Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 16 of 16) sorted by relevance

/system/extras/verity/
Dgenerate_verity_key.c67 X509 *cert = NULL; in convert_x509() local
79 cert = PEM_read_X509(f, &cert, NULL, NULL); in convert_x509()
80 if (!cert) { in convert_x509()
85 pkey = X509_get_pubkey(cert); in convert_x509()
108 if (cert) { in convert_x509()
109 X509_free(cert); in convert_x509()
DVeritySigner.java22 import java.security.cert.X509Certificate;
45 X509Certificate cert = Utils.loadPEMCertificate(args[1]); in main() local
46 PublicKey publicKey = cert.getPublicKey(); in main()
DBootSignature.java26 import java.security.cert.X509Certificate;
27 import java.security.cert.Certificate;
28 import java.security.cert.CertificateFactory;
29 import java.security.cert.CertificateEncodingException;
159 public void setCertificate(X509Certificate cert) in setCertificate() argument
161 ASN1InputStream s = new ASN1InputStream(cert.getEncoded()); in setCertificate()
163 publicKey = cert.getPublicKey(); in setCertificate()
272 X509Certificate cert = Utils.loadPEMCertificate(certPath); in doSignature() local
273 bootsig.setCertificate(cert); in doSignature()
DUtils.java35 import java.security.cert.Certificate;
36 import java.security.cert.CertificateFactory;
37 import java.security.cert.X509Certificate;
/system/core/rootdir/
Dfsverity_init.sh22 for cert in /product/etc/security/fsverity/*.der; do
23 /system/bin/mini-keyctl padd asymmetric fsv_product .fs-verity < "$cert" ||
24 log -p e -t fsverity_init "Failed to load $cert"
/system/netd/resolv/dns_responder/
Ddns_tls_frontend.cpp41 bool getSPKIDigest(const X509* cert, std::vector<uint8_t>* out) { in getSPKIDigest() argument
42 int spki_len = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), nullptr); in getSPKIDigest()
45 if (spki_len != i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), &temp)) { in getSPKIDigest()
115 bssl::UniquePtr<X509> cert(X509_new()); in make_cert() local
116 if (!cert) { in make_cert()
121 ASN1_INTEGER_set(X509_get_serialNumber(cert.get()), 1); in make_cert()
124 X509_gmtime_adj(X509_get_notBefore(cert.get()), 0); in make_cert()
125 X509_gmtime_adj(X509_get_notAfter(cert.get()), 60 * 60); in make_cert()
127 X509_set_pubkey(cert.get(), privkey); in make_cert()
129 if (!X509_sign(cert.get(), parent_key, EVP_sha256())) { in make_cert()
[all …]
/system/netd/
DAndroid.bp22 "cert-*",
27 "-cert-err34-c", // TODO: re-enable after removing atoi() and sscanf() calls
37 + ",'cert-*'"
/system/bpf/
DAndroid.bp13 "cert-*",
15 "-cert-err34-c",
/system/keymaster/km_openssl/
Dattestation_utils.cpp50 inline keymaster_blob_t certBlobifier(const uint8_t (&cert)[N], bool* fail){ in certBlobifier()
51 keymaster_blob_t result = { dup_array(cert), N }; in certBlobifier()
111 inline bool certCopier(keymaster_blob_t** out, CERT&& cert, bool* fail) { in certCopier() argument
112 *(*out)++ = certBlobifier(forward<CERT>(cert), fail); in certCopier()
121 inline bool certCopyHelper(keymaster_blob_t** out, bool* fail, CERT&& cert, CERTS&&... certs) { in certCopyHelper() argument
122 certCopier(out, forward<CERT>(cert), fail); in certCopyHelper()
134 inline size_t certCount(CERT&& cert, CERTS&&... certs) { in certCount() argument
135 return noOfCert(forward<CERT>(cert)) + certCount(forward<CERTS>(certs)...); in certCount()
/system/netd/apex/
DAndroid.bp39 // will use cert.pk8 and cert.x509.pem
/system/extras/libperfmgr/
DAndroid.bp34 "cert-*",
38 "-warnings-as-errors=android-*,clang-analyzer-security*,cert-*"
/system/sepolicy/tools/
Dpost_process_mac_perms83 new_stanzas = [stanza % (cert, inner_tag) for cert in cert_diff]
/system/netd/resolv/
DDnsTlsSocket.cpp109 bool getSPKIDigest(const X509* cert, std::vector<uint8_t>* out) { in getSPKIDigest() argument
110 int spki_len = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), nullptr); in getSPKIDigest()
113 if (spki_len != i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), &temp)) { in getSPKIDigest()
274 X509* cert = sk_X509_value(chain, i); in sslConnect() local
276 if (!getSPKIDigest(cert, &digest)) { in sslConnect()
/system/vold/
DAndroid.bp18 "cert-*",
23 "-warnings-as-errors=clang-analyzer-security*,cert-*",
/system/ca-certificates/files/
Db936d1c6.093 CPS: http://www.cert.fnmt.es/dpcs/
/system/keymaster/tests/
Dandroid_keymaster_test.cpp3991 X509_Ptr cert(parse_cert_blob(attestation_cert)); in verify_attestation_record() local
3992 EXPECT_TRUE(!!cert.get()); in verify_attestation_record()
3993 if (!cert.get()) in verify_attestation_record()
3996 ASN1_OCTET_STRING* attest_rec = get_attestation_record(cert.get()); in verify_attestation_record()