/system/keymaster/km_openssl/ |
D | attestation_utils.cpp | 73 inline keymaster_blob_t certBlobifier(X509* certificate, bool* fail){ in certBlobifier() argument 74 int len = i2d_X509(certificate, nullptr); in certBlobifier() 87 i2d_X509(certificate, &p); in certBlobifier() 202 X509* certificate) { in add_key_usage_extension() argument 262 if (!X509_add_ext(certificate, key_usage_extension.get() /* Don't release; copied */, in add_key_usage_extension() 270 bool add_public_key(const EVP_PKEY* key, X509* certificate, keymaster_error_t* error) { in add_public_key() argument 271 if (!X509_set_pubkey(certificate, (EVP_PKEY*)key)) { in add_public_key() 282 const uint keymaster_version, X509* certificate, in add_attestation_extension() argument 290 if (!X509_add_ext(certificate, attest_extension.get() /* Don't release; copied */, in add_attestation_extension() 320 X509_Ptr certificate(X509_new()); in generate_attestation_common() local [all …]
|
/system/apex/apexer/testdata/ |
D | Android.bp | 16 name: "com.android.example.apex.certificate", 19 certificate: "com.android.example.apex", 34 certificate: ":com.android.example.apex.certificate", 44 certificate: ":com.android.example.apex.certificate", 55 certificate: ":com.android.example.apex.certificate", 66 certificate: ":com.android.example.apex.certificate",
|
/system/bt/apex/ |
D | Android.bp | 15 certificate: ":com.android.bluetooth.updatable.certificate", 25 name: "com.android.bluetooth.updatable.certificate", 26 certificate: "com.android.bluetooth.updatable",
|
/system/core/adb/apex/ |
D | Android.bp | 21 certificate: ":com.android.adbd.certificate", 53 name: "com.android.adbd.certificate", 54 certificate: "com.android.adbd",
|
/system/timezone/apex/ |
D | Android.bp | 31 certificate: ":com.android.tzdata.certificate", 46 name: "com.android.tzdata.certificate", 47 certificate: "com.android.tzdata",
|
/system/update_engine/ |
D | certificate_checker.cc | 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); in GetCertificateDigest() local 43 TEST_AND_RETURN_FALSE(certificate); in GetCertificateDigest() 50 bool success = X509_digest(certificate, digest_function, out_digest, &len); in GetCertificateDigest()
|
/system/apex/tests/ |
D | Android.bp | 93 certificate: ":apex.test.certificate", 105 name: "apex.test.certificate", 107 certificate: "testdata/testcert",
|
/system/extras/verity/ |
D | BootSignature.java | 67 private ASN1Encodable certificate; field in BootSignature 112 certificate = sequence.getObjectAt(1); in BootSignature() 113 byte[] encoded = ((ASN1Object) certificate).getEncoded(); in BootSignature() 162 certificate = s.readObject(); in setCertificate() 193 v.add(certificate); in toASN1Primitive()
|
/system/core/adb/client/pairing/tests/ |
D | pairing_server.h | 62 const Data& certificate, const Data& priv_key,
|
/system/core/adb/client/pairing/ |
D | pairing_client.h | 61 const Data& certificate, const Data& priv_key);
|
/system/core/adb/pairing_connection/tests/ |
D | pairing_client.h | 61 const Data& certificate, const Data& priv_key);
|
/system/security/identity/ |
D | WritableCredential.cpp | 192 Certificate certificate; in personalize() local 193 certificate.encodedCertificate = acpParcel.readerCertificate; in personalize() 196 acpParcel.id, certificate, acpParcel.userAuthenticationRequired, in personalize()
|
D | CredentialData.cpp | 122 array.add(data.certificate); in saveToDisk() 187 authKeyData.certificate = itemCertificate->value(); in parseAuthKeyData() 496 if (data.certificate.size() != 0) { in selectAuthKey() 523 bool newKeyNeeded = (data.certificate.size() == 0) || (data.useCount >= maxUsesPerKey_); in getAuthKeysNeedingCertification() 549 data.certificate = data.pendingCertificate; in storeStaticAuthenticationData()
|
D | CredentialData.h | 56 vector<uint8_t> certificate; member
|
/system/gsid/tests/ |
D | Android.bp | 67 certificate: "platform",
|
/system/apex/docs/ |
D | README.md | 260 certificate: "platform", 396 To sign an APEX at the file-level, set the `certificate` property in one of 399 - Not set: If no value is set, the APEX is signed with the certificate located 402 - `<name>`: The APEX is signed with the `<name>` certificate in the same 404 - `:<name>`: The APEX is signed with the certificate that is defined by the 405 Soong module named `<name>`. The certificate module can be defined as 411 certificate: "dir/cert", 416 Note: The `key` and `certificate` values do NOT need to be derived from the same 417 public/private key pairs. APK signing (specified by `certificate`) is required
|
/system/tools/aidl/ |
D | Android.bp | 329 certificate: "platform",
|
/system/core/adb/pairing_connection/ |
D | pairing_connection.cpp | 79 const Data& certificate, const Data& priv_key);
|
/system/apex/shim/build/ |
D | Android.bp | 246 certificate: ":com.android.apex.cts.shim.debug.cert", 251 certificate: "com.android.apex.cts.shim.debug.cert",
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 3963 static ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument 3969 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record() 3974 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
|