/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_legacy_support.h | 68 const KeymasterBlob& issuer_subject, in GenerateKey() argument 75 issuer_subject, key_blob, hw_enforced, in GenerateKey() 79 issuer_subject, key_blob, hw_enforced, in GenerateKey() 88 const KeymasterBlob& issuer_subject, in ImportKey() argument 95 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey() 99 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey() 149 const KeymasterBlob& issuer_subject, //
|
D | ec_keymaster1_key.h | 46 const KeymasterBlob& issuer_subject, // 56 const KeymasterBlob& issuer_subject,
|
D | rsa_keymaster1_key.h | 46 const KeymasterBlob& issuer_subject, // 56 const KeymasterBlob& issuer_subject,
|
/system/keymaster/km_openssl/ |
D | attestation_utils.cpp | 160 const uint8_t* p = attest_key.issuer_subject->data; in get_issuer_subject() 161 if (!p || !attest_key.issuer_subject->data_length) { in get_issuer_subject() 166 attest_key.issuer_subject->data_length)); in get_issuer_subject() 184 X509_NAME* issuer_subject = X509_get_subject_name(signing_cert.get()); in get_issuer_subject() local 185 if (!issuer_subject) { in get_issuer_subject() 190 X509_NAME_Ptr retval(X509_NAME_dup(issuer_subject)); in get_issuer_subject() 239 : issuer_subject(issuer_subject_) { in AttestKeyInfo() 244 issuer_subject = nullptr; in AttestKeyInfo() 248 if (!issuer_subject) { in AttestKeyInfo() 310 X509_NAME_Ptr issuer_subject = get_issuer_subject(attest_key, cert_chain, error); in generate_attestation() local [all …]
|
D | rsa_key_factory.cpp | 53 const KeymasterBlob& issuer_subject, in GenerateKey() argument 107 issuer_subject, &error); in GenerateKey() 124 const KeymasterBlob& issuer_subject, in ImportKey() argument 155 issuer_subject, &error); in ImportKey()
|
D | ec_key_factory.cpp | 81 const KeymasterBlob& issuer_subject, in GenerateKey() argument 137 issuer_subject, &error); in GenerateKey() 153 const KeymasterBlob& issuer_subject, in ImportKey() argument 183 issuer_subject, &error); in ImportKey()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_utils.h | 38 AttestKeyInfo(const UniquePtr<Key>& key, const KeymasterBlob* issuer_subject, 48 const KeymasterBlob* issuer_subject; member
|
D | rsa_key_factory.h | 34 const KeymasterBlob& issuer_subject, // 43 const KeymasterBlob& issuer_subject,
|
D | ec_key_factory.h | 37 const KeymasterBlob& issuer_subject, // 46 const KeymasterBlob& issuer_subject,
|
D | symmetric_key.h | 37 const KeymasterBlob& issuer_subject, // 46 const KeymasterBlob& issuer_subject, //
|
/system/keymaster/include/keymaster/ |
D | key_factory.h | 41 const KeymasterBlob& issuer_subject, 51 const KeymasterBlob& issuer_subject,
|
D | keymaster_context.h | 162 const KeymasterBlob& issuer_subject,
|
/system/security/keystore2/src/ |
D | attestation_key_utils.rs | 45 issuer_subject: Vec<u8>, 89 let issuer_subject: Vec<u8> = parse_subject_from_certificate(&cert).context( in get_user_generated_attestation_key() localVariable 93 Ok(AttestationKeyInfo::UserGenerated { key_id_guard, blob, issuer_subject, blob_metadata }) in get_user_generated_attestation_key()
|
D | security_level.rs | 518 issuer_subject, in generate_key() 530 issuerSubjectName: issuer_subject.clone(), in generate_key()
|
/system/keymaster/legacy_support/ |
D | keymaster1_legacy_support.cpp | 225 const KeymasterBlob& issuer_subject, // in GenerateKey() argument 232 issuer_subject, key_blob, hw_enforced, in GenerateKey() 256 issuer_subject, key_blob, hw_enforced, sw_enforced, in GenerateKey()
|
/system/keymaster/include/keymaster/contexts/ |
D | keymaster2_passthrough_context.h | 108 const KeymasterBlob& issuer_subject,
|
D | keymaster1_passthrough_context.h | 114 const KeymasterBlob& issuer_subject,
|
D | soft_keymaster_context.h | 83 const KeymasterBlob& issuer_subject,
|
D | pure_soft_keymaster_context.h | 76 const KeymasterBlob& issuer_subject,
|
/system/keymaster/tests/ |
D | android_keymaster_messages_test.cpp | 85 req.issuer_subject = KeymasterBlob(reinterpret_cast<const uint8_t*>("bar"), 3); in TEST() 97 EXPECT_EQ(0, memcmp(req.issuer_subject.data, deserialized->issuer_subject.data, in TEST() 98 deserialized->issuer_subject.data_length)); in TEST() 482 msg.issuer_subject = KeymasterBlob(reinterpret_cast<const uint8_t*>("bar"), 3); in TEST() 498 EXPECT_EQ(0, memcmp(msg.issuer_subject.data, deserialized->issuer_subject.data, in TEST() 499 deserialized->issuer_subject.data_length)); in TEST()
|
/system/keymaster/android_keymaster/ |
D | android_keymaster_messages.cpp | 187 + blob_size(issuer_subject); in SerializedSize() 195 return serialize_blob(issuer_subject, buf, end); in Serialize() 203 && deserialize_blob(&issuer_subject, buf_ptr, end); in Deserialize() 522 + blob_size(issuer_subject); in SerializedSize() 532 return serialize_blob(issuer_subject, buf, end); in Serialize() 545 && deserialize_blob(&issuer_subject, buf_ptr, end); in Deserialize()
|
D | android_keymaster.cpp | 338 request.issuer_subject, in GenerateKey() 788 request.issuer_subject, // in ImportKey()
|
/system/core/trusty/keymaster/keymint/ |
D | TrustyKeyMintDevice.cpp | 127 request.issuer_subject = KeymasterBlob(attestationKey->issuerSubjectName.data(), in generateKey() 174 request.issuer_subject = KeymasterBlob(attestationKey->issuerSubjectName.data(), in importKey()
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 338 const KeymasterBlob& issuer_subject, in GenerateAttestation() argument 362 AttestKeyInfo attest_key_info(attest_key, &issuer_subject, error); in GenerateAttestation()
|
/system/keymaster/ng/ |
D | AndroidKeyMintDevice.cpp | 262 request.issuer_subject = KeymasterBlob(attestationKey->issuerSubjectName.data(), in generateKey() 302 request.issuer_subject = KeymasterBlob(attestationKey->issuerSubjectName.data(), in importKey()
|