Home
last modified time | relevance | path

Searched refs:pem (Results 1 – 12 of 12) sorted by relevance

/system/sepolicy/prebuilts/api/26.0/private/
Dkeys.conf12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem
15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem
18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem
22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
/system/sepolicy/private/
Dkeys.conf12 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/platform.x509.pem
15 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/media.x509.pem
18 ALL : $DEFAULT_SYSTEM_DEV_CERTIFICATE/shared.x509.pem
22 ENG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
24 USERDEBUG : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
/system/extras/verity/
DUtils.java132 static byte[] pemToDer(String pem) throws Exception { in pemToDer() argument
133 pem = pem.replaceAll("^-.*", ""); in pemToDer()
134 String base64_der = pem.replaceAll("-.*$", ""); in pemToDer()
179 static PrivateKey loadPEMPrivateKey(byte[] pem) throws Exception { in loadPEMPrivateKey() argument
180 byte[] der = pemToDer(new String(pem)); in loadPEMPrivateKey()
198 static PublicKey loadPEMPublicKey(byte[] pem) throws Exception { in loadPEMPublicKey() argument
199 byte[] der = pemToDer(new String(pem)); in loadPEMPublicKey()
/system/sepolicy/
DREADME70 mac_permissions.xml to public keys found in pem files. This script takes
79 pem files. The configuration file is processed via m4.
82 with specific path to a pem file. Typically TARGET_BUILD_VARIANT is either
92 organization and may need to extract the pem file for the insertkeys/keys.conf tools.
93 Extraction of the public key in the pem format is possible via openssl. First you need
95 openssl pkcs7 -inform DER -in CERT.RSA -out CERT.pem -outform PEM -print_certs
97 After extracting the pem, you can rename it, and configure keys.conf and
98 mac_permissions.xml to pick up the change. You MUST open the generated pem file in a text
102 NOTE: The pem files are base64 encoded and PackageManagerService, mac_permissions.xml
DAndroid.mk1098 all_plat_keys := $(all_keys:%=$(dir $(DEFAULT_SYSTEM_DEV_CERTIFICATE))/%.x509.pem)
/system/update_engine/
DAndroid.mk756 $(eval LOCAL_MODULE := ue_$(1).pem) \
759 $(eval LOCAL_SRC_FILES := $(1).pem) \
762 $(eval LOCAL_MODULE_STEM := $(1).pem) \
766 $(eval LOCAL_MODULE := ue_$(1).pub.pem) \
771 $(eval LOCAL_MODULE_STEM := $(1).pub.pem) \
773 $(eval $(LOCAL_BUILT_MODULE) : $(LOCAL_PATH)/$(1).pem ; \
898 ue_unittest_key.pem \
899 ue_unittest_key.pub.pem \
900 ue_unittest_key2.pem \
901 ue_unittest_key2.pub.pem \
[all …]
D.gitignore2 /*.pub.pem
Dupdate_engine.gyp433 'unittest_key.pem',
434 'unittest_key2.pem',
/system/ca-certificates/google/
DREADME2 manually synchronized with https://pki.google.com/roots.pem. See
/system/tpm/attestation/server/
Dattestation_service.cc778 std::string pem = CreatePEMCertificate(key.certified_key_credential()); in CreatePEMCertificateChain() local
780 pem += "\n"; in CreatePEMCertificateChain()
781 pem += CreatePEMCertificate(key.intermediate_ca_cert()); in CreatePEMCertificateChain()
784 pem += "\n"; in CreatePEMCertificateChain()
785 pem += CreatePEMCertificate(key.additional_intermediate_ca_cert(i)); in CreatePEMCertificateChain()
787 return pem; in CreatePEMCertificateChain()
795 std::string pem = kBeginCertificate; in CreatePEMCertificate() local
796 pem += brillo::data_encoding::Base64EncodeWrapLines(certificate); in CreatePEMCertificate()
797 pem += kEndCertificate; in CreatePEMCertificate()
798 return pem; in CreatePEMCertificate()
Dattestation_service_test.cc97 std::string pem = kBeginCertificate; in GetFakeCertificateChain() local
98 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_cert"); in GetFakeCertificateChain()
99 pem += kEndCertificate + "\n" + kBeginCertificate; in GetFakeCertificateChain()
100 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert"); in GetFakeCertificateChain()
101 pem += kEndCertificate + "\n" + kBeginCertificate; in GetFakeCertificateChain()
102 pem += brillo::data_encoding::Base64EncodeWrapLines("fake_ca_cert2"); in GetFakeCertificateChain()
103 pem += kEndCertificate; in GetFakeCertificateChain()
104 return pem; in GetFakeCertificateChain()
/system/sepolicy/tools/
DREADME38 mac_permissions.xml to public keys found in pem files. This