/hardware/interfaces/identity/aidl/vts/ |
D | Util.cpp | 183 Certificate cert; in addAccessControlProfiles() local 184 cert.encodedCertificate = testProfile.readerCertificate; in addAccessControlProfiles() 187 testProfile.id, cert, testProfile.userAuthenticationRequired, in addAccessControlProfiles() 339 X509_Ptr cert = X509_Ptr(d2i_X509(nullptr, &certData, certBytes.size())); in validateAttestationCertificate() local 358 EXPECT_EQ(2, X509_get_version(cert.get())); in validateAttestationCertificate() 361 EXPECT_EQ(1, ASN1_INTEGER_get(X509_get_serialNumber(cert.get()))); in validateAttestationCertificate() 364 EXPECT_EQ(NID_ecdsa_with_SHA256, X509_get_signature_nid(cert.get())); in validateAttestationCertificate() 368 X509_NAME* subject = X509_get_subject_name(cert.get()); in validateAttestationCertificate() 373 X509_NAME* issuer = X509_get_issuer_name(cert.get()); in validateAttestationCertificate() 385 ASSERT_TRUE(parseAsn1Time(X509_get0_notBefore(cert.get()), ¬Before)); in validateAttestationCertificate() [all …]
|
D | VtsIWritableIdentityCredentialTests.cpp | 137 for (const vector<uint8_t>& cert : *remotelyProvisionedCertChain) { in TEST_P() 138 concatenatedCerts.insert(concatenatedCerts.end(), cert.begin(), cert.end()); in TEST_P() 189 for (const vector<uint8_t>& cert : *remotelyProvisionedCertChain) { in TEST_P() 190 concatenatedCerts.insert(concatenatedCerts.end(), cert.begin(), cert.end()); in TEST_P() 357 Certificate cert; in TEST_P() local 358 cert.encodedCertificate = testProfile.readerCertificate; in TEST_P() 361 testProfile.id, cert, testProfile.userAuthenticationRequired, in TEST_P()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | BootloaderStateTest.cpp | 60 X509_Ptr cert(parse_cert_blob(cert_chain_[0].encodedCertificate)); in SetUp() local 61 ASSERT_TRUE(cert.get()); in SetUp() 63 ASN1_OCTET_STRING* attest_rec = get_attestation_record(cert.get()); in SetUp()
|
D | KeyBlobUpgradeTest.cpp | 487 std::vector<uint8_t> cert; in TEST_P() local 489 cert = load_cert(subdir, name); in TEST_P() 514 LocalVerifyMessage(cert, message, signature, builder); in TEST_P() 518 LocalVerifyMessage(cert, message, signature, builder); in TEST_P() 522 LocalVerifyMessage(cert, message, signature, builder); in TEST_P() 548 X509_Ptr kmKeyCert(parse_cert_blob(cert)); in TEST_P()
|
D | KeyMintAidlTestBase.cpp | 1688 void verify_serial(X509* cert, const uint64_t expected_serial) { in verify_serial() argument 1690 EXPECT_TRUE(ASN1_INTEGER_to_BN(X509_get_serialNumber(cert), ser.get())); in verify_serial() 1699 void verify_subject(const X509* cert, // in verify_subject() argument 1703 X509_NAME_oneline(X509_get_issuer_name(cert), nullptr, 0); in verify_subject() 1705 char* cert_subj = X509_NAME_oneline(X509_get_subject_name(cert), nullptr, 0); in verify_subject() 1779 X509_Ptr cert(parse_cert_blob(certificate.encodedCertificate)); in verify_subject_and_serial() local 1780 ASSERT_TRUE(!!cert.get()); in verify_subject_and_serial() 1782 verify_serial(cert.get(), expected_serial); in verify_subject_and_serial() 1783 verify_subject(cert.get(), subject, self_signed); in verify_subject_and_serial() 1854 X509_Ptr cert(parse_cert_blob(attestation_cert)); in verify_attestation_record() local [all …]
