Home
last modified time | relevance | path

Searched refs:cert_chain (Results 1 – 6 of 6) sorted by relevance

/system/security/keystore/
Dlegacy_keymaster_device_wrapper.cpp145 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) { in kmCertChain2Hidl() argument
147 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result; in kmCertChain2Hidl()
149 result.resize(cert_chain->entry_count); in kmCertChain2Hidl()
150 for (size_t i = 0; i < cert_chain->entry_count; ++i) { in kmCertChain2Hidl()
151 auto& entry = cert_chain->entries[i]; in kmCertChain2Hidl()
371 keymaster_cert_chain_t cert_chain = {}; in attestKey() local
377 &cert_chain); in attestKey()
380 resultCertChain = kmCertChain2Hidl(&cert_chain); in attestKey()
385 keymaster_free_cert_chain(&cert_chain); in attestKey()
/system/keymaster/
Dasymmetric_key.cpp267 keymaster_cert_chain_t* cert_chain) const { in GenerateAttestation()
332 if (!copy_attestation_chain(context, sign_algorithm, cert_chain, &error)) in GenerateAttestation()
336 if (cert_chain->entry_count < 2) { in GenerateAttestation()
342 const uint8_t* p = cert_chain->entries[1].data; in GenerateAttestation()
343 X509_Ptr signing_cert(d2i_X509(nullptr, &p, cert_chain->entries[1].data_length)); in GenerateAttestation()
374 return get_certificate_blob(certificate.get(), &cert_chain->entries[0]); in GenerateAttestation()
Dsoft_keymaster_device.cpp1073 keymaster_cert_chain_t* cert_chain) { in attest_key() argument
1074 if (!dev || !key_to_attest || !attest_params || !cert_chain) in attest_key()
1080 cert_chain->entry_count = 0; in attest_key()
1081 cert_chain->entries = nullptr; in attest_key()
1102 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key()
1103 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); in attest_key()
1104 if (!cert_chain->entries) in attest_key()
1106 cert_chain->entry_count = rsp_chain.entry_count; in attest_key()
1107 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) in attest_key()
1113 cert_chain->entries[i].data = reinterpret_cast<uint8_t*>(malloc(entry.data_length)); in attest_key()
[all …]
Dandroid_keymaster_test.cpp3531 keymaster_cert_chain_t cert_chain; in TEST_P() local
3532 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", &cert_chain)); in TEST_P()
3533 EXPECT_EQ(3U, cert_chain.entry_count); in TEST_P()
3534 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P()
3549 expected_keymaster_security_level, cert_chain.entries[0])); in TEST_P()
3551 keymaster_free_cert_chain(&cert_chain); in TEST_P()
3569 keymaster_cert_chain_t cert_chain; in TEST_P() local
3570 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", &cert_chain)); in TEST_P()
3571 EXPECT_EQ(3U, cert_chain.entry_count); in TEST_P()
3572 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P()
[all …]
Dandroid_keymaster_test_utils.cpp338 keymaster_cert_chain_t* cert_chain) { in AttestKey() argument
344 return device()->attest_key(device(), &blob_, &attest_params, cert_chain); in AttestKey()
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h211 keymaster_cert_chain_t* cert_chain);