/system/keymaster/km_openssl/ |
D | certificate_utils.cpp | 253 X509_Ptr certificate(X509_new()); in make_cert_rump() local 254 if (!certificate.get()) return TranslateLastOpenSslError(); in make_cert_rump() 257 if (!X509_set_version(certificate.get(), 2 /* version 3 */)) return TranslateLastOpenSslError(); in make_cert_rump() 263 !X509_set_serialNumber(certificate.get(), in make_cert_rump() 268 if (!X509_set_subject_name(certificate.get(), in make_cert_rump() 273 if (!X509_set_issuer_name(certificate.get(), const_cast<X509_NAME*>(issuer))) { in make_cert_rump() 282 !X509_set_notBefore(certificate.get(), notBefore.get() /* Don't release; copied */)) { in make_cert_rump() 292 !X509_set_notAfter(certificate.get(), notAfter.get() /* Don't release; copied */)) { in make_cert_rump() 296 *cert_out = move(certificate); in make_cert_rump() 304 X509_Ptr certificate; in make_cert() local [all …]
|
D | attestation_utils.cpp | 35 CertificateChain make_cert_chain(X509* certificate, CertificateChain chain, in make_cert_chain() argument 38 *error = encode_certificate(certificate, &blob); in make_cert_chain() 113 X509* certificate) { in add_attestation_extension() argument 127 if (!X509_add_ext(certificate, attest_extension.get() /* Don't release; copied */, in add_attestation_extension() 143 X509_Ptr certificate; in make_attestation_cert() local 144 if (auto error = make_cert(evp_pkey, issuer, cert_params, &certificate)) { in make_attestation_cert() 150 certificate.get())) { in make_attestation_cert() 154 *cert_out = move(certificate); in make_attestation_cert() 313 X509_Ptr certificate; in generate_attestation() local 315 tee_enforced, sw_enforced, context, &certificate); in generate_attestation() [all …]
|
/system/apex/apexer/testdata/ |
D | Android.bp | 20 name: "com.android.example.apex.certificate", 23 certificate: "com.android.example.apex", 38 certificate: ":com.android.example.apex.certificate", 50 certificate: ":com.android.example.apex.certificate", 62 certificate: ":com.android.example.apex.certificate", 74 certificate: ":com.android.example.apex.certificate",
|
/system/security/keystore2/src/crypto/ |
D | certificate_utils.cpp | 222 X509_Ptr certificate(X509_new()); in makeCertRump() local 223 if (!certificate) { in makeCertRump() 228 if (!X509_set_version(certificate.get(), 2 /* version 3, but zero-based */)) { in makeCertRump() 249 !X509_set_serialNumber(certificate.get(), serialNumber.get() /* Don't release; copied */)) in makeCertRump() 255 if (!X509_set_subject_name(certificate.get(), x509_subject->get() /* copied */)) { in makeCertRump() 269 !X509_set_notBefore(certificate.get(), notBefore.get() /* Don't release; copied */)) in makeCertRump() 280 !X509_set_notAfter(certificate.get(), notAfter.get() /* Don't release; copied */)) { in makeCertRump() 284 return certificate; in makeCertRump() 301 auto certificate = std::move(std::get<X509_Ptr>(certificateV)); in makeCert() local 304 if (!X509_set_pubkey(certificate.get(), const_cast<EVP_PKEY*>(evp_pkey))) { in makeCert() [all …]
|
/system/bt/apex/ |
D | Android.bp | 25 certificate: ":com.android.bluetooth.updatable.certificate", 35 name: "com.android.bluetooth.updatable.certificate", 36 certificate: "com.android.bluetooth.updatable",
|
/system/tools/aidl/build/apex/ |
D | Android.bp | 15 certificate: ":com.android.aidltest.certificate", 31 name: "com.android.aidltest.certificate", 32 certificate: "com.android.aidltest",
|
/system/timezone/apex/ |
D | Android.bp | 38 certificate: ":com.android.tzdata.certificate", 53 name: "com.android.tzdata.certificate", 54 certificate: "com.android.tzdata",
|
/system/security/keystore2/src/crypto/include/ |
D | certificate_utils.h | 119 CertUtilsError signCert(X509* certificate, EVP_PKEY* signing_key); 167 CertUtilsError signCertWith(X509* certificate, 177 std::variant<CertUtilsError, std::vector<uint8_t>> encodeCert(X509* certificate);
|
