/hardware/google/pixel/vibrator/drv2624/apex/ |
D | Android.bp | 9 certificate: ":com.android.vibrator.drv2624.certificate", 51 name: "com.android.vibrator.drv2624.certificate", 52 certificate: "com.android.vibrator.drv2624",
|
/hardware/interfaces/drm/1.2/ |
D | IDrmPlugin.hal | 157 * provisioning server to retrieve a device certificate. getProvisionRequest 164 * @param certificateType the type of certificate requested, e.g. "X.509" 165 * @param certificateAuthority identifies the certificate authority. A 166 * certificate authority (CA) is an entity which issues digital 176 * @return request if successful the opaque certificate request blob
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 165 Vector<uint8_t> certificate; in provideProvisionResponse() local 169 toVector(response), certificate, wrappedKey); in provideProvisionResponse() 171 _hidl_cb(toStatus(legacyStatus), toHidlVec(certificate), in provideProvisionResponse()
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 173 * provisioning server to retrieve a device certificate. getProvisionRequest 177 * @param certificateType the type of certificate requested, e.g. "X.509" 178 * @param certificateAuthority identifies the certificate authority. A 179 * certificate authority (CA) is an entity which issues digital certificates 185 * @return request if successful the opaque certificate request blob 208 * @return certificate the public certificate resulting from the provisioning 209 * operation, if any. An empty vector indicates that no certificate was 216 vec<uint8_t> certificate, vec<uint8_t> wrappedKey);
|
D | types.hal | 111 * This event type indicates that the app needs to request a certificate
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 353 for (const vector<uint8_t>& certificate : certificateChain) { in certificateChainJoin() local 354 ret.insert(ret.end(), certificate.begin(), certificate.end()); in certificateChainJoin() 395 bool certificateSignedByPublicKey(const vector<uint8_t>& certificate, in certificateSignedByPublicKey() argument 397 const unsigned char* p = certificate.data(); in certificateSignedByPublicKey() 398 auto x509 = X509_Ptr(d2i_X509(nullptr, &p, certificate.size())); in certificateSignedByPublicKey() 1235 vector<uint8_t> certificate; in ecPublicKeyGenerateCertificate() local 1236 certificate.resize(length); in ecPublicKeyGenerateCertificate() 1237 memcpy(certificate.data(), buffer, length); in ecPublicKeyGenerateCertificate() 1239 return certificate; in ecPublicKeyGenerateCertificate()
|
/hardware/interfaces/wifi/supplicant/1.3/ |
D | ISupplicantStaNetwork.hal | 217 * Set WAPI certificate suite name for this network. 230 * Get WAPI certificate suite name set for this network.
|
/hardware/interfaces/wifi/supplicant/1.0/ |
D | ISupplicantStaNetwork.hal | 414 * Set EAP CA certificate file path for this network. 427 * Set EAP CA certificate directory path for this network. 440 * Set EAP Client certificate file path for this network. 810 * Get EAP CA certificate file path set for this network. 822 * Get EAP CA certificate directory path set for this network. 834 * Get EAP Client certificate file path set for this network.
|
/hardware/interfaces/keymaster/4.1/ |
D | types.hal | 33 * device-unique key is used, only the attestation certificate is returned; no additional
|
/hardware/interfaces/drm/1.4/ |
D | types.hal | 117 * There was an error loading the provisioned certificate.
|
/hardware/interfaces/identity/support/include/android/hardware/identity/support/ |
D | IdentityCredentialSupport.h | 290 bool certificateSignedByPublicKey(const vector<uint8_t>& certificate,
|
/hardware/interfaces/radio/1.1/ |
D | IRadio.hal | 34 * switch and everytime the framework receives a new certificate.
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintAidlTestBase.cpp | 102 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument 107 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record() 111 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record() 1286 void verify_subject_and_serial(const Certificate& certificate, // in verify_subject_and_serial() argument 1289 X509_Ptr cert(parse_cert_blob(certificate.encodedCertificate)); in verify_subject_and_serial()
|
D | KeyMintAidlTestBase.h | 332 void verify_subject_and_serial(const Certificate& certificate, //
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 648 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in 651 * The certificates in the chain must be ordered such that each certificate is signed by the 652 * subsequent one, up to the root which must be self-signed. The first certificate in the chain 663 * o issuer -- must contain the same value as the Subject field of the next certificate. 670 * date of the batch attestation certificate (see below). 681 * In addition to the above, the attestation certificate must contain an extension with OID 776 * The attestation certificate must be signed by a "batch" key, which must be securely 779 * The batch attestation certificate must be signed by a chain or zero or more intermediates 780 * leading to a self-signed roots. The intermediate and root certificate signing keys must not 786 * included in the signed attestation certificate. [all …]
|
D | types.hal | 207 * certificate for the generated key should contain an application-scoped and time-bounded 1126 /** X.509 certificate format, for public key export. */
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 165 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in 166 * keymaster. The certificate will contain an extension with OID 1.3.6.1.4.1.11129.2.1.17 and
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 338 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument 343 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record() 347 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 335 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument 340 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record() 344 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
|
/hardware/interfaces/radio/1.6/ |
D | IRadio.hal | 534 * switch and everytime the framework receives a new certificate.
|
D | types.hal | 1079 * Public key type from carrier certificate.
|