HomeSort by relevance Sort by last modified time
    Searched refs:cert_chain (Results 1 - 25 of 36) sorted by null

1 2

  /system/iot/attestation/atap/libatap/
atap_util.c 61 const AtapCertChain* cert_chain) {
63 cert_chain_serialized_size(cert_chain) - sizeof(uint32_t);
70 for (i = 0; i < cert_chain->entry_count; ++i) {
71 local_buf = append_blob_to_buf(local_buf, &cert_chain->entries[i]);
128 bool copy_cert_chain_from_buf(uint8_t** buf_ptr, AtapCertChain* cert_chain) {
134 atap_memset(cert_chain, 0, sizeof(AtapCertChain));
147 if (!copy_blob_from_buf(buf_ptr, &cert_chain->entries[i])) {
151 ++cert_chain->entry_count;
152 bytes_remaining -= (sizeof(uint32_t) + cert_chain->entries[i].data_length);
159 free_cert_chain(*cert_chain);
    [all...]
atap_util.h 153 const AtapCertChain* cert_chain);
166 bool copy_cert_chain_from_buf(uint8_t** buf_ptr, AtapCertChain* cert_chain);
172 uint32_t cert_chain_serialized_size(const AtapCertChain* cert_chain);
179 void free_cert_chain(AtapCertChain cert_chain);
atap_ops.h 50 * returns ATAP_RESULT_OK and populates |cert_chain|. New memory will be
52 * ownership. Entries for |cert_chain| must be allocated using
53 * atap_malloc(), and cert_chain->entry_count must be valid.
56 AtapCertChain* cert_chain);
58 /* Writes the |key_type| attestation |key| and |cert_chain|. The data
66 const AtapCertChain* cert_chain);
atap_commands.c 264 AtapCertChain cert_chain; local
268 atap_memset(&cert_chain, 0, sizeof(cert_chain));
270 if (!copy_cert_chain_from_buf(buf_ptr, &cert_chain)) {
278 if (key.data_length == 0 && cert_chain.entry_count) {
279 ret = ops->write_attestation_key(ops, key_type, NULL, &cert_chain);
280 } else if (key.data_length && cert_chain.entry_count) {
281 ret = ops->write_attestation_key(ops, key_type, &key, &cert_chain);
282 } else if (key.data_length && cert_chain.entry_count == 0) {
294 free_cert_chain(cert_chain);
    [all...]
  /system/iot/attestation/atap/test/
fake_atap_ops.cpp 45 AtapResult FakeAtapOps::read_auth_key_cert_chain(AtapCertChain* cert_chain) {
51 const AtapCertChain* cert_chain) {
fake_atap_ops.h 45 AtapResult read_auth_key_cert_chain(AtapCertChain* cert_chain) override;
49 const AtapCertChain* cert_chain) override;
  /system/keymaster/contexts/
keymaster2_passthrough_context.cpp 128 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const {
129 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER;
135 cert_chain->reset(new keymaster_cert_chain_t);
136 **cert_chain = { new keymaster_blob_t[cchain.entry_count], cchain.entry_count };
138 (*cert_chain)->entries[i] = { dup_array(cchain.entries[i].data,
keymaster1_passthrough_context.cpp 233 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const {
254 *attestation_chain, *attestation_key, *this, cert_chain);
soft_keymaster_device.cpp     [all...]
  /system/iot/attestation/atap/ops/
atap_ops_delegate.h 45 virtual AtapResult read_auth_key_cert_chain(AtapCertChain* cert_chain) = 0;
49 const AtapCertChain* cert_chain) = 0;
atap_ops_provider.cpp 45 AtapCertChain* cert_chain) {
48 ->read_auth_key_cert_chain(cert_chain);
54 const AtapCertChain* cert_chain) {
57 ->write_attestation_key(key_type, key, cert_chain);
  /system/security/keystore/
legacy_keymaster_device_wrapper.cpp 145 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) {
147 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result;
149 result.resize(cert_chain->entry_count);
150 for (size_t i = 0; i < cert_chain->entry_count; ++i) {
151 auto& entry = cert_chain->entries[i];
371 keymaster_cert_chain_t cert_chain = {}; local
377 &cert_chain);
380 resultCertChain = kmCertChain2Hidl(&cert_chain);
    [all...]
  /device/generic/goldfish/keymaster/trusty/
trusty_keymaster_device.cpp 357 keymaster_cert_chain_t* cert_chain) {
366 if (!cert_chain) {
370 cert_chain->entry_count = 0;
371 cert_chain->entries = nullptr;
391 // Allocate and clear storage for cert_chain.
393 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>(
394 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries)));
395 if (!cert_chain->entries) {
398 cert_chain->entry_count = rsp_chain.entry_count;
399 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count))
    [all...]
trusty_keymaster_device.h 65 keymaster_cert_chain_t* cert_chain);
120 keymaster_cert_chain_t* cert_chain);
  /system/core/trusty/keymaster/
trusty_keymaster_device.cpp 367 keymaster_cert_chain_t* cert_chain) {
376 if (!cert_chain) {
380 cert_chain->entry_count = 0;
381 cert_chain->entries = nullptr;
401 // Allocate and clear storage for cert_chain.
403 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>(
404 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries)));
405 if (!cert_chain->entries) {
408 cert_chain->entry_count = rsp_chain.entry_count;
409 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count))
    [all...]
trusty_keymaster_device.h 65 keymaster_cert_chain_t* cert_chain);
120 keymaster_cert_chain_t* cert_chain);
  /system/keymaster/include/keymaster/
keymaster_context.h 139 CertChainPtr* cert_chain) const = 0;
  /system/keymaster/include/keymaster/contexts/
keymaster2_passthrough_context.h 104 CertChainPtr* cert_chain) const override;
keymaster1_passthrough_context.h 111 CertChainPtr* cert_chain) const override;
pure_soft_keymaster_context.h 71 CertChainPtr* cert_chain) const override;
soft_keymaster_context.h 85 CertChainPtr* cert_chain) const override;
  /external/boringssl/src/ssl/
ssl_asn1.cc 669 CBS cert_chain; local
670 CBS_init(&cert_chain, NULL, 0);
672 if (!CBS_get_optional_asn1(&session, &cert_chain, &has_cert_chain,
674 (has_cert_chain && CBS_len(&cert_chain) == 0)) {
698 while (CBS_len(&cert_chain) > 0) {
700 if (!CBS_get_any_asn1_element(&cert_chain, &cert, NULL, NULL) ||
  /system/keymaster/ng/
AndroidKeymaster3Device.cpp 155 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) {
157 if (!cert_chain.entry_count || !cert_chain.entries) return result;
159 result.resize(cert_chain.entry_count);
160 for (size_t i = 0; i < cert_chain.entry_count; ++i) {
161 result[i] = kmBlob2hidlVec(cert_chain.entries[i]);
  /hardware/libhardware/include/hardware/
keymaster2.h 235 * \param[out] cert_chain An array of DER-encoded X.509 certificates. The first will be the
242 keymaster_cert_chain_t* cert_chain);
  /hardware/interfaces/keymaster/4.0/vts/functional/
KeymasterHidlTest.h 161 hidl_vec<hidl_vec<uint8_t>>* cert_chain);
163 hidl_vec<hidl_vec<uint8_t>>* cert_chain);

Completed in 455 milliseconds

1 2