|
D | KeyMintAidlTestBase.h | 405 void verify_subject(const X509* cert, const string& subject, bool self_signed); 406 void verify_serial(X509* cert, const uint64_t expected_serial);
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | BootloaderStateTest.cpp | 56 X509_Ptr cert(parse_cert_blob(cert_chain[0])); in SetUp() local 57 ASSERT_TRUE(cert.get()) << "Failed to parse certificate blob."; in SetUp() 59 ASN1_OCTET_STRING* attest_rec = get_attestation_record(cert.get()); in SetUp()
|
/hardware/google/pixel/thermal/ |
D | Android.bp | 57 "cert-*", 63 "cert-*", 151 "cert-*", 157 "cert-*",
|
/hardware/google/pixel/pwrstats_util/ |
D | Android.bp | 58 "cert-*", 67 "cert-*", 71 "-cert-oop54-cpp", // in powerstats_util.pb.h
|
/hardware/interfaces/security/keymint/support/fuzzer/ |
D | keymint_attestation_fuzzer.cpp | 91 X509_Ptr cert(parseCertificateBlob(attestationCert)); in verifyAttestationRecord() local 92 if (!cert.get()) { in verifyAttestationRecord() 96 ASN1_OCTET_STRING* attestRecord = getAttestationRecord(cert.get()); in verifyAttestationRecord()
|
/hardware/interfaces/keymaster/4.0/support/fuzzer/ |
D | keymaster4_attestation_fuzzer.cpp | 108 X509_Ptr cert(parseCertificateBlob(attestationCert)); in verifyAttestationRecord() local 109 if (!cert.get()) { in verifyAttestationRecord() 113 ASN1_OCTET_STRING* attestRecord = getAttestationRecord(cert.get()); in verifyAttestationRecord()
|
/hardware/interfaces/identity/support/tests/ |
D | IdentityCredentialSupportTest.cpp | 180 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in generateCertChain() local 182 certs.push_back(cert.value()); in generateCertChain() 247 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in TEST() local 251 support::certificateChainGetTopMostKey(cert.value()); in TEST() 257 optional<vector<vector<uint8_t>>> splitCerts = support::certificateChainSplit(cert.value()); in TEST() 259 ASSERT_EQ(splitCerts.value()[0], cert.value()); in TEST() 272 ASSERT_NE(cert.value(), otherCert.value()); in TEST() 273 const vector<vector<uint8_t>> certs2 = {cert.value(), otherCert.value()}; in TEST() 275 ASSERT_EQ(certs2combined.size(), cert.value().size() + otherCert.value().size()); in TEST()
|
/hardware/google/pixel/power-libperfmgr/libperfmgr/ |
D | Android.bp | 39 "cert-*", 45 "cert-*",
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 52 std::tuple<ErrorCode, AttestationRecord> parse_attestation_record(const hidl_vec<uint8_t>& cert);
|
/hardware/interfaces/identity/aidl/default/libeic/ |
D | EicOps.h | 223 uint8_t* /*out*/ cert, size_t* /*inout*/ certSize); 238 size_t proofOfBindingSize, uint8_t* cert, size_t* certSize); // inout
|
/hardware/interfaces/identity/aidl/default/common/ |
D | WritableIdentityCredential.cpp | 105 for (vector<uint8_t>& cert : certs.value()) { in getAttestationCertificate() 107 c.encodedCertificate = std::move(cert); in getAttestationCertificate() 111 for (const vector<uint8_t>& cert : *attestationCertificateChain_) { in getAttestationCertificate() 113 c.encodedCertificate = cert; in getAttestationCertificate()
|
/hardware/google/pixel/vibrator/ |
D | Android.bp | 39 "cert*",
|
/hardware/interfaces/identity/aidl/default/ |
