Searched refs:pem (Results 1 – 12 of 12) sorted by relevance
12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
132 static byte[] pemToDer(String pem) throws Exception { in pemToDer() argument133 pem = pem.replaceAll("^-.*", ""); in pemToDer()134 String base64_der = pem.replaceAll("-.*$", ""); in pemToDer()179 static PrivateKey loadPEMPrivateKey(byte[] pem) throws Exception { in loadPEMPrivateKey() argument180 byte[] der = pemToDer(new String(pem)); in loadPEMPrivateKey()198 static PublicKey loadPEMPublicKey(byte[] pem) throws Exception { in loadPEMPublicKey() argument199 byte[] der = pemToDer(new String(pem)); in loadPEMPublicKey()
70 mac_permissions.xml to public keys found in pem files. This script takes79 pem files. The configuration file is processed via m4.82 with specific path to a pem file. Typically TARGET_BUILD_VARIANT is either92 organization and may need to extract the pem file for the insertkeys/keys.conf tools.93 Extraction of the public key in the pem format is possible via openssl. First you need95 openssl pkcs7 -inform DER -in CERT.RSA -out CERT.pem -outform PEM -print_certs97 After extracting the pem, you can rename it, and configure keys.conf and98 mac_permissions.xml to pick up the change. You MUST open the generated pem file in a text102 NOTE: The pem files are base64 encoded and PackageManagerService, mac_permissions.xml
1098 all_plat_keys := $(all_keys:%=$(dir $(DEFAULT_SYSTEM_DEV_CERTIFICATE))/%.x509.pem)
756 $(eval LOCAL_MODULE := ue_$(1).pem) \759 $(eval LOCAL_SRC_FILES := $(1).pem) \762 $(eval LOCAL_MODULE_STEM := $(1).pem) \766 $(eval LOCAL_MODULE := ue_$(1).pub.pem) \771 $(eval LOCAL_MODULE_STEM := $(1).pub.pem) \773 $(eval $(LOCAL_BUILT_MODULE) : $(LOCAL_PATH)/$(1).pem ; \898 ue_unittest_key.pem \899 ue_unittest_key.pub.pem \900 ue_unittest_key2.pem \901 ue_unittest_key2.pub.pem \[all …]
2 /*.pub.pem
433 'unittest_key.pem',434 'unittest_key2.pem',
2 manually synchronized with https://pki.google.com/roots.pem. See
778 std::string pem = CreatePEMCertificate(key.certified_key_credential()); in CreatePEMCertificateChain() local780 pem += "\n"; in CreatePEMCertificateChain()781 pem += CreatePEMCertificate(key.intermediate_ca_cert()); in CreatePEMCertificateChain()784 pem += "\n"; in CreatePEMCertificateChain()785 pem += CreatePEMCertificate(key.additional_intermediate_ca_cert(i)); in CreatePEMCertificateChain()787 return pem; in CreatePEMCertificateChain()795 std::string pem = kBeginCertificate; in CreatePEMCertificate() local796 pem += brillo::data_encoding::Base64EncodeWrapLines(certificate); in CreatePEMCertificate()797 pem += kEndCertificate; in CreatePEMCertificate()798 return pem; in CreatePEMCertificate()
97 std::string pem = kBeginCertificate; in GetFakeCertificateChain() local98 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_cert"); in GetFakeCertificateChain()99 pem += kEndCertificate + "\n" + kBeginCertificate; in GetFakeCertificateChain()100 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert"); in GetFakeCertificateChain()101 pem += kEndCertificate + "\n" + kBeginCertificate; in GetFakeCertificateChain()102 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert2"); in GetFakeCertificateChain()103 pem += kEndCertificate; in GetFakeCertificateChain()104 return pem; in GetFakeCertificateChain()
38 mac_permissions.xml to public keys found in pem files. This