Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 16 of 16) sorted by relevance

/hardware/interfaces/identity/aidl/vts/
DVtsAttestationParserSupport.cpp91 ASN1_OCTET_STRING* AttestationCertificateParser::getAttestationRecord(X509* certificate) { in getAttestationRecord() argument
95 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1); in getAttestationRecord()
98 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in getAttestationRecord()
DVtsAttestationParserSupport.h100 ASN1_OCTET_STRING* getAttestationRecord(X509* certificate);
/hardware/interfaces/drm/1.2/
DIDrmPlugin.hal157 * provisioning server to retrieve a device certificate. getProvisionRequest
164 * @param certificateType the type of certificate requested, e.g. "X.509"
165 * @param certificateAuthority identifies the certificate authority. A
166 * certificate authority (CA) is an entity which issues digital
176 * @return request if successful the opaque certificate request blob
/hardware/interfaces/drm/1.0/default/
DDrmPlugin.cpp165 Vector<uint8_t> certificate; in provideProvisionResponse() local
169 toVector(response), certificate, wrappedKey); in provideProvisionResponse()
171 _hidl_cb(toStatus(legacyStatus), toHidlVec(certificate), in provideProvisionResponse()
/hardware/interfaces/drm/1.0/
DIDrmPlugin.hal173 * provisioning server to retrieve a device certificate. getProvisionRequest
177 * @param certificateType the type of certificate requested, e.g. "X.509"
178 * @param certificateAuthority identifies the certificate authority. A
179 * certificate authority (CA) is an entity which issues digital certificates
185 * @return request if successful the opaque certificate request blob
208 * @return certificate the public certificate resulting from the provisioning
209 * operation, if any. An empty vector indicates that no certificate was
216 vec<uint8_t> certificate, vec<uint8_t> wrappedKey);
Dtypes.hal111 * This event type indicates that the app needs to request a certificate
/hardware/interfaces/wifi/supplicant/1.0/
DISupplicantStaNetwork.hal414 * Set EAP CA certificate file path for this network.
427 * Set EAP CA certificate directory path for this network.
440 * Set EAP Client certificate file path for this network.
810 * Get EAP CA certificate file path set for this network.
822 * Get EAP CA certificate directory path set for this network.
834 * Get EAP Client certificate file path set for this network.
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp645 for (const vector<uint8_t>& certificate : certificateChain) { in certificateChainJoin() local
646 ret.insert(ret.end(), certificate.begin(), certificate.end()); in certificateChainJoin()
1318 vector<uint8_t> certificate; in ecPublicKeyGenerateCertificate() local
1319 certificate.resize(length); in ecPublicKeyGenerateCertificate()
1320 memcpy(certificate.data(), buffer, length); in ecPublicKeyGenerateCertificate()
1322 return certificate; in ecPublicKeyGenerateCertificate()
/hardware/interfaces/identity/aidl/default/
DIdentityCredential.cpp860 optional<vector<uint8_t>> certificate = support::ecPublicKeyGenerateCertificate( in generateSigningKeyPair() local
863 if (!certificate) { in generateSigningKeyPair()
882 outSigningKeyCertificate->encodedCertificate = certificate.value(); in generateSigningKeyPair()
/hardware/interfaces/keymaster/4.1/
Dtypes.hal33 * device-unique key is used, only the attestation certificate is returned; no additional
/hardware/interfaces/radio/1.1/
DIRadio.hal34 * switch and everytime the framework receives a new certificate.
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal648 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in
651 * The certificates in the chain must be ordered such that each certificate is signed by the
652 * subsequent one, up to the root which must be self-signed. The first certificate in the chain
663 * o issuer -- must contain the same value as the Subject field of the next certificate.
670 * date of the batch attestation certificate (see below).
681 * In addition to the above, the attestation certificate must contain an extension with OID
776 * The attestation certificate must be signed by a "batch" key, which must be securely
779 * The batch attestation certificate must be signed by a chain or zero or more intermediates
780 * leading to a self-signed roots. The intermediate and root certificate signing keys must not
786 * included in the signed attestation certificate.
[all …]
Dtypes.hal207 * certificate for the generated key should contain an application-scoped and time-bounded
1126 /** X.509 certificate format, for public key export. */
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal164 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in
165 * keymaster. The certificate will contain an extension with OID 1.3.6.1.4.1.11129.2.1.17 and
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp338 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument
343 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record()
347 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp270 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument
275 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record()
279 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()