Searched refs:cert_chain (Results 1 - 8 of 8) sorted by relevance

/system/security/keystore/
H A Dlegacy_keymaster_device_wrapper.cpp145 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) { argument
147 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result;
149 result.resize(cert_chain->entry_count);
150 for (size_t i = 0; i < cert_chain->entry_count; ++i) {
151 auto& entry = cert_chain->entries[i];
371 keymaster_cert_chain_t cert_chain = {}; local
377 &cert_chain);
380 resultCertChain = kmCertChain2Hidl(&cert_chain);
[all...]
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_device.cpp365 keymaster_cert_chain_t* cert_chain) {
374 if (!cert_chain) {
378 cert_chain->entry_count = 0;
379 cert_chain->entries = nullptr;
399 // Allocate and clear storage for cert_chain.
401 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>(
402 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries)));
403 if (!cert_chain->entries) {
406 cert_chain->entry_count = rsp_chain.entry_count;
407 for (keymaster_blob_t& entry : array_range(cert_chain
363 attest_key(const keymaster_key_blob_t* key_to_attest, const keymaster_key_param_set_t* attest_params, keymaster_cert_chain_t* cert_chain) argument
702 attest_key(const keymaster2_device_t* dev, const keymaster_key_blob_t* key_to_attest, const keymaster_key_param_set_t* attest_params, keymaster_cert_chain_t* cert_chain) argument
[all...]
H A Dtrusty_keymaster_device.h65 keymaster_cert_chain_t* cert_chain);
120 keymaster_cert_chain_t* cert_chain);
/system/keymaster/
H A Dasymmetric_key.cpp267 keymaster_cert_chain_t* cert_chain) const {
332 if (!copy_attestation_chain(context, sign_algorithm, cert_chain, &error))
335 // Copy subject key identifier from cert_chain->entries[1] as authority key_id.
336 if (cert_chain->entry_count < 2) {
337 // cert_chain must have at least two entries, one for the cert we're trying to create and
342 const uint8_t* p = cert_chain->entries[1].data;
343 X509_Ptr signing_cert(d2i_X509(nullptr, &p, cert_chain->entries[1].data_length));
376 return get_certificate_blob(certificate.get(), &cert_chain->entries[0]);
H A Dsoft_keymaster_device.cpp1071 keymaster_cert_chain_t* cert_chain) {
1072 if (!dev || !key_to_attest || !attest_params || !cert_chain)
1078 *cert_chain = {};
1097 // Allocate and clear storage for cert_chain.
1099 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>(
1100 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries)));
1101 if (!cert_chain->entries)
1103 cert_chain->entry_count = rsp_chain.entry_count;
1104 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain
1068 attest_key(const keymaster2_device_t* dev, const keymaster_key_blob_t* key_to_attest, const keymaster_key_param_set_t* attest_params, keymaster_cert_chain_t* cert_chain) argument
[all...]
H A Dandroid_keymaster_test.cpp3531 keymaster_cert_chain_t cert_chain; local
3532 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain));
3533 ASSERT_EQ(3U, cert_chain.entry_count);
3534 EXPECT_TRUE(verify_chain(cert_chain));
3549 expected_keymaster_security_level, cert_chain.entries[0]));
3551 keymaster_free_cert_chain(&cert_chain);
3569 keymaster_cert_chain_t cert_chain; local
3570 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain));
3571 ASSERT_EQ(3U, cert_chain.entry_count);
3572 EXPECT_TRUE(verify_chain(cert_chain));
[all...]
H A Dandroid_keymaster_test_utils.cpp339 keymaster_cert_chain_t* cert_chain) {
347 return device()->attest_key(device(), &blob_, &attest_params, cert_chain);
337 AttestKey(const string& attest_challenge, const string& attest_app_id, keymaster_cert_chain_t* cert_chain) argument
/system/keymaster/include/keymaster/
H A Dsoft_keymaster_device.h211 keymaster_cert_chain_t* cert_chain);

Completed in 174 milliseconds