/aosp12/system/keymaster/tests/ |
H A D | attestation_record_test.cpp | 127 keymaster_blob_t attestation_challenge = {}; in TEST() local 132 &keymaster_security_level, &attestation_challenge, in TEST() 137 std::string(reinterpret_cast<const char*>(attestation_challenge.data), in TEST() 138 attestation_challenge.data_length)); in TEST() 139 delete[] attestation_challenge.data; in TEST() 218 keymaster_blob_t attestation_challenge = {}; in TEST() local 227 &keymaster_security_level, &attestation_challenge, &parsed_sw_set, in TEST() 236 std::string(reinterpret_cast<const char*>(attestation_challenge.data), in TEST() 237 attestation_challenge.data_length)); in TEST() 238 delete[] attestation_challenge.data; in TEST() [all …]
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | attestation_record.cpp | 124 ASN1_OCTET_STRING* attestation_challenge; member 135 ASN1_SIMPLE(KM_KEY_DESCRIPTION, attestation_challenge, ASN1_OCTET_STRING), 262 hidl_vec<uint8_t>* attestation_challenge, in MAKE_OPENSSL_PTR_TYPE() 277 auto& chall = record->attestation_challenge; in MAKE_OPENSSL_PTR_TYPE() 278 attestation_challenge->resize(chall->length); in MAKE_OPENSSL_PTR_TYPE() 279 memcpy(attestation_challenge->data(), chall->data, chall->length); in MAKE_OPENSSL_PTR_TYPE()
|
H A D | attestation_record.h | 48 hidl_vec<uint8_t>* attestation_challenge,
|
/aosp12/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 852 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_eat_record() local 857 if (!is_valid_attestation_challenge(attestation_challenge)) { in build_eat_record() 861 eat_record.add(EatClaim::NONCE, blob_to_bstr(attestation_challenge)); in build_eat_record() 1016 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_attestation_record() local 1021 if (!is_valid_attestation_challenge(attestation_challenge)) { in build_attestation_record() 1025 if (!ASN1_OCTET_STRING_set(key_desc->attestation_challenge, attestation_challenge.data, in build_attestation_record() 1026 attestation_challenge.data_length)) { in build_attestation_record() 1416 attestation_challenge->data = in parse_attestation_record() 1417 dup_buffer(record->attestation_challenge->data, record->attestation_challenge->length); in parse_attestation_record() 1418 attestation_challenge->data_length = record->attestation_challenge->length; in parse_attestation_record() [all …]
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 67 std::vector<uint8_t> attestation_challenge; member 77 std::vector<uint8_t>* attestation_challenge,
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | attestation_record.cpp | 168 ASN1_OCTET_STRING* attestation_challenge; member 179 ASN1_SIMPLE(KM_KEY_DESCRIPTION, attestation_challenge, ASN1_OCTET_STRING), 319 hidl_vec<uint8_t>* attestation_challenge, in MAKE_OPENSSL_PTR_TYPE() 334 auto& chall = record->attestation_challenge; in MAKE_OPENSSL_PTR_TYPE() 335 attestation_challenge->resize(chall->length); in MAKE_OPENSSL_PTR_TYPE() 336 memcpy(attestation_challenge->data(), chall->data, chall->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | attestation_record.cpp | 181 ASN1_OCTET_STRING* attestation_challenge; member 192 ASN1_SIMPLE(KM_KEY_DESCRIPTION, attestation_challenge, ASN1_OCTET_STRING), 338 vector<uint8_t>* attestation_challenge, in MAKE_OPENSSL_PTR_TYPE() 353 auto& chall = record->attestation_challenge; in MAKE_OPENSSL_PTR_TYPE() 354 attestation_challenge->resize(chall->length); in MAKE_OPENSSL_PTR_TYPE() 355 memcpy(attestation_challenge->data(), chall->data, chall->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/hardware/interfaces/keymaster/4.1/support/ |
H A D | attestation_record.cpp | 183 ASN1_OCTET_STRING* attestation_challenge; member 194 ASN1_SIMPLE(KM_KEY_DESCRIPTION, attestation_challenge, ASN1_OCTET_STRING), 380 auto& chall = record->attestation_challenge; in MAKE_OPENSSL_PTR_TYPE() 381 result.attestation_challenge.resize(chall->length); in MAKE_OPENSSL_PTR_TYPE() 382 memcpy(result.attestation_challenge.data(), chall->data, chall->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 202 ASN1_OCTET_STRING* attestation_challenge; member 213 ASN1_SIMPLE(KM_KEY_DESCRIPTION, attestation_challenge, ASN1_OCTET_STRING), 367 keymaster_blob_t* attestation_challenge, 388 keymaster_security_level_t* keymaster_security_level, keymaster_blob_t* attestation_challenge,
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | attestation_record.h | 57 hidl_vec<uint8_t>* attestation_challenge,
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 46 hidl_vec<uint8_t> attestation_challenge; member
|
/aosp12/hardware/interfaces/identity/aidl/vts/ |
H A D | Util.cpp | 343 EXPECT_EQ(expectedChallenge.size(), attRec.attestation_challenge.size()); in validateAttestationCertificate() 344 EXPECT_TRUE(memcmp(expectedChallenge.data(), attRec.attestation_challenge.data(), in validateAttestationCertificate() 345 attRec.attestation_challenge.size()) == 0); in validateAttestationCertificate()
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 1000 keymaster_blob_t attestation_challenge = {}; in attest_key() local 1001 request.attest_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge); in attest_key() 1002 if (attestation_challenge.data_length > kMaximumAttestationChallengeLength) { in attest_key() 1004 attestation_challenge.data_length, kMaximumAttestationChallengeLength); in attest_key()
|
/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 168 EXPECT_EQ(challenge, attestation.attestation_challenge); in check_attestation_record()
|