Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 25 of 55) sorted by relevance

123

/system/extras/verity/
Dgenerate_verity_key.c67 X509 *cert = NULL; in convert_x509() local
79 cert = PEM_read_X509(f, &cert, NULL, NULL); in convert_x509()
80 if (!cert) { in convert_x509()
85 pkey = X509_get_pubkey(cert); in convert_x509()
108 if (cert) { in convert_x509()
109 X509_free(cert); in convert_x509()
DVeritySigner.java22 import java.security.cert.X509Certificate;
45 X509Certificate cert = Utils.loadPEMCertificate(args[1]); in main() local
46 PublicKey publicKey = cert.getPublicKey(); in main()
DBootSignature.java26 import java.security.cert.X509Certificate;
27 import java.security.cert.Certificate;
28 import java.security.cert.CertificateFactory;
29 import java.security.cert.CertificateEncodingException;
159 public void setCertificate(X509Certificate cert) in setCertificate() argument
161 ASN1InputStream s = new ASN1InputStream(cert.getEncoded()); in setCertificate()
163 publicKey = cert.getPublicKey(); in setCertificate()
272 X509Certificate cert = Utils.loadPEMCertificate(certPath); in doSignature() local
273 bootsig.setCertificate(cert); in doSignature()
/system/netd/
DAndroid.bp67 "cert-*",
75 "-cert-dcl50-cpp",
76 "-cert-err34-c", // TODO: re-enable after removing atoi() and sscanf() calls
77 "-cert-oop54-cpp", // found in DnsResolver/stats.pb.h
91 "cert-*",
/system/security/keystore2/src/crypto/tests/
Dcertificate_utils_test.cpp179 auto& cert = std::get<X509_Ptr>(certV); in TEST_P() local
180 ASSERT_TRUE(!setIssuer(cert.get(), cert.get(), true)); in TEST_P()
183 cert.get(), in TEST_P()
197 auto encCertV = encodeCert(cert.get()); in TEST_P()
278 auto& cert = std::get<X509_Ptr>(certV); in TEST_P() local
279 ASSERT_TRUE(!setIssuer(cert.get(), cert.get(), true)); in TEST_P()
282 cert.get(), in TEST_P()
304 auto encCertV = encodeCert(cert.get()); in TEST_P()
/system/keymint/ta/src/
Dkeys.rs3 use crate::{cert, device, AttestationChainInfo};
66 pub key_params: cert::AuthorizationList<'a>,
100 let issuer = cert::extract_subject( in get_signing_info()
126 let key_usage_ext_bits = cert::key_usage_extension_bits(params); in generate_cert()
127 let key_usage_ext_val = cert::asn1_der_encode(&key_usage_ext_bits)?; in generate_cert()
133 let basic_constraints = cert::basic_constraints_ext_value(true); in generate_cert()
134 Some(cert::asn1_der_encode(&basic_constraints)?) in generate_cert()
144 let attest_ext = cert::attestation_extension( in generate_cert()
156 Some(cert::asn1_der_encode(&attest_ext)?) in generate_cert()
161 let tbs_cert = cert::tbs_certificate( in generate_cert()
[all …]
/system/incremental_delivery/libdataloader/
DAndroid.bp53 "cert-*",
55 "-cert-err34-c",
61 "-cert-dcl50-cpp",
63 "-cert-oop54-cpp",
/system/security/keystore2/src/
Dattestation_key_utils.rs86 let (key_id_guard, blob, cert, blob_metadata) = in get_user_generated_attestation_key()
90 let issuer_subject: Vec<u8> = parse_subject_from_certificate(&cert) in get_user_generated_attestation_key()
119 let cert = key_entry in load_attest_key_blob_and_cert() localVariable
123 Ok((key_id_guard, blob, cert, blob_metadata)) in load_attest_key_blob_and_cert()
/system/security/ondevice-signing/
DCertUtils.cpp53 bssl::UniquePtr<X509> cert(rawCert); in loadX509() local
56 return cert; in loadX509()
65 static bool add_ext(X509V3_CTX* context, X509* cert, int nid, const char* value) { in add_ext() argument
71 X509_add_ext(cert, ex.get(), -1); in add_ext()
348 auto cert = loadX509(path); in extractPublicKeyFromX509() local
349 if (!cert.ok()) { in extractPublicKeyFromX509()
350 return cert.error(); in extractPublicKeyFromX509()
352 return extractPublicKey(X509_get_pubkey(cert.value().get())); in extractPublicKeyFromX509()
379 auto cert = loadX509(path); in verifyAndExtractCertInfoFromX509() local
380 if (!cert.ok()) { in verifyAndExtractCertInfoFromX509()
[all …]
DKeystoreKey.cpp123 auto cert = metadata.certificate; in createKey() local
124 if (!cert) { in createKey()
127 auto publicKey = extractPublicKeyFromX509(cert.value()); in createKey()
221 auto cert = keyEntryResponse.metadata.certificate; in verifyExistingKey() local
222 if (!cert) { in verifyExistingKey()
225 auto publicKey = extractPublicKeyFromX509(cert.value()); in verifyExistingKey()
/system/keymaster/km_openssl/
Dcertificate_utils.cpp47 keymaster_error_t fake_sign_cert(X509* cert) { in fake_sign_cert() argument
