/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 231 hidl_vec<hidl_vec<uint8_t>> cert_chain; in TEST_P() local 238 &cert_chain))); in TEST_P() 253 &cert_chain))); in TEST_P() 266 hidl_vec<hidl_vec<uint8_t>> cert_chain; in TEST_P() local 274 &cert_chain)); in TEST_P() 280 EXPECT_EQ(2U, cert_chain.size()); in TEST_P() 313 hidl_vec<hidl_vec<uint8_t>> cert_chain; in TEST_P() local 321 &cert_chain)); in TEST_P() 327 EXPECT_EQ(2U, cert_chain.size()); in TEST_P() 372 hidl_vec<hidl_vec<uint8_t>> cert_chain; in TEST_P() local [all …]
|
/aosp12/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.h | 72 CertificateChain* cert_chain) const { in GenerateKey() argument 76 sw_enforced, cert_chain); in GenerateKey() 80 sw_enforced, cert_chain); in GenerateKey() 91 AuthorizationSet* sw_enforced, CertificateChain* cert_chain) const { in ImportKey() argument 95 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey() 99 issuer_subject, output_key_blob, hw_enforced, sw_enforced, cert_chain); in ImportKey() 153 CertificateChain* cert_chain) const;
|
H A D | ec_keymaster1_key.h | 50 CertificateChain* cert_chain) const override; 60 CertificateChain* cert_chain) const override;
|
H A D | rsa_keymaster1_key.h | 50 CertificateChain* cert_chain) const override; 60 CertificateChain* cert_chain) const override;
|
/aosp12/system/keymaster/km_openssl/ |
H A D | rsa_key_factory.cpp | 57 CertificateChain* cert_chain) const { in GenerateKey() 102 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateKey() 106 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in GenerateKey() 112 *cert_chain = in GenerateKey() 127 CertificateChain* cert_chain) const { in ImportKey() 142 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in ImportKey() 153 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in ImportKey() 159 *cert_chain = in ImportKey()
|
H A D | ec_key_factory.cpp | 85 CertificateChain* cert_chain) const { in GenerateKey() 132 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in GenerateKey() 136 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in GenerateKey() 141 *cert_chain = context_.GenerateSelfSignedCertificate( in GenerateKey() 156 CertificateChain* cert_chain) const { in ImportKey() 170 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; in ImportKey() 181 *cert_chain = context_.GenerateAttestation(key, key_description, move(attest_key), in ImportKey() 186 *cert_chain = context_.GenerateSelfSignedCertificate( in ImportKey()
|
H A D | attestation_utils.cpp | 198 const CertificateChain& cert_chain, keymaster_error_t* error) { in get_issuer_subject() argument 204 if (cert_chain.entry_count >= 1) return get_issuer_subject(cert_chain.entries[0], error); in get_issuer_subject() 307 CertificateChain cert_chain = in generate_attestation() local 311 X509_NAME_Ptr issuer_subject = get_issuer_subject(attest_key, cert_chain, error); in generate_attestation() 330 return make_cert_chain(certificate.get(), move(cert_chain), error); in generate_attestation()
|
/aosp12/system/keymaster/ng/include/ |
H A D | KeyMintUtils.h | 102 inline vector<Certificate> kmCertChain2Aidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Aidl() argument 104 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Aidl() 106 result.resize(cert_chain.entry_count); in kmCertChain2Aidl() 107 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Aidl() 108 result[i].encodedCertificate = kmBlob2vector(cert_chain.entries[i]); in kmCertChain2Aidl()
|
/aosp12/system/security/keystore2/src/ |
H A D | remote_provisioning.rs | 120 |cert_chain| Ok(Some(cert_chain)), in get_rem_prov_attest_key() 134 let cert_chain = db in get_rem_prov_attest_key_helper() localVariable 137 match cert_chain { in get_rem_prov_attest_key_helper() 138 Some(cert_chain) => Ok(Some(cert_chain)), in get_rem_prov_attest_key_helper() 198 Some(cert_chain) => Ok(Some(( in get_remotely_provisioned_attestation_key_and_certs() 200 keyBlob: cert_chain.private_key.to_vec(), in get_remotely_provisioned_attestation_key_and_certs() 203 &cert_chain.batch_cert, in get_remotely_provisioned_attestation_key_and_certs() 210 Certificate { encodedCertificate: cert_chain.cert_chain }, in get_remotely_provisioned_attestation_key_and_certs()
|
H A D | database.rs | 594 self.cert_chain.take() in take_cert_chain() 607 pub cert_chain: Vec<u8>, field 649 &self.cert_chain in cert_chain() 653 self.cert_chain.take() in take_cert_chain() 1713 cert_chain: &[u8], in store_signed_attestation_certificate_chain() 2269 if let Some(cert_chain) = &cert_info.cert_chain { in store_new_key() 3471 assert_eq!(cert_chain.cert_chain, loaded_values.cert_chain); in test_store_signed_attestation_certificate_chain() 3520 &cert_chain, in test_get_attestation_pool_status() 3560 let mut cert_chain = in test_remove_expired_certs() localVariable 3565 assert_eq!(entry_values.cert_chain, value.cert_chain); in test_remove_expired_certs() [all …]
