Home
last modified time | relevance | path

Searched refs:attestation (Results 1 – 3 of 3) sorted by relevance

/frameworks/base/docs/html/training/articles/
Dsecurity-key-attestation.jd3 page.keywords="security", "TEE", "hardware-backed", "keystore", "certificate", "key attestation"
21 interpret the schema of the attestation certificate's extension data.
26 level 24) support hardware-level key attestation; all other devices running
27 Android 7.0 use software-level key attestation instead. Before you verify the
30 attestation. To do so, you should check that the attestation certificate chain
31 contains a root certificate that is signed by the Google attestation root key
42 During key attestation, you specify the alias of a key pair. The attestation
48 If the device supports hardware-level key attestation, the root certificate
49 within this chain is signed using an attestation root key, which the device
56 attestation, Android 7.0 (API level 24), and Google Play services, the root
[all …]
/frameworks/base/core/java/com/android/internal/widget/
DLockPatternChecker.java46 void onVerified(byte[] attestation, int throttleTimeoutMs); in onVerified() argument
/frameworks/base/docs/html/about/versions/nougat/
Dandroid-7.0.jd815 Android 7.0 introduces <em>key attestation</em>, a new security tool that helps
828 Key attestation allows you to verify that an RSA or EC key pair has been
840 support hardware-level key attestation; all other devices running Android 7.0
841 use software-level key attestation instead. Before you verify the properties
843 should make sure that the device supports hardware-level key attestation. To
844 do so, you should check that the attestation certificate chain contains a root
845 certificate that is signed by the Google attestation root key and that the
847 href="{@docRoot}preview/features/key-attestation.html#certificate_schema_keydescription">key
854 <a href="{@docRoot}preview/features/key-attestation.html">Key Attestation</a>