Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 21 of 21) sorted by relevance

/hardware/google/pixel/vibrator/drv2624/apex/
DAndroid.bp9 certificate: ":com.android.vibrator.drv2624.certificate",
51 name: "com.android.vibrator.drv2624.certificate",
52 certificate: "com.android.vibrator.drv2624",
/hardware/interfaces/drm/1.2/
DIDrmPlugin.hal157 * provisioning server to retrieve a device certificate. getProvisionRequest
164 * @param certificateType the type of certificate requested, e.g. "X.509"
165 * @param certificateAuthority identifies the certificate authority. A
166 * certificate authority (CA) is an entity which issues digital
176 * @return request if successful the opaque certificate request blob
/hardware/interfaces/drm/1.0/default/
DDrmPlugin.cpp165 Vector<uint8_t> certificate; in provideProvisionResponse() local
169 toVector(response), certificate, wrappedKey); in provideProvisionResponse()
171 _hidl_cb(toStatus(legacyStatus), toHidlVec(certificate), in provideProvisionResponse()
/hardware/interfaces/drm/1.0/
DIDrmPlugin.hal173 * provisioning server to retrieve a device certificate. getProvisionRequest
177 * @param certificateType the type of certificate requested, e.g. "X.509"
178 * @param certificateAuthority identifies the certificate authority. A
179 * certificate authority (CA) is an entity which issues digital certificates
185 * @return request if successful the opaque certificate request blob
208 * @return certificate the public certificate resulting from the provisioning
209 * operation, if any. An empty vector indicates that no certificate was
216 vec<uint8_t> certificate, vec<uint8_t> wrappedKey);
Dtypes.hal111 * This event type indicates that the app needs to request a certificate
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp353 for (const vector<uint8_t>& certificate : certificateChain) { in certificateChainJoin() local
354 ret.insert(ret.end(), certificate.begin(), certificate.end()); in certificateChainJoin()
395 bool certificateSignedByPublicKey(const vector<uint8_t>& certificate, in certificateSignedByPublicKey() argument
397 const unsigned char* p = certificate.data(); in certificateSignedByPublicKey()
398 auto x509 = X509_Ptr(d2i_X509(nullptr, &p, certificate.size())); in certificateSignedByPublicKey()
1235 vector<uint8_t> certificate; in ecPublicKeyGenerateCertificate() local
1236 certificate.resize(length); in ecPublicKeyGenerateCertificate()
1237 memcpy(certificate.data(), buffer, length); in ecPublicKeyGenerateCertificate()
1239 return certificate; in ecPublicKeyGenerateCertificate()
/hardware/interfaces/wifi/supplicant/1.3/
DISupplicantStaNetwork.hal217 * Set WAPI certificate suite name for this network.
230 * Get WAPI certificate suite name set for this network.
/hardware/interfaces/wifi/supplicant/1.0/
DISupplicantStaNetwork.hal414 * Set EAP CA certificate file path for this network.
427 * Set EAP CA certificate directory path for this network.
440 * Set EAP Client certificate file path for this network.
810 * Get EAP CA certificate file path set for this network.
822 * Get EAP CA certificate directory path set for this network.
834 * Get EAP Client certificate file path set for this network.
/hardware/interfaces/keymaster/4.1/
Dtypes.hal33 * device-unique key is used, only the attestation certificate is returned; no additional
/hardware/interfaces/drm/1.4/
Dtypes.hal117 * There was an error loading the provisioned certificate.
/hardware/interfaces/identity/support/include/android/hardware/identity/support/
DIdentityCredentialSupport.h290 bool certificateSignedByPublicKey(const vector<uint8_t>& certificate,
/hardware/interfaces/radio/1.1/
DIRadio.hal34 * switch and everytime the framework receives a new certificate.
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintAidlTestBase.cpp102 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument
107 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record()
111 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
1286 void verify_subject_and_serial(const Certificate& certificate, // in verify_subject_and_serial() argument
1289 X509_Ptr cert(parse_cert_blob(certificate.encodedCertificate)); in verify_subject_and_serial()
DKeyMintAidlTestBase.h332 void verify_subject_and_serial(const Certificate& certificate, //
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal648 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in
651 * The certificates in the chain must be ordered such that each certificate is signed by the
652 * subsequent one, up to the root which must be self-signed. The first certificate in the chain
663 * o issuer -- must contain the same value as the Subject field of the next certificate.
670 * date of the batch attestation certificate (see below).
681 * In addition to the above, the attestation certificate must contain an extension with OID
776 * The attestation certificate must be signed by a "batch" key, which must be securely
779 * The batch attestation certificate must be signed by a chain or zero or more intermediates
780 * leading to a self-signed roots. The intermediate and root certificate signing keys must not
786 * included in the signed attestation certificate.
[all …]
Dtypes.hal207 * certificate for the generated key should contain an application-scoped and time-bounded
1126 /** X.509 certificate format, for public key export. */
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal165 * Generates a signed X.509 certificate chain attesting to the presence of keyToAttest in
166 * keymaster. The certificate will contain an extension with OID 1.3.6.1.4.1.11129.2.1.17 and
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp338 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument
343 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record()
347 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp335 ASN1_OCTET_STRING* get_attestation_record(X509* certificate) { in get_attestation_record() argument
340 int location = X509_get_ext_by_OBJ(certificate, oid.get(), -1 /* search from beginning */); in get_attestation_record()
344 X509_EXTENSION* attest_rec_ext = X509_get_ext(certificate, location); in get_attestation_record()
/hardware/interfaces/radio/1.6/
DIRadio.hal534 * switch and everytime the framework receives a new certificate.
Dtypes.hal1079 * Public key type from carrier certificate.