/hardware/interfaces/identity/aidl/vts/ |
D | VtsAttestationParserSupport.cpp | 91 ASN1_OCTET_STRING* AttestationCertificateParser::getAttestationRecord(X509* certificate) { in getAttestationRecord() argument 95 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1); in getAttestationRecord() 98 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in getAttestationRecord()
|
D | VtsAttestationParserSupport.h | 100 ASN1_OCTET_STRING* getAttestationRecord(X509* certificate);
|
/hardware/interfaces/drm/1.2/ |
D | IDrmPlugin.hal | 157 * provisioning server to retrieve a device certificate. getProvisionRequest 164 * @param certificateType the type of certificate requested, e.g. "X.509" 165 * @param certificateAuthority identifies the certificate authority. A 166 * certificate authority (CA) is an entity which issues digital 176 * @return request if successful the opaque certificate request blob
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 165 Vector<uint8_t> certificate; in provideProvisionResponse() local 169 toVector(response), certificate, wrappedKey); in provideProvisionResponse() 171 _hidl_cb(toStatus(legacyStatus), toHidlVec(certificate), in provideProvisionResponse()
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 173 * provisioning server to retrieve a device certificate. getProvisionRequest 177 * @param certificateType the type of certificate requested, e.g. "X.509" 178 * @param certificateAuthority identifies the certificate authority. A 179 * certificate authority (CA) is an entity which issues digital certificates 185 * @return request if successful the opaque certificate request blob 208 * @return certificate the public certificate resulting from the provisioning 209 * operation, if any. An empty vector indicates that no certificate was 216 vec<uint8_t> certificate, vec<uint8_t> wrappedKey);
|
D | types.hal | 111 * This event type indicates that the app needs to request a certificate
|
/hardware/interfaces/wifi/supplicant/1.0/ |
D | ISupplicantStaNetwork.hal | 414 * Set EAP CA certificate file path for this network. 427 * Set EAP CA certificate directory path for this network. 440 * Set EAP Client certificate file path for this network. 810 * Get EAP CA certificate file path set for this network. 822 * Get EAP CA certificate directory path set for this network. 834 * Get EAP Client certificate file path set for this network.
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 645 for (const vector<uint8_t>& certificate : certificateChain) { in certificateChainJoin() local 646 ret.insert(ret.end(), certificate.begin(), certificate.end()); in certificateChainJoin() 1318 vector<uint8_t> certificate; in ecPublicKeyGenerateCertificate() local 1319 certificate.resize(length); in ecPublicKeyGenerateCertificate() 1320 memcpy(certificate.data(), buffer, length); in ecPublicKeyGenerateCertificate() 1322 return certificate; in ecPublicKeyGenerateCertificate()
|
/hardware/interfaces/identity/aidl/default/ |
D | IdentityCredential.cpp | 860 optional<vector<uint8_t>> certificate = support::ecPublicKeyGenerateCertificate( in generateSigningKeyPair() local 863 if (!certificate) { in generateSigningKeyPair() 882 outSigningKeyCertificate->encodedCertificate = certificate.value(); in generateSigningKeyPair()
|
/hardware/interfaces/keymaster/4.1/ |
D | types.hal | 33 * device-unique key is used, only the attestation certificate is returned; no additional
|
/hardware/interfaces/radio/1.1/ |
D | IRadio.hal | 34 * switch and everytime the framework receives a new certificate.
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 648 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in 651 * The certificates in the chain must be ordered such that each certificate is signed by the 652 * subsequent one, up to the root which must be self-signed. The first certificate in the chain 663 * o issuer -- must contain the same value as the Subject field of the next certificate. 670 * date of the batch attestation certificate (see below). 681 * In addition to the above, the attestation certificate must contain an extension with OID 776 * The attestation certificate must be signed by a "batch" key, which must be securely 779 * The batch attestation certificate must be signed by a chain or zero or more intermediates 780 * leading to a self-signed roots. The intermediate and root certificate signing keys must not 786 * included in the signed attestation certificate. [all …]
|
D | types.hal | 207 * certificate for the generated key should contain an application-scoped and time-bounded 1126 /** X.509 certificate format, for public key export. */
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 164 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in 165 * keymaster. The certificate will contain an extension with OID 1.3.6.1.4.1.11129.2.1.17 and
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 338 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument 343 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record() 347 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 270 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument 275 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record() 279 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
|