Searched refs:cert_chain (Results 1 – 6 of 6) sorted by relevance
/system/security/keystore/ |
D | legacy_keymaster_device_wrapper.cpp | 145 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) { in kmCertChain2Hidl() argument 147 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result; in kmCertChain2Hidl() 149 result.resize(cert_chain->entry_count); in kmCertChain2Hidl() 150 for (size_t i = 0; i < cert_chain->entry_count; ++i) { in kmCertChain2Hidl() 151 auto& entry = cert_chain->entries[i]; in kmCertChain2Hidl() 371 keymaster_cert_chain_t cert_chain = {}; in attestKey() local 377 &cert_chain); in attestKey() 380 resultCertChain = kmCertChain2Hidl(&cert_chain); in attestKey() 385 keymaster_free_cert_chain(&cert_chain); in attestKey()
|
/system/keymaster/ |
D | asymmetric_key.cpp | 267 keymaster_cert_chain_t* cert_chain) const { in GenerateAttestation() 332 if (!copy_attestation_chain(context, sign_algorithm, cert_chain, &error)) in GenerateAttestation() 336 if (cert_chain->entry_count < 2) { in GenerateAttestation() 342 const uint8_t* p = cert_chain->entries[1].data; in GenerateAttestation() 343 X509_Ptr signing_cert(d2i_X509(nullptr, &p, cert_chain->entries[1].data_length)); in GenerateAttestation() 374 return get_certificate_blob(certificate.get(), &cert_chain->entries[0]); in GenerateAttestation()
|
D | soft_keymaster_device.cpp | 1073 keymaster_cert_chain_t* cert_chain) { in attest_key() argument 1074 if (!dev || !key_to_attest || !attest_params || !cert_chain) in attest_key() 1080 cert_chain->entry_count = 0; in attest_key() 1081 cert_chain->entries = nullptr; in attest_key() 1102 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key() 1103 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); in attest_key() 1104 if (!cert_chain->entries) in attest_key() 1106 cert_chain->entry_count = rsp_chain.entry_count; in attest_key() 1107 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) in attest_key() 1113 cert_chain->entries[i].data = reinterpret_cast<uint8_t*>(malloc(entry.data_length)); in attest_key() [all …]
|
D | android_keymaster_test.cpp | 3531 keymaster_cert_chain_t cert_chain; in TEST_P() local 3532 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", &cert_chain)); in TEST_P() 3533 EXPECT_EQ(3U, cert_chain.entry_count); in TEST_P() 3534 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() 3549 expected_keymaster_security_level, cert_chain.entries[0])); in TEST_P() 3551 keymaster_free_cert_chain(&cert_chain); in TEST_P() 3569 keymaster_cert_chain_t cert_chain; in TEST_P() local 3570 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", &cert_chain)); in TEST_P() 3571 EXPECT_EQ(3U, cert_chain.entry_count); in TEST_P() 3572 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() [all …]
|
D | android_keymaster_test_utils.cpp | 338 keymaster_cert_chain_t* cert_chain) { in AttestKey() argument 344 return device()->attest_key(device(), &blob_, &attest_params, cert_chain); in AttestKey()
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 211 keymaster_cert_chain_t* cert_chain);
|