/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_legacy_support.h | 72 CertificateChain* cert_chain) const { in GenerateKey() argument 76 sw_enforced, cert_chain); in GenerateKey() 80 sw_enforced, cert_chain); in GenerateKey() 91 AuthorizationSet* sw_enforced, CertificateChain* cert_chain) const { in ImportKey() argument 95 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey() 99 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey() 153 CertificateChain* cert_chain) const;
|
D | ec_keymaster1_key.h | 50 CertificateChain* cert_chain) const override; 60 CertificateChain* cert_chain) const override;
|
D | rsa_keymaster1_key.h | 50 CertificateChain* cert_chain) const override; 60 CertificateChain* cert_chain) const override;
|
/system/keymaster/ng/include/ |
D | KeyMintUtils.h | 102 inline vector<Certificate> kmCertChain2Aidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Aidl() argument 104 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Aidl() 106 result.resize(cert_chain.entry_count); in kmCertChain2Aidl() 107 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Aidl() 108 result[i].encodedCertificate = kmBlob2vector(cert_chain.entries[i]); in kmCertChain2Aidl()
|
/system/keymaster/km_openssl/ |
D | rsa_key_factory.cpp | 57 CertificateChain* cert_chain) const { in GenerateKey() 102 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateKey() 106 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in GenerateKey() 113 *cert_chain = in GenerateKey() 128 CertificateChain* cert_chain) const { in ImportKey() 143 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in ImportKey() 154 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in ImportKey() 161 *cert_chain = in ImportKey()
|
D | ec_key_factory.cpp | 85 CertificateChain* cert_chain) const { in GenerateKey() 132 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateKey() 136 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in GenerateKey() 141 *cert_chain = context_.GenerateSelfSignedCertificate( in GenerateKey() 157 CertificateChain* cert_chain) const { in ImportKey() 171 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in ImportKey() 182 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in ImportKey() 187 *cert_chain = context_.GenerateSelfSignedCertificate( in ImportKey()
|
D | attestation_utils.cpp | 198 const CertificateChain& cert_chain, keymaster_error_t* error) { in get_issuer_subject() argument 204 if (cert_chain.entry_count >= 1) return get_issuer_subject(cert_chain.entries[0], error); in get_issuer_subject() 306 CertificateChain cert_chain = in generate_attestation() local 310 X509_NAME_Ptr issuer_subject = get_issuer_subject(attest_key, cert_chain, error); in generate_attestation() 329 return make_cert_chain(certificate.get(), move(cert_chain), error); in generate_attestation()
|
/system/security/keystore2/src/ |
D | remote_provisioning.rs | 120 |cert_chain| Ok(Some(cert_chain)), in get_rem_prov_attest_key() 134 let cert_chain = db in get_rem_prov_attest_key_helper() localVariable 137 match cert_chain { in get_rem_prov_attest_key_helper() 138 Some(cert_chain) => Ok(Some(cert_chain)), in get_rem_prov_attest_key_helper() 198 Some(cert_chain) => Ok(Some(( in get_remotely_provisioned_attestation_key_and_certs() 200 keyBlob: cert_chain.private_key.to_vec(), in get_remotely_provisioned_attestation_key_and_certs() 203 &cert_chain.batch_cert, in get_remotely_provisioned_attestation_key_and_certs() 210 Certificate { encodedCertificate: cert_chain.cert_chain }, in get_remotely_provisioned_attestation_key_and_certs()
|
D | database.rs | 578 cert_chain: Option<Vec<u8>>, field 583 pub fn new(cert: Option<Vec<u8>>, cert_chain: Option<Vec<u8>>) -> Self { in new() 584 Self { cert, cert_chain } in new() 594 self.cert_chain.take() in take_cert_chain() 607 pub cert_chain: Vec<u8>, field 619 cert_chain: Option<Vec<u8>>, field 648 pub fn cert_chain(&self) -> &Option<Vec<u8>> { in cert_chain() method 649 &self.cert_chain in cert_chain() 653 self.cert_chain.take() in take_cert_chain() 1713 cert_chain: &[u8], in store_signed_attestation_certificate_chain() [all …]
|
/system/keymaster/include/keymaster/ |
D | key_factory.h | 45 CertificateChain* cert_chain) const = 0; 55 CertificateChain* cert_chain) const = 0;
|
D | soft_keymaster_device.h | 202 keymaster_cert_chain_t* cert_chain);
|
/system/keymaster/include/keymaster/km_openssl/ |
D | rsa_key_factory.h | 38 CertificateChain* cert_chain) const override; 47 CertificateChain* cert_chain) const override;
|
D | ec_key_factory.h | 41 CertificateChain* cert_chain) const override; 50 CertificateChain* cert_chain) const override;
|
D | symmetric_key.h | 41 CertificateChain* cert_chain) const override; 50 CertificateChain* cert_chain) const override;
|
/system/keymaster/ng/ |
D | AndroidKeymaster3Device.cpp | 154 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 156 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 158 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 159 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 160 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
D | AndroidKeymaster4Device.cpp | 107 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 109 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 111 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 112 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 113 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/system/core/trusty/keymaster/3.0/ |
D | TrustyKeymaster3Device.cpp | 143 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 145 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 147 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 148 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 149 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
D | trusty_keymaster_device.h | 66 keymaster_cert_chain_t* cert_chain); 123 keymaster_cert_chain_t* cert_chain);
|
/system/keymaster/legacy_support/ |
D | keymaster1_legacy_support.cpp | 229 CertificateChain* cert_chain) const { in GenerateKey() 233 sw_enforced, cert_chain); in GenerateKey() 257 cert_chain); in GenerateKey()
|
/system/keymaster/contexts/ |
D | soft_keymaster_device.cpp | 987 keymaster_cert_chain_t* cert_chain) { in attest_key() argument 988 if (!dev || !key_to_attest || !attest_params || !cert_chain) in attest_key() 993 *cert_chain = {}; in attest_key() 1014 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key() 1015 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); in attest_key() 1016 if (!cert_chain->entries) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in attest_key() 1017 cert_chain->entry_count = rsp_chain.entry_count; in attest_key() 1018 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) in attest_key() 1024 cert_chain->entries[i].data = reinterpret_cast<uint8_t*>(malloc(entry.data_length)); in attest_key() 1025 if (!cert_chain->entries[i].data) { in attest_key() [all …]
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 195 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 197 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 199 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 200 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 201 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 3788 keymaster_cert_chain_t cert_chain; in TEST_P() local 3789 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); in TEST_P() 3790 ASSERT_EQ(3U, cert_chain.entry_count); in TEST_P() 3791 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() 3801 expected_keymaster_security_level, cert_chain.entries[0])); in TEST_P() 3803 keymaster_free_cert_chain(&cert_chain); in TEST_P() 3823 keymaster_cert_chain_t cert_chain; in TEST_P() local 3824 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); in TEST_P() 3825 ASSERT_EQ(3U, cert_chain.entry_count); in TEST_P() 3826 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() [all …]
|
D | android_keymaster_test_utils.cpp | 338 keymaster_cert_chain_t* cert_chain) { in AttestKey() argument 346 return device()->attest_key(device(), &blob_, &attest_params, cert_chain); in AttestKey()
|