D | utils.h | 47 brillo::Blob StoreCertificate(X509* cert); 50 bool StoreCertificate(X509* cert, const base::FilePath& file); 54 brillo::Blob GetSha256Fingerprint(X509* cert);
|
/system/extras/verity/ |
D | generate_verity_key.c | 120 X509 *cert = NULL; in convert_x509() local 132 cert = PEM_read_X509(f, &cert, NULL, NULL); in convert_x509() 133 if (!cert) { in convert_x509() 138 pkey = X509_get_pubkey(cert); in convert_x509() 161 if (cert) { in convert_x509() 162 X509_free(cert); in convert_x509()
|
D | BootSignature.java | 26 import java.security.cert.X509Certificate; 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.CertificateEncodingException; 148 public void setCertificate(X509Certificate cert) in setCertificate() argument 150 ASN1InputStream s = new ASN1InputStream(cert.getEncoded()); in setCertificate() 152 publicKey = cert.getPublicKey(); in setCertificate() 241 X509Certificate cert = Utils.loadPEMCertificate(certPath); in doSignature() local 242 bootsig.setCertificate(cert); in doSignature()
|
D | VeritySigner.java | 22 import java.security.cert.X509Certificate; 45 X509Certificate cert = Utils.loadPEMCertificate(args[1]); in main() local 46 PublicKey publicKey = cert.getPublicKey(); in main()
|
D | KeystoreSigner.java | 24 import java.security.cert.X509Certificate; 105 public void setCertificate(X509Certificate cert) { in setCertificate() argument 106 certificate = cert; in setCertificate()
|
D | VerityVerifier.java | 31 import java.security.cert.X509Certificate; 399 X509Certificate cert = Utils.loadPEMCertificate(args[1]); in main() local 400 key = cert.getPublicKey(); in main()
|
D | Utils.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.X509Certificate;
|
/system/core/libmincrypt/tools/ |
D | DumpPublicKey.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 241 X509Certificate cert = (X509Certificate) cf.generateCertificate(input); in main() local 244 String sigAlg = cert.getSigAlgName(); in main() 259 PublicKey key = cert.getPublicKey(); in main()
|
/system/sepolicy/tools/ |
D | post_process_mac_perms | 83 new_stanzas = [stanza % (cert, inner_tag) for cert in cert_diff]
|
/system/ca-certificates/files/ |
D | 33815e15.0 | 105 URI:http://cert.startcom.org/sfsca-crl.crl 112 CPS: http://cert.startcom.org/policy.pdf 113 CPS: http://cert.startcom.org/intermediate.pdf 117 …tions* of the StartCom Certification Authority Policy available at http://cert.startcom.org/policy…
|
/system/tpm/attestation/common/ |
D | attestation_ca.proto | 26 // The EK cert, in X.509 form, encrypted using the server's public key with 64 // The AIK cert in X.509 format. 106 // The AIK cert, in X.509 form, encrypted using the server's public key with 116 // The EK cert, in X.509 form, encrypted using the server's public key with
|
/system/connectivity/shill/doc/ |
D | service-api.txt | 725 authentication. See the "--cert" option in the 812 "--ns-cert-type" option in the OpenVPN documentation. 908 "--remote-cert-eku" option in the OpenVPN 917 "--remote-cert-ku" option in the OpenVPN 926 RFC3280 TLS rules. See the "--remote-cert-tls" option
|
/system/keymaster/ |
D | android_keymaster_test.cpp | 3551 X509_Ptr cert(parse_cert_blob(attestation_cert)); in verify_attestation_record() local 3552 EXPECT_TRUE(!!cert.get()); in verify_attestation_record() 3553 if (!cert.get()) in verify_attestation_record() 3556 ASN1_OCTET_STRING* attest_rec = get_attestation_record(cert.get()); in verify_attestation_record()
|