/system/keymaster/contexts/ |
D | keymaster2_passthrough_context.cpp | 128 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const { in GenerateAttestation() 129 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateAttestation() 135 cert_chain->reset(new keymaster_cert_chain_t); in GenerateAttestation() 136 **cert_chain = { new keymaster_blob_t[cchain.entry_count], cchain.entry_count }; in GenerateAttestation() 138 (*cert_chain)->entries[i] = { dup_array(cchain.entries[i].data, in GenerateAttestation()
|
D | soft_keymaster_device.cpp | 1072 keymaster_cert_chain_t* cert_chain) { in attest_key() argument 1073 if (!dev || !key_to_attest || !attest_params || !cert_chain) in attest_key() 1079 *cert_chain = {}; in attest_key() 1100 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key() 1101 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); in attest_key() 1102 if (!cert_chain->entries) in attest_key() 1104 cert_chain->entry_count = rsp_chain.entry_count; in attest_key() 1105 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) in attest_key() 1111 cert_chain->entries[i].data = reinterpret_cast<uint8_t*>(malloc(entry.data_length)); in attest_key() 1112 if (!cert_chain->entries[i].data) { in attest_key() [all …]
|
D | keymaster1_passthrough_context.cpp | 233 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const { in GenerateAttestation() 254 *attestation_chain, *attestation_key, *this, cert_chain); in GenerateAttestation()
|
D | soft_keymaster_context.cpp | 447 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const { in GenerateAttestation() 469 *attestation_chain, *attestation_key, *this, cert_chain); in GenerateAttestation()
|
D | pure_soft_keymaster_context.cpp | 263 CertChainPtr* cert_chain) const { in GenerateAttestation() 285 *attestation_chain, *attestation_key, *this, cert_chain); in GenerateAttestation()
|
/system/security/keystore/ |
D | legacy_keymaster_device_wrapper.cpp | 150 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) { in kmCertChain2Hidl() argument 152 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result; in kmCertChain2Hidl() 154 result.resize(cert_chain->entry_count); in kmCertChain2Hidl() 155 for (size_t i = 0; i < cert_chain->entry_count; ++i) { in kmCertChain2Hidl() 156 auto& entry = cert_chain->entries[i]; in kmCertChain2Hidl() 375 keymaster_cert_chain_t cert_chain = {}; in attestKey() local 381 &cert_chain); in attestKey() 384 resultCertChain = kmCertChain2Hidl(&cert_chain); in attestKey() 389 keymaster_free_cert_chain(&cert_chain); in attestKey()
|
/system/core/adb/tls/ |
D | tls_connection.cpp | 250 std::vector<CRYPTO_BUFFER*> cert_chain = { in DoHandshake() local 253 if (!SSL_CTX_set_chain_and_key(ssl_ctx_.get(), cert_chain.data(), cert_chain.size(), in DoHandshake() 381 std::vector<CRYPTO_BUFFER*> cert_chain = { in SetCertAndKey() local 384 if (!SSL_set_chain_and_key(ssl, cert_chain.data(), cert_chain.size(), evp_pkey.get(), in SetCertAndKey()
|
/system/core/trusty/keymaster/3.0/ |
D | TrustyKeymaster3Device.cpp | 143 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 145 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 147 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 148 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 149 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/system/keymaster/ng/ |
D | AndroidKeymaster3Device.cpp | 155 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 157 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 159 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 160 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 161 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
D | AndroidKeymaster4Device.cpp | 107 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 109 if (!cert_chain.entry_count || !cert_chain.entries) in kmCertChain2Hidl() 112 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 113 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 114 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
D | trusty_keymaster_device.h | 66 keymaster_cert_chain_t* cert_chain); 123 keymaster_cert_chain_t* cert_chain);
|
/system/core/adb/tls/include/adb/tls/ |
D | tls_connection.h | 119 static bool SetCertAndKey(SSL* ssl, std::string_view cert_chain, std::string_view priv_key);
|
/system/keymaster/include/keymaster/contexts/ |
D | keymaster2_passthrough_context.h | 103 CertChainPtr* cert_chain) const override;
|
D | keymaster1_passthrough_context.h | 110 CertChainPtr* cert_chain) const override;
|
D | pure_soft_keymaster_context.h | 73 CertChainPtr* cert_chain) const override;
|
D | soft_keymaster_context.h | 85 CertChainPtr* cert_chain) const override;
|
/system/keymaster/include/keymaster/ |
D | keymaster_context.h | 139 CertChainPtr* cert_chain) const = 0;
|
D | soft_keymaster_device.h | 210 keymaster_cert_chain_t* cert_chain);
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 195 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 197 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 199 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 200 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 201 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/system/keymaster/km_openssl/ |
D | attestation_utils.cpp | 130 inline size_t noOfCert(const keymaster_cert_chain_t& cert_chain) { return cert_chain.entry_count; } in noOfCert() argument
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 4063 keymaster_cert_chain_t cert_chain; in TEST_P() local 4064 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); in TEST_P() 4065 ASSERT_EQ(3U, cert_chain.entry_count); in TEST_P() 4066 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() 4081 expected_keymaster_security_level, cert_chain.entries[0])); in TEST_P() 4083 keymaster_free_cert_chain(&cert_chain); in TEST_P() 4101 keymaster_cert_chain_t cert_chain; in TEST_P() local 4102 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", "attest_app_id", &cert_chain)); in TEST_P() 4103 ASSERT_EQ(3U, cert_chain.entry_count); in TEST_P() 4104 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() [all …]
|
D | android_keymaster_test_utils.cpp | 339 keymaster_cert_chain_t* cert_chain) { in AttestKey() argument 347 return device()->attest_key(device(), &blob_, &attest_params, cert_chain); in AttestKey()
|