Searched refs:cert_chain (Results 1 - 8 of 8) sorted by relevance
/system/security/keystore/ |
H A D | legacy_keymaster_device_wrapper.cpp | 145 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) { argument 147 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result; 149 result.resize(cert_chain->entry_count); 150 for (size_t i = 0; i < cert_chain->entry_count; ++i) { 151 auto& entry = cert_chain->entries[i]; 371 keymaster_cert_chain_t cert_chain = {}; local 377 &cert_chain); 380 resultCertChain = kmCertChain2Hidl(&cert_chain); [all...] |
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device.cpp | 365 keymaster_cert_chain_t* cert_chain) { 374 if (!cert_chain) { 378 cert_chain->entry_count = 0; 379 cert_chain->entries = nullptr; 399 // Allocate and clear storage for cert_chain. 401 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( 402 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); 403 if (!cert_chain->entries) { 406 cert_chain->entry_count = rsp_chain.entry_count; 407 for (keymaster_blob_t& entry : array_range(cert_chain 363 attest_key(const keymaster_key_blob_t* key_to_attest, const keymaster_key_param_set_t* attest_params, keymaster_cert_chain_t* cert_chain) argument 702 attest_key(const keymaster2_device_t* dev, const keymaster_key_blob_t* key_to_attest, const keymaster_key_param_set_t* attest_params, keymaster_cert_chain_t* cert_chain) argument [all...] |
H A D | trusty_keymaster_device.h | 65 keymaster_cert_chain_t* cert_chain); 120 keymaster_cert_chain_t* cert_chain);
|
/system/keymaster/ |
H A D | asymmetric_key.cpp | 267 keymaster_cert_chain_t* cert_chain) const { 332 if (!copy_attestation_chain(context, sign_algorithm, cert_chain, &error)) 335 // Copy subject key identifier from cert_chain->entries[1] as authority key_id. 336 if (cert_chain->entry_count < 2) { 337 // cert_chain must have at least two entries, one for the cert we're trying to create and 342 const uint8_t* p = cert_chain->entries[1].data; 343 X509_Ptr signing_cert(d2i_X509(nullptr, &p, cert_chain->entries[1].data_length)); 376 return get_certificate_blob(certificate.get(), &cert_chain->entries[0]);
|
H A D | soft_keymaster_device.cpp | 1071 keymaster_cert_chain_t* cert_chain) { 1072 if (!dev || !key_to_attest || !attest_params || !cert_chain) 1078 *cert_chain = {}; 1097 // Allocate and clear storage for cert_chain. 1099 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( 1100 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); 1101 if (!cert_chain->entries) 1103 cert_chain->entry_count = rsp_chain.entry_count; 1104 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain 1068 attest_key(const keymaster2_device_t* dev, const keymaster_key_blob_t* key_to_attest, const keymaster_key_param_set_t* attest_params, keymaster_cert_chain_t* cert_chain) argument [all...] |
H A D | android_keymaster_test.cpp | 3531 keymaster_cert_chain_t cert_chain; local 3532 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); 3533 ASSERT_EQ(3U, cert_chain.entry_count); 3534 EXPECT_TRUE(verify_chain(cert_chain)); 3549 expected_keymaster_security_level, cert_chain.entries[0])); 3551 keymaster_free_cert_chain(&cert_chain); 3569 keymaster_cert_chain_t cert_chain; local 3570 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); 3571 ASSERT_EQ(3U, cert_chain.entry_count); 3572 EXPECT_TRUE(verify_chain(cert_chain)); [all...] |
H A D | android_keymaster_test_utils.cpp | 339 keymaster_cert_chain_t* cert_chain) { 347 return device()->attest_key(device(), &blob_, &attest_params, cert_chain); 337 AttestKey(const string& attest_challenge, const string& attest_app_id, keymaster_cert_chain_t* cert_chain) argument
|
/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 211 keymaster_cert_chain_t* cert_chain);
|
Completed in 174 milliseconds