56 if (!X509_set1_signature_algo(cert, algor.get()) || in fake_sign_cert()
57 !X509_set1_signature_value(cert, &fake_sig, sizeof(fake_sig))) { in fake_sign_cert()
364 X509_Ptr cert; in generate_self_signed_cert() local
365 *error = make_cert(pkey.get(), cert_params.subject_name.get() /* issuer */, cert_params, &cert); in generate_self_signed_cert()
369 *error = fake_sign_cert(cert.get()); in generate_self_signed_cert()
371 *error = sign_cert(cert.get(), pkey.get()); in generate_self_signed_cert()
381 *error = encode_certificate(cert.get(), &result.entries[0]); in generate_self_signed_cert()
Dopenssl_utils.cpp165 X509_Ptr cert(d2i_X509(NULL, &temp, km_cert->data_length)); in GetEcdsa256KeyFromCert() local
166 if (!cert.get()) return TranslateLastOpenSslError(); in GetEcdsa256KeyFromCert()
167 EVP_PKEY_Ptr pubKey(X509_get_pubkey(cert.get())); in GetEcdsa256KeyFromCert()
/system/update_engine/payload_consumer/
Dcertificate_parser_android.cc93 for (const auto& cert : pem_certs) { in ReadPublicKeysFromCertificates() local
95 BIO_new_mem_buf(cert.data(), cert.size()), BIO_free); in ReadPublicKeysFromCertificates()
/system/core/libsysutils/
DAndroid.bp37 "cert-*",
42 "cert-*",
/system/bpf/
DAndroid.bp30 "cert-*",
31 "-cert-err34-c",
/system/security/keystore2/tests/
Dffi_test_utils.cpp101 aidl::android::hardware::security::keymint::Certificate& cert) { in extractCertFromCertChainBuffer() argument
144 cert.encodedCertificate = std::move(cert_bytes); in extractCertFromCertChainBuffer()
162 aidl::android::hardware::security::keymint::Certificate cert = in getCertificateChain() local
164 if (extractCertFromCertChainBuffer(data, data_size, index, cert) != ErrorCode::OK) { in getCertificateChain()
167 certChain.push_back(std::move(cert)); in getCertificateChain()
/system/hardware/interfaces/wifi/keystore/1.0/default/test/
DWifiLegacyKeystoreIntegrationTest.cpp455 auto cert = extractPubKey(kDerTestCert); in TEST() local
456 ASSERT_FALSE(cert.empty()); in TEST()
461 auto cert = extractPubKey(TESTBLOB); in TEST() local
462 ASSERT_FALSE(cert.empty()); in TEST()
/system/keymint/tests/
DCargo.toml16 x509-cert = "0.1.0"
/system/sepolicy/tools/
Dpost_process_mac_perms83 new_stanzas = [stanza % (cert, inner_tag) for cert in cert_diff]
/system/keymint/ta/
DCargo.toml18 x509-cert = "0.1.0"
/system/incremental_delivery/incfs/
DAndroid.bp51 "cert-*",
53 "-cert-err34-c",
59 "-cert-oop54-cpp",
/system/security/diced/sample_inputs/src/
Dsample_inputs.rs121 let (cdi_values, cert) = retry_dice_main_flow(UDS, UDS, &input_values) in make_sample_bcc_and_cdis()
125 de::from_reader(&cert[..]).context("Deserialize root DICE certificate failed")?, in make_sample_bcc_and_cdis()
/system/security/keystore2/src/km_compat/
Dkm_compat.cpp485 auto cert = getCertificate(inKeyParams, out_creationResult->keyBlob); in generateKey() local
486 if (std::holds_alternative<KMV1::ErrorCode>(cert)) { in generateKey()
487 auto code = std::get<KMV1::ErrorCode>(cert); in generateKey()
494 out_creationResult->certificateChain = std::get<std::vector<Certificate>>(cert); in generateKey()
544 auto cert = getCertificate(inKeyParams, out_creationResult->keyBlob); in importKey() local
545 if (std::holds_alternative<KMV1::ErrorCode>(cert)) { in importKey()
546 auto code = std::get<KMV1::ErrorCode>(cert); in importKey()
553 out_creationResult->certificateChain = std::get<std::vector<Certificate>>(cert); in importKey()
1168 const std::vector<uint8_t>& prefixedKeyBlob, X509* cert) { in signCertificate() argument
1194 &*cert, in signCertificate()
[all …]
/system/security/keystore2/tests/legacy_blobs/
Dkeystore2_legacy_blob_tests.rs61 cert: Vec<u8>, field
254 cert: key_metadata.certificate.unwrap(), in keystore2_encrypted_characteristics()
281 gen_key_result.cert in keystore2_encrypted_characteristics()
515 cert: key_metadata.certificate.unwrap(), in keystore2_encrypted_certificates()
542 gen_key_result.cert in keystore2_encrypted_certificates()
/system/hardware/interfaces/wifi/keystore/1.0/vts/functional/
DVtsHalWifiKeystoreV1_0TargetTest.cpp379 std::string cert; in TEST_P() local
380 auto callback = [&statusCode, &cert](IKeystore::KeystoreStatusCode status, in TEST_P()
383 cert = std::string(reinterpret_cast<const char*>(value.data()), in TEST_P()
396 EXPECT_EQ(cert.rfind("-----BEGIN CERTIFICATE-----", 0), 0); in TEST_P()

123