D | EicOpsImpl.cc | 274 uint8_t* cert, size_t* certSize) { in eicOpsCreateCredentialKey() argument 312 memcpy(cert, flatChain.data(), flatChain.size()); in eicOpsCreateCredentialKey() 337 size_t proofOfBindingSize, uint8_t* cert, size_t* certSize) { // inout in eicOpsSignEcKey() argument 367 memcpy(cert, certVec.value().data(), certVec.value().size()); in eicOpsSignEcKey()
|
D | FakeSecureHardwareProxy.cpp | 503 vector<uint8_t> cert; in generateSigningKeyPair() local 504 cert.resize(publicKeyCertSize); in generateSigningKeyPair() 505 memcpy(cert.data(), publicKeyCert, publicKeyCertSize); in generateSigningKeyPair() 507 return std::make_pair(cert, signingKeyBlob); in generateSigningKeyPair()
|
/hardware/interfaces/security/keymint/support/ |
D | remote_prov_utils.cpp | 755 ErrMsgOr<X509_Ptr> parseX509Cert(const std::vector<uint8_t>& cert) { in parseX509Cert() argument 756 CRYPTO_BUFFER_Ptr certBuf(CRYPTO_BUFFER_new(cert.data(), cert.size(), nullptr)); in parseX509Cert() 767 std::string getX509IssuerName(const X509_Ptr& cert) { in getX509IssuerName() argument 768 char* name = X509_NAME_oneline(X509_get_issuer_name(cert.get()), nullptr, 0); in getX509IssuerName() 774 std::string getX509SubjectName(const X509_Ptr& cert) { in getX509SubjectName() argument 775 char* name = X509_NAME_oneline(X509_get_subject_name(cert.get()), nullptr, 0); in getX509SubjectName()
|
/hardware/interfaces/security/secretkeeper/aidl/vts/ |
D | dice_sample.rs | 164 let (cdi_values, cert) = retry_dice_main_flow(uds, uds, &input_values).unwrap(); 166 Value::Array(vec![ed25519_public_key_value, de::from_reader(&cert[..]).unwrap()]);
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 332 std::tuple<ErrorCode, AttestationRecord> parse_attestation_record(const hidl_vec<uint8_t>& cert) { in MAKE_OPENSSL_PTR_TYPE() 333 const uint8_t* p = cert.data(); in MAKE_OPENSSL_PTR_TYPE() 334 X509_Ptr x509(d2i_X509(nullptr, &p, cert.size())); in MAKE_OPENSSL_PTR_TYPE()
|
/hardware/nxp/keymint/KM200/ |
D | CborConverter.cpp | 253 Certificate cert; in getCertificateChain() local 254 if (!getBinaryArray(arrayItem, i, cert.encodedCertificate)) return false; in getCertificateChain() 255 certChain.push_back(std::move(cert)); in getCertificateChain()
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 621 vector<uint8_t> cert = in certificateChainSplit() local 623 certificates.push_back(std::move(cert)); in certificateChainSplit() 1801 for (const vector<uint8_t>& cert : certs.value()) { in coseSignEcDsaWithSignature() local 1802 certArray.add(cert); in coseSignEcDsaWithSignature() 1849 for (const vector<uint8_t>& cert : certs.value()) { in coseSignEcDsa() local 1850 certArray.add(cert); in coseSignEcDsa() 2298 X509_Ptr cert(d2i_X509(/*cert=*/nullptr, &input, certificate.size())); in extractDerSubjectFromCertificate() local 2299 if (!cert) { in extractDerSubjectFromCertificate() 2304 X509_NAME* subject = X509_get_subject_name(cert.get()); in extractDerSubjectFromCertificate()
|
/hardware/nxp/keymint/KM300/ |
D | CborConverter.cpp | 337 Certificate cert; in getCertificateChain() local 340 cert.encodedCertificate = std::move(optTemp.value()); in getCertificateChain() 341 certChain.push_back(std::move(cert)); in getCertificateChain()
|