Home
last modified time | relevance | path

Searched refs:cert_chain (Results 1 – 23 of 23) sorted by relevance

/system/keymaster/include/keymaster/legacy_support/
Dkeymaster1_legacy_support.h72 CertificateChain* cert_chain) const { in GenerateKey() argument
76 sw_enforced, cert_chain); in GenerateKey()
80 sw_enforced, cert_chain); in GenerateKey()
91 AuthorizationSet* sw_enforced, CertificateChain* cert_chain) const { in ImportKey() argument
95 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey()
99 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey()
153 CertificateChain* cert_chain) const;
Dec_keymaster1_key.h50 CertificateChain* cert_chain) const override;
60 CertificateChain* cert_chain) const override;
Drsa_keymaster1_key.h50 CertificateChain* cert_chain) const override;
60 CertificateChain* cert_chain) const override;
/system/keymaster/ng/include/
DKeyMintUtils.h102 inline vector<Certificate> kmCertChain2Aidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Aidl() argument
104 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Aidl()
106 result.resize(cert_chain.entry_count); in kmCertChain2Aidl()
107 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Aidl()
108 result[i].encodedCertificate = kmBlob2vector(cert_chain.entries[i]); in kmCertChain2Aidl()
/system/keymaster/km_openssl/
Drsa_key_factory.cpp57 CertificateChain* cert_chain) const { in GenerateKey()
102 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateKey()
106 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in GenerateKey()
113 *cert_chain = in GenerateKey()
128 CertificateChain* cert_chain) const { in ImportKey()
143 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in ImportKey()
154 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in ImportKey()
161 *cert_chain = in ImportKey()
Dec_key_factory.cpp85 CertificateChain* cert_chain) const { in GenerateKey()
132 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateKey()
136 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in GenerateKey()
141 *cert_chain = context_.GenerateSelfSignedCertificate( in GenerateKey()
157 CertificateChain* cert_chain) const { in ImportKey()
171 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in ImportKey()
182 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in ImportKey()
187 *cert_chain = context_.GenerateSelfSignedCertificate( in ImportKey()
Dattestation_utils.cpp198 const CertificateChain& cert_chain, keymaster_error_t* error) { in get_issuer_subject() argument
204 if (cert_chain.entry_count >= 1) return get_issuer_subject(cert_chain.entries[0], error); in get_issuer_subject()
306 CertificateChain cert_chain = in generate_attestation() local
310 X509_NAME_Ptr issuer_subject = get_issuer_subject(attest_key, cert_chain, error); in generate_attestation()
329 return make_cert_chain(certificate.get(), move(cert_chain), error); in generate_attestation()
/system/security/keystore2/src/
Dremote_provisioning.rs120 |cert_chain| Ok(Some(cert_chain)), in get_rem_prov_attest_key()
134 let cert_chain = db in get_rem_prov_attest_key_helper() localVariable
137 match cert_chain { in get_rem_prov_attest_key_helper()
138 Some(cert_chain) => Ok(Some(cert_chain)), in get_rem_prov_attest_key_helper()
198 Some(cert_chain) => Ok(Some(( in get_remotely_provisioned_attestation_key_and_certs()
200 keyBlob: cert_chain.private_key.to_vec(), in get_remotely_provisioned_attestation_key_and_certs()
203 &cert_chain.batch_cert, in get_remotely_provisioned_attestation_key_and_certs()
210 Certificate { encodedCertificate: cert_chain.cert_chain }, in get_remotely_provisioned_attestation_key_and_certs()
Ddatabase.rs578 cert_chain: Option<Vec<u8>>, field
583 pub fn new(cert: Option<Vec<u8>>, cert_chain: Option<Vec<u8>>) -> Self { in new()
584 Self { cert, cert_chain } in new()
594 self.cert_chain.take() in take_cert_chain()
607 pub cert_chain: Vec<u8>, field
619 cert_chain: Option<Vec<u8>>, field
648 pub fn cert_chain(&self) -> &Option<Vec<u8>> { in cert_chain() method
649 &self.cert_chain in cert_chain()
653 self.cert_chain.take() in take_cert_chain()
1713 cert_chain: &[u8], in store_signed_attestation_certificate_chain()
[all …]
/system/keymaster/include/keymaster/
Dkey_factory.h45 CertificateChain* cert_chain) const = 0;
55 CertificateChain* cert_chain) const = 0;
Dsoft_keymaster_device.h202 keymaster_cert_chain_t* cert_chain);
/system/keymaster/include/keymaster/km_openssl/
Drsa_key_factory.h38 CertificateChain* cert_chain) const override;
47 CertificateChain* cert_chain) const override;
Dec_key_factory.h41 CertificateChain* cert_chain) const override;
50 CertificateChain* cert_chain) const override;
Dsymmetric_key.h41 CertificateChain* cert_chain) const override;
50 CertificateChain* cert_chain) const override;
/system/keymaster/ng/
DAndroidKeymaster3Device.cpp154 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument
156 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl()
158 result.resize(cert_chain.entry_count); in kmCertChain2Hidl()
159 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl()
160 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
DAndroidKeymaster4Device.cpp107 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument
109 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl()
111 result.resize(cert_chain.entry_count); in kmCertChain2Hidl()
112 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl()
113 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
/system/core/trusty/keymaster/3.0/
DTrustyKeymaster3Device.cpp143 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument
145 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl()
147 result.resize(cert_chain.entry_count); in kmCertChain2Hidl()
148 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl()
149 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
/system/core/trusty/keymaster/include/trusty_keymaster/legacy/
Dtrusty_keymaster_device.h66 keymaster_cert_chain_t* cert_chain);
123 keymaster_cert_chain_t* cert_chain);
/system/keymaster/legacy_support/
Dkeymaster1_legacy_support.cpp229 CertificateChain* cert_chain) const { in GenerateKey()
233 sw_enforced, cert_chain); in GenerateKey()
257 cert_chain); in GenerateKey()
/system/keymaster/contexts/
Dsoft_keymaster_device.cpp987 keymaster_cert_chain_t* cert_chain) { in attest_key() argument
988 if (!dev || !key_to_attest || !attest_params || !cert_chain) in attest_key()
993 *cert_chain = {}; in attest_key()
1014 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key()
1015 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); in attest_key()
1016 if (!cert_chain->entries) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in attest_key()
1017 cert_chain->entry_count = rsp_chain.entry_count; in attest_key()
1018 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) in attest_key()
1024 cert_chain->entries[i].data = reinterpret_cast<uint8_t*>(malloc(entry.data_length)); in attest_key()
1025 if (!cert_chain->entries[i].data) { in attest_key()
[all …]
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp195 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument
197 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl()
199 result.resize(cert_chain.entry_count); in kmCertChain2Hidl()
200 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl()
201 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
/system/keymaster/tests/
Dandroid_keymaster_test.cpp3788 keymaster_cert_chain_t cert_chain; in TEST_P() local
3789 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); in TEST_P()
3790 ASSERT_EQ(3U, cert_chain.entry_count); in TEST_P()
3791 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P()
3801 expected_keymaster_security_level, cert_chain.entries[0])); in TEST_P()
3803 keymaster_free_cert_chain(&cert_chain); in TEST_P()
3823 keymaster_cert_chain_t cert_chain; in TEST_P() local
3824 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); in TEST_P()
3825 ASSERT_EQ(3U, cert_chain.entry_count); in TEST_P()
3826 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P()
[all …]
Dandroid_keymaster_test_utils.cpp338 keymaster_cert_chain_t* cert_chain) { in AttestKey() argument
346 return device()->attest_key(device(), &blob_, &attest_params, cert_chain); in AttestKey()