/system/extras/verity/ |
D | generate_verity_key.c | 67 X509 *cert = NULL; in convert_x509() local 79 cert = PEM_read_X509(f, &cert, NULL, NULL); in convert_x509() 80 if (!cert) { in convert_x509() 85 pkey = X509_get_pubkey(cert); in convert_x509() 108 if (cert) { in convert_x509() 109 X509_free(cert); in convert_x509()
|
D | VeritySigner.java | 22 import java.security.cert.X509Certificate; 45 X509Certificate cert = Utils.loadPEMCertificate(args[1]); in main() local 46 PublicKey publicKey = cert.getPublicKey(); in main()
|
D | BootSignature.java | 26 import java.security.cert.X509Certificate; 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.CertificateEncodingException; 159 public void setCertificate(X509Certificate cert) in setCertificate() argument 161 ASN1InputStream s = new ASN1InputStream(cert.getEncoded()); in setCertificate() 163 publicKey = cert.getPublicKey(); in setCertificate() 272 X509Certificate cert = Utils.loadPEMCertificate(certPath); in doSignature() local 273 bootsig.setCertificate(cert); in doSignature()
|
/system/netd/ |
D | Android.bp | 67 "cert-*", 75 "-cert-dcl50-cpp", 76 "-cert-err34-c", // TODO: re-enable after removing atoi() and sscanf() calls 77 "-cert-oop54-cpp", // found in DnsResolver/stats.pb.h 91 "cert-*",
|
/system/security/keystore2/src/crypto/tests/ |
D | certificate_utils_test.cpp | 179 auto& cert = std::get<X509_Ptr>(certV); in TEST_P() local 180 ASSERT_TRUE(!setIssuer(cert.get(), cert.get(), true)); in TEST_P() 183 cert.get(), in TEST_P() 197 auto encCertV = encodeCert(cert.get()); in TEST_P() 278 auto& cert = std::get<X509_Ptr>(certV); in TEST_P() local 279 ASSERT_TRUE(!setIssuer(cert.get(), cert.get(), true)); in TEST_P() 282 cert.get(), in TEST_P() 304 auto encCertV = encodeCert(cert.get()); in TEST_P()
|
/system/keymint/ta/src/ |
D | keys.rs | 3 use crate::{cert, device, AttestationChainInfo}; 66 pub key_params: cert::AuthorizationList<'a>, 100 let issuer = cert::extract_subject( in get_signing_info() 126 let key_usage_ext_bits = cert::key_usage_extension_bits(params); in generate_cert() 127 let key_usage_ext_val = cert::asn1_der_encode(&key_usage_ext_bits)?; in generate_cert() 133 let basic_constraints = cert::basic_constraints_ext_value(true); in generate_cert() 134 Some(cert::asn1_der_encode(&basic_constraints)?) in generate_cert() 144 let attest_ext = cert::attestation_extension( in generate_cert() 156 Some(cert::asn1_der_encode(&attest_ext)?) in generate_cert() 161 let tbs_cert = cert::tbs_certificate( in generate_cert() [all …]
|
/system/incremental_delivery/libdataloader/ |
D | Android.bp | 53 "cert-*", 55 "-cert-err34-c", 61 "-cert-dcl50-cpp", 63 "-cert-oop54-cpp",
|
/system/security/keystore2/src/ |
D | attestation_key_utils.rs | 86 let (key_id_guard, blob, cert, blob_metadata) = in get_user_generated_attestation_key() 90 let issuer_subject: Vec<u8> = parse_subject_from_certificate(&cert) in get_user_generated_attestation_key() 119 let cert = key_entry in load_attest_key_blob_and_cert() localVariable 123 Ok((key_id_guard, blob, cert, blob_metadata)) in load_attest_key_blob_and_cert()
|
/system/security/ondevice-signing/ |
D | CertUtils.cpp | 53 bssl::UniquePtr<X509> cert(rawCert); in loadX509() local 56 return cert; in loadX509() 65 static bool add_ext(X509V3_CTX* context, X509* cert, int nid, const char* value) { in add_ext() argument 71 X509_add_ext(cert, ex.get(), -1); in add_ext() 348 auto cert = loadX509(path); in extractPublicKeyFromX509() local 349 if (!cert.ok()) { in extractPublicKeyFromX509() 350 return cert.error(); in extractPublicKeyFromX509() 352 return extractPublicKey(X509_get_pubkey(cert.value().get())); in extractPublicKeyFromX509() 379 auto cert = loadX509(path); in verifyAndExtractCertInfoFromX509() local 380 if (!cert.ok()) { in verifyAndExtractCertInfoFromX509() [all …]
|
D | KeystoreKey.cpp | 123 auto cert = metadata.certificate; in createKey() local 124 if (!cert) { in createKey() 127 auto publicKey = extractPublicKeyFromX509(cert.value()); in createKey() 221 auto cert = keyEntryResponse.metadata.certificate; in verifyExistingKey() local 222 if (!cert) { in verifyExistingKey() 225 auto publicKey = extractPublicKeyFromX509(cert.value()); in verifyExistingKey()
|
/system/keymaster/km_openssl/ |