/system/keymaster/include/keymaster/km_openssl/ |
D | certificate_utils.h | 66 keymaster_error_t sign_cert(X509* certificate, const EVP_PKEY* signing_key); 75 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* derCert);
|
/system/update_engine/ |
D | certificate_checker.cc | 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); in GetCertificateDigest() local 43 TEST_AND_RETURN_FALSE(certificate); in GetCertificateDigest() 50 bool success = X509_digest(certificate, digest_function, out_digest, &len); in GetCertificateDigest()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | KeyMetadata.aidl | 41 @nullable byte[] certificate;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | KeyMetadata.aidl | 41 @nullable byte[] certificate;
|
/system/extras/verity/ |
D | BootSignature.java | 67 private ASN1Encodable certificate; field in BootSignature 112 certificate = sequence.getObjectAt(1); in BootSignature() 113 byte[] encoded = ((ASN1Object) certificate).getEncoded(); in BootSignature() 162 certificate = s.readObject(); in setCertificate() 193 v.add(certificate); in toASN1Primitive()
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | KeyMetadata.aidl | 53 @nullable byte[] certificate;
|
/system/apex/tests/ |
D | Android.bp | 92 certificate: ":apex.test.certificate", 105 name: "apex.test.certificate", 107 certificate: "testdata/testcert",
|
/system/security/keystore2/src/km_compat/ |
D | certificate_test.cpp | 81 static void verify(const Certificate& certificate) { in verify() argument 82 const uint8_t* p = certificate.encodedCertificate.data(); in verify() 83 X509_Ptr decoded_cert(d2i_X509(nullptr, &p, (long)certificate.encodedCertificate.size())); in verify()
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.baz/ |
D | Android.bp | 25 name: "com.android.apex.test.baz.certificate", 26 certificate: "com.android.apex.test.baz",
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.bar/ |
D | Android.bp | 25 name: "com.android.apex.test.bar.certificate", 26 certificate: "com.android.apex.test.bar",
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.foo/ |
D | Android.bp | 25 name: "com.android.apex.test.foo.certificate", 26 certificate: "com.android.apex.test.foo",
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.pony/ |
D | Android.bp | 25 name: "com.android.apex.test.pony.certificate", 26 certificate: "com.android.apex.test.pony",
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.sharedlibs_secondary/ |
D | Android.bp | 25 name: "com.android.apex.test.sharedlibs_secondary.certificate", 26 certificate: "com.android.apex.test.sharedlibs_secondary",
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.sharedlibs/ |
D | Android.bp | 25 name: "com.android.apex.test.sharedlibs.certificate", 26 certificate: "com.android.apex.test.sharedlibs",
|
/system/security/identity/ |
D | WritableCredential.cpp | 212 Certificate certificate; in personalize() local 213 certificate.encodedCertificate = acpParcel.readerCertificate; in personalize() 216 acpParcel.id, certificate, acpParcel.userAuthenticationRequired, in personalize()
|
D | CredentialData.cpp | 125 array.add(data.certificate); in saveToDisk() 199 authKeyData.certificate = itemCertificate->value(); in parseAuthKeyData() 520 if (data.certificate.size() != 0) { in findAuthKey_() 575 (data.certificate.size() == 0) || keyExceedUseCount || keyBeyondExpirationDate; in getAuthKeysNeedingCertification() 602 data.certificate = data.pendingCertificate; in storeStaticAuthenticationData()
|
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
D | keystore.cpp | 153 } else if (!ca_cert && response.metadata.certificate) { in keyStore2GetCert() 154 return std::move(*response.metadata.certificate); in keyStore2GetCert() 192 if (!response.metadata.certificate) { in keyStore2GetPubKey() 197 std::optional<std::vector<uint8_t>> pub_key(extractPubKey(*response.metadata.certificate)); in keyStore2GetPubKey()
|