Searched refs:attestation (Results 1 – 3 of 3) sorted by relevance
/frameworks/base/docs/html/training/articles/ |
D | security-key-attestation.jd | 3 page.keywords="security", "TEE", "hardware-backed", "keystore", "certificate", "key attestation" 21 interpret the schema of the attestation certificate's extension data. 26 level 24) support hardware-level key attestation; all other devices running 27 Android 7.0 use software-level key attestation instead. Before you verify the 30 attestation. To do so, you should check that the attestation certificate chain 31 contains a root certificate that is signed by the Google attestation root key 42 During key attestation, you specify the alias of a key pair. The attestation 48 If the device supports hardware-level key attestation, the root certificate 49 within this chain is signed using an attestation root key, which the device 56 attestation, Android 7.0 (API level 24), and Google Play services, the root [all …]
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternChecker.java | 46 void onVerified(byte[] attestation, int throttleTimeoutMs); in onVerified() argument
|
/frameworks/base/docs/html/about/versions/nougat/ |
D | android-7.0.jd | 815 Android 7.0 introduces <em>key attestation</em>, a new security tool that helps 828 Key attestation allows you to verify that an RSA or EC key pair has been 840 support hardware-level key attestation; all other devices running Android 7.0 841 use software-level key attestation instead. Before you verify the properties 843 should make sure that the device supports hardware-level key attestation. To 844 do so, you should check that the attestation certificate chain contains a root 845 certificate that is signed by the Google attestation root key and that the 847 href="{@docRoot}preview/features/key-attestation.html#certificate_schema_keydescription">key 854 <a href="{@docRoot}preview/features/key-attestation.html">Key Attestation</a>
|