|
/aosp12/packages/modules/adb/tls/ |
H A D | tls_connection.cpp | 250 std::vector<CRYPTO_BUFFER*> cert_chain = { in DoHandshake() local 253 if (!SSL_CTX_set_chain_and_key(ssl_ctx_.get(), cert_chain.data(), cert_chain.size(), in DoHandshake() 381 std::vector<CRYPTO_BUFFER*> cert_chain = { in SetCertAndKey() local 384 if (!SSL_set_chain_and_key(ssl, cert_chain.data(), cert_chain.size(), evp_pkey.get(), in SetCertAndKey()
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | key_factory.h | 45 CertificateChain* cert_chain) const = 0; 55 CertificateChain* cert_chain) const = 0;
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | rsa_key_factory.h | 38 CertificateChain* cert_chain) const override; 47 CertificateChain* cert_chain) const override;
|
H A D | ec_key_factory.h | 41 CertificateChain* cert_chain) const override; 50 CertificateChain* cert_chain) const override;
|
H A D | symmetric_key.h | 41 CertificateChain* cert_chain) const override; 50 CertificateChain* cert_chain) const override;
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidKeymaster3Device.cpp | 154 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 156 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 158 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 159 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 160 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
H A D | AndroidKeymaster4Device.cpp | 107 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 109 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 111 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 112 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 113 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/aosp12/system/core/trusty/keymaster/3.0/ |
H A D | TrustyKeymaster3Device.cpp | 143 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 145 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 147 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 148 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 149 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 987 keymaster_cert_chain_t* cert_chain) { in attest_key() argument 988 if (!dev || !key_to_attest || !attest_params || !cert_chain) in attest_key() 993 *cert_chain = {}; in attest_key() 1014 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key() 1015 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); in attest_key() 1016 if (!cert_chain->entries) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in attest_key() 1017 cert_chain->entry_count = rsp_chain.entry_count; in attest_key() 1018 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) in attest_key() 1025 if (!cert_chain->entries[i].data) { in attest_key() 1026 keymaster_free_cert_chain(cert_chain); in attest_key() [all …]
|
/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.cpp | 229 CertificateChain* cert_chain) const { in GenerateKey() 233 sw_enforced, cert_chain); in GenerateKey() 257 cert_chain); in GenerateKey()
|
/aosp12/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
H A D | trusty_keymaster_device.h | 66 keymaster_cert_chain_t* cert_chain); 123 keymaster_cert_chain_t* cert_chain);
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 4362 &cert_chain)); in TEST_P() 4363 EXPECT_GE(cert_chain.size(), 2U); in TEST_P() 4394 &cert_chain)); in TEST_P() 4414 &cert_chain)); in TEST_P() 4415 EXPECT_GE(cert_chain.size(), 2U); in TEST_P() 4464 EXPECT_GE(cert_chain.size(), 2U); in TEST_P() 4532 &cert_chain)); in TEST_P() 4557 &cert_chain)); in TEST_P() 4558 EXPECT_GE(cert_chain.size(), 2U); in TEST_P() 4584 &cert_chain)); in TEST_P() [all …]
|
/aosp12/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 195 const keymaster_cert_chain_t& cert_chain) { in kmCertChain2Hidl() argument 197 if (!cert_chain.entry_count || !cert_chain.entries) return result; in kmCertChain2Hidl() 199 result.resize(cert_chain.entry_count); in kmCertChain2Hidl() 200 for (size_t i = 0; i < cert_chain.entry_count; ++i) { in kmCertChain2Hidl() 201 result[i] = kmBlob2hidlVec(cert_chain.entries[i]); in kmCertChain2Hidl()
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 3923 hidl_vec<hidl_vec<uint8_t>> cert_chain; in TEST_P() local 3928 &cert_chain)); in TEST_P() 3929 EXPECT_GE(cert_chain.size(), 2U); in TEST_P() 3930 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() 3956 &cert_chain)); in TEST_P() 3976 &cert_chain)); in TEST_P() 3977 EXPECT_GE(cert_chain.size(), 2U); in TEST_P() 3978 EXPECT_TRUE(verify_chain(cert_chain)); in TEST_P() 4004 &cert_chain)); in TEST_P() 4027 &cert_chain)); in TEST_P() [all …]
|
/aosp12/packages/modules/adb/tls/include/adb/tls/ |
H A D | tls_connection.h | 119 static bool SetCertAndKey(SSL* ssl, std::string_view cert_chain, std::string_view priv_key);
|