D | certificate_utils.cpp | 47 keymaster_error_t fake_sign_cert(X509* cert) { in fake_sign_cert() argument 56 if (!X509_set1_signature_algo(cert, algor.get()) || in fake_sign_cert() 57 !X509_set1_signature_value(cert, &fake_sig, sizeof(fake_sig))) { in fake_sign_cert() 364 X509_Ptr cert; in generate_self_signed_cert() local 365 *error = make_cert(pkey.get(), cert_params.subject_name.get() /* issuer */, cert_params, &cert); in generate_self_signed_cert() 369 *error = fake_sign_cert(cert.get()); in generate_self_signed_cert() 371 *error = sign_cert(cert.get(), pkey.get()); in generate_self_signed_cert() 381 *error = encode_certificate(cert.get(), &result.entries[0]); in generate_self_signed_cert()
|
D | openssl_utils.cpp | 165 X509_Ptr cert(d2i_X509(NULL, &temp, km_cert->data_length)); in GetEcdsa256KeyFromCert() local 166 if (!cert.get()) return TranslateLastOpenSslError(); in GetEcdsa256KeyFromCert() 167 EVP_PKEY_Ptr pubKey(X509_get_pubkey(cert.get())); in GetEcdsa256KeyFromCert()
|
/system/update_engine/payload_consumer/ |
D | certificate_parser_android.cc | 93 for (const auto& cert : pem_certs) { in ReadPublicKeysFromCertificates() local 95 BIO_new_mem_buf(cert.data(), cert.size()), BIO_free); in ReadPublicKeysFromCertificates()
|
/system/core/libsysutils/ |
D | Android.bp | 37 "cert-*", 42 "cert-*",
|
/system/bpf/ |
D | Android.bp | 30 "cert-*", 31 "-cert-err34-c",
|
/system/security/keystore2/tests/ |
D | ffi_test_utils.cpp | 101 aidl::android::hardware::security::keymint::Certificate& cert) { in extractCertFromCertChainBuffer() argument 144 cert.encodedCertificate = std::move(cert_bytes); in extractCertFromCertChainBuffer() 162 aidl::android::hardware::security::keymint::Certificate cert = in getCertificateChain() local 164 if (extractCertFromCertChainBuffer(data, data_size, index, cert) != ErrorCode::OK) { in getCertificateChain() 167 certChain.push_back(std::move(cert)); in getCertificateChain()
|
/system/hardware/interfaces/wifi/keystore/1.0/default/test/ |
D | WifiLegacyKeystoreIntegrationTest.cpp | 455 auto cert = extractPubKey(kDerTestCert); in TEST() local 456 ASSERT_FALSE(cert.empty()); in TEST() 461 auto cert = extractPubKey(TESTBLOB); in TEST() local 462 ASSERT_FALSE(cert.empty()); in TEST()
|
/system/keymint/tests/ |
D | Cargo.toml | 16 x509-cert = "0.1.0"
|
/system/sepolicy/tools/ |
D | post_process_mac_perms | 83 new_stanzas = [stanza % (cert, inner_tag) for cert in cert_diff]
|
/system/keymint/ta/ |
D | Cargo.toml | 18 x509-cert = "0.1.0"
|
/system/incremental_delivery/incfs/ |
D | Android.bp | 51 "cert-*", 53 "-cert-err34-c", 59 "-cert-oop54-cpp",
|
/system/security/diced/sample_inputs/src/ |
D | sample_inputs.rs | 121 let (cdi_values, cert) = retry_dice_main_flow(UDS, UDS, &input_values) in make_sample_bcc_and_cdis() 125 de::from_reader(&cert[..]).context("Deserialize root DICE certificate failed")?, in make_sample_bcc_and_cdis()
|
/system/security/keystore2/src/km_compat/ |
D | km_compat.cpp | 485 auto cert = getCertificate(inKeyParams, out_creationResult->keyBlob); in generateKey() local 486 if (std::holds_alternative<KMV1::ErrorCode>(cert)) { in generateKey() 487 auto code = std::get<KMV1::ErrorCode>(cert); in generateKey() 494 out_creationResult->certificateChain = std::get<std::vector<Certificate>>(cert); in generateKey() 544 auto cert = getCertificate(inKeyParams, out_creationResult->keyBlob); in importKey() local 545 if (std::holds_alternative<KMV1::ErrorCode>(cert)) { in importKey() 546 auto code = std::get<KMV1::ErrorCode>(cert); in importKey() 553 out_creationResult->certificateChain = std::get<std::vector<Certificate>>(cert); in importKey() 1168 const std::vector<uint8_t>& prefixedKeyBlob, X509* cert) { in signCertificate() argument 1194 &*cert, in signCertificate() [all …]
|
/system/security/keystore2/tests/legacy_blobs/ |
D | keystore2_legacy_blob_tests.rs | 61 cert: Vec<u8>, field 254 cert: key_metadata.certificate.unwrap(), in keystore2_encrypted_characteristics() 281 gen_key_result.cert in keystore2_encrypted_characteristics() 515 cert: key_metadata.certificate.unwrap(), in keystore2_encrypted_certificates() 542 gen_key_result.cert in keystore2_encrypted_certificates()
|
/system/hardware/interfaces/wifi/keystore/1.0/vts/functional/ |
D | VtsHalWifiKeystoreV1_0TargetTest.cpp | 379 std::string cert; in TEST_P() local 380 auto callback = [&statusCode, &cert](IKeystore::KeystoreStatusCode status, in TEST_P() 383 cert = std::string(reinterpret_cast<const char*>(value.data()), in TEST_P() 396 EXPECT_EQ(cert.rfind("-----BEGIN CERTIFICATE-----", 0), 0); in TEST_P()
|