/system/keymaster/android_keymaster/ |
D | remote_provisioning_utils.cpp | 71 if (!item || !item->asArray()) { in validateAndExtractEekPubAndId() 76 const cppbor::Array* certArr = item->asArray(); in validateAndExtractEekPubAndId() 80 verifyAndParseCoseSign1(certArr->get(i)->asArray(), lastPubKey, {} /* AAD */); in validateAndExtractEekPubAndId() 134 if (!macedKeyItem || !macedKeyItem->asArray() || in validateAndExtractPubkeys() 135 macedKeyItem->asArray()->size() != kCoseMac0EntryCount) { in validateAndExtractPubkeys() 140 auto protectedParms = macedKeyItem->asArray()->get(kCoseMac0ProtectedParams)->asBstr(); in validateAndExtractPubkeys() 141 auto unprotectedParms = macedKeyItem->asArray()->get(kCoseMac0UnprotectedParams)->asMap(); in validateAndExtractPubkeys() 142 auto payload = macedKeyItem->asArray()->get(kCoseMac0Payload)->asBstr(); in validateAndExtractPubkeys() 143 auto tag = macedKeyItem->asArray()->get(kCoseMac0Tag)->asBstr(); in validateAndExtractPubkeys()
|
/system/security/provisioner/ |
D | rkp_factory_extraction_lib_test.cpp | 186 ASSERT_THAT(csr->asArray(), Pointee(Property(&Array::size, Eq(4)))); in TEST() 191 EXPECT_THAT(parsedEek->asArray(), Pointee(Property(&Array::size, Gt(1)))); in TEST() 195 const Array* deviceInfoArray = csr->get(0)->asArray(); in TEST() 213 const Array* actualProtectedData = csr->get(2)->asArray(); in TEST() 217 const Array* actualMacedKeys = csr->get(3)->asArray(); in TEST() 260 EXPECT_THAT(csr->get(2)->asArray(), NotNull()); in TEST() 261 EXPECT_THAT(csr->get(3)->asArray(), NotNull()); in TEST()
|
D | rkp_factory_extraction_lib.cpp | 212 if (!parsedCsr->asArray()) { in composeCertificateRequestV3() 222 parsedCsr->asArray()->add(std::move(unverifiedDeviceInfo)); in composeCertificateRequestV3() 223 return {std::unique_ptr<Array>(parsedCsr.release()->asArray()), ""}; in composeCertificateRequestV3()
|
/system/keymaster/cppcose/ |
D | cppcose.cpp | 268 auto mac = macItem ? macItem->asArray() : nullptr; in verifyAndParseCoseMac0() 493 if (!coseEncrypt || !coseEncrypt->asArray() || in getSenderPubKeyFromCoseEncrypt() 494 coseEncrypt->asArray()->size() != kCoseEncryptEntryCount) { in getSenderPubKeyFromCoseEncrypt() 498 auto& recipients = coseEncrypt->asArray()->get(kCoseEncryptRecipients); in getSenderPubKeyFromCoseEncrypt() 499 if (!recipients || !recipients->asArray() || recipients->asArray()->size() != 1) { in getSenderPubKeyFromCoseEncrypt() 503 auto& recipient = recipients->asArray()->get(0); in getSenderPubKeyFromCoseEncrypt() 504 if (!recipient || !recipient->asArray() || recipient->asArray()->size() != 3) { in getSenderPubKeyFromCoseEncrypt() 508 auto& ciphertext = recipient->asArray()->get(2); in getSenderPubKeyFromCoseEncrypt() 514 auto& protParms = recipient->asArray()->get(0); in getSenderPubKeyFromCoseEncrypt() 525 auto& unprotParms = recipient->asArray()->get(1); in getSenderPubKeyFromCoseEncrypt() [all …]
|
/system/libcppbor/tests/ |
D | cppbor_test.cpp | 727 EXPECT_EQ(nullptr, item->asArray()); in TEST() 748 EXPECT_EQ(nullptr, item->asArray()); in TEST() 769 EXPECT_EQ(nullptr, item->asArray()); in TEST() 790 EXPECT_EQ(nullptr, item->asArray()); in TEST() 810 EXPECT_EQ(nullptr, item->asArray()); in TEST() 837 EXPECT_EQ(nullptr, item->asArray()); in TEST() 857 EXPECT_NE(nullptr, item->asArray()); in TEST() 861 EXPECT_EQ(0U, item->asArray()->size()); in TEST() 876 EXPECT_EQ(nullptr, item->asArray()); in TEST() 906 EXPECT_EQ(nullptr, item->asArray()); in TEST() [all …]
|
/system/security/identity/ |
D | CredentialData.cpp | 144 const cppbor::Array* array = item.asArray(); in parseSacp() 175 const cppbor::Array* array = item.asArray(); in parseAuthKeyData() 211 const cppbor::Array* array = item.asArray(); in parseAccessControlProfileIds() 230 const cppbor::Array* array = item.asArray(); in parseEncryptedChunks() 308 const cppbor::Array* array = valueItem->asArray(); in loadFromDisk() 338 const cppbor::Array* ecEntryArrayItem = ecValueItem->asArray(); in loadFromDisk() 373 const cppbor::Array* array = valueItem->asArray(); in loadFromDisk()
|
D | Credential.cpp | 865 const cppbor::Array* array = item->asArray(); in extractDocType()
|
/system/libcppbor/src/ |
D | cppbor.cpp | 58 const Array* array = compoundItem->asArray(); in cborAreAllElementsNonCompound() 181 const Array* array = item->asArray(); in prettyPrintInternal() 350 return *asArray() == *(other.asArray()); in operator ==() 517 std::for_each(item->asArray()->begin(), item->asArray()->end(), in recursivelyCanonicalize()
|
/system/keymaster/contexts/ |
D | pure_soft_remote_provisioning_context.cpp | 174 if (!clone->asArray()) { in BuildProtectedDataPayload() 177 bcc = std::move(*clone->asArray()); in BuildProtectedDataPayload() 224 .add(std::move(*bcc_.clone()->asArray()) /* DiceCertChain */) in BuildCsr()
|
/system/libcppbor/include/cppbor/ |
D | cppbor.h | 152 virtual Array* asArray() { return nullptr; } in asArray() function 153 const Array* asArray() const { return const_cast<Item*>(this)->asArray(); } in asArray() function 654 using Item::asArray; 655 Array* asArray() override { return this; } in asArray() function 834 using Item::asArray; 835 Array* asArray() override { return mTaggedItem->asArray(); } in asArray() function
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 1513 const cppbor::Array* array_value = value_item->asArray(); in parse_eat_record() 1655 for (size_t j = 0; j < value_item->asArray()->size(); j++) { in parse_submod_values() 1658 (*value_item->asArray())[j]->asInt()->value())); in parse_submod_values() 1662 for (size_t j = 0; j < value_item->asArray()->size(); j++) { in parse_submod_values() 1665 (*value_item->asArray())[j]->asInt()->value())); in parse_submod_values() 1669 for (size_t j = 0; j < value_item->asArray()->size(); j++) { in parse_submod_values() 1672 static_cast<keymaster_digest_t>((*value_item->asArray())[j]->asInt()->value())); in parse_submod_values() 1676 for (size_t j = 0; j < value_item->asArray()->size(); j++) { in parse_submod_values() 1679 (*value_item->asArray())[j]->asInt()->value())); in parse_submod_values()
|