/system/iot/attestation/atap/libatap/ |
atap_util.c | 61 const AtapCertChain* cert_chain) { 63 cert_chain_serialized_size(cert_chain) - sizeof(uint32_t); 70 for (i = 0; i < cert_chain->entry_count; ++i) { 71 local_buf = append_blob_to_buf(local_buf, &cert_chain->entries[i]); 128 bool copy_cert_chain_from_buf(uint8_t** buf_ptr, AtapCertChain* cert_chain) { 134 atap_memset(cert_chain, 0, sizeof(AtapCertChain)); 147 if (!copy_blob_from_buf(buf_ptr, &cert_chain->entries[i])) { 151 ++cert_chain->entry_count; 152 bytes_remaining -= (sizeof(uint32_t) + cert_chain->entries[i].data_length); 159 free_cert_chain(*cert_chain); [all...] |
atap_util.h | 153 const AtapCertChain* cert_chain); 166 bool copy_cert_chain_from_buf(uint8_t** buf_ptr, AtapCertChain* cert_chain); 172 uint32_t cert_chain_serialized_size(const AtapCertChain* cert_chain); 179 void free_cert_chain(AtapCertChain cert_chain);
|
atap_ops.h | 50 * returns ATAP_RESULT_OK and populates |cert_chain|. New memory will be 52 * ownership. Entries for |cert_chain| must be allocated using 53 * atap_malloc(), and cert_chain->entry_count must be valid. 56 AtapCertChain* cert_chain); 58 /* Writes the |key_type| attestation |key| and |cert_chain|. The data 66 const AtapCertChain* cert_chain);
|
atap_commands.c | 264 AtapCertChain cert_chain; local 268 atap_memset(&cert_chain, 0, sizeof(cert_chain)); 270 if (!copy_cert_chain_from_buf(buf_ptr, &cert_chain)) { 278 if (key.data_length == 0 && cert_chain.entry_count) { 279 ret = ops->write_attestation_key(ops, key_type, NULL, &cert_chain); 280 } else if (key.data_length && cert_chain.entry_count) { 281 ret = ops->write_attestation_key(ops, key_type, &key, &cert_chain); 282 } else if (key.data_length && cert_chain.entry_count == 0) { 294 free_cert_chain(cert_chain); [all...] |
/system/iot/attestation/atap/test/ |
fake_atap_ops.cpp | 45 AtapResult FakeAtapOps::read_auth_key_cert_chain(AtapCertChain* cert_chain) { 51 const AtapCertChain* cert_chain) {
|
fake_atap_ops.h | 45 AtapResult read_auth_key_cert_chain(AtapCertChain* cert_chain) override; 49 const AtapCertChain* cert_chain) override;
|
/system/keymaster/contexts/ |
keymaster2_passthrough_context.cpp | 128 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const { 129 if (!cert_chain) return KM_ERROR_UNEXPECTED_NULL_POINTER; 135 cert_chain->reset(new keymaster_cert_chain_t); 136 **cert_chain = { new keymaster_blob_t[cchain.entry_count], cchain.entry_count }; 138 (*cert_chain)->entries[i] = { dup_array(cchain.entries[i].data,
|
keymaster1_passthrough_context.cpp | 233 const AuthorizationSet& attest_params, CertChainPtr* cert_chain) const { 254 *attestation_chain, *attestation_key, *this, cert_chain);
|
soft_keymaster_device.cpp | [all...] |
/system/iot/attestation/atap/ops/ |
atap_ops_delegate.h | 45 virtual AtapResult read_auth_key_cert_chain(AtapCertChain* cert_chain) = 0; 49 const AtapCertChain* cert_chain) = 0;
|
atap_ops_provider.cpp | 45 AtapCertChain* cert_chain) { 48 ->read_auth_key_cert_chain(cert_chain); 54 const AtapCertChain* cert_chain) { 57 ->write_attestation_key(key_type, key, cert_chain);
|
/system/security/keystore/ |
legacy_keymaster_device_wrapper.cpp | 145 kmCertChain2Hidl(const keymaster_cert_chain_t* cert_chain) { 147 if (!cert_chain || cert_chain->entry_count == 0 || !cert_chain->entries) return result; 149 result.resize(cert_chain->entry_count); 150 for (size_t i = 0; i < cert_chain->entry_count; ++i) { 151 auto& entry = cert_chain->entries[i]; 371 keymaster_cert_chain_t cert_chain = {}; local 377 &cert_chain); 380 resultCertChain = kmCertChain2Hidl(&cert_chain); [all...] |
/device/generic/goldfish/keymaster/trusty/ |
trusty_keymaster_device.cpp | 357 keymaster_cert_chain_t* cert_chain) { 366 if (!cert_chain) { 370 cert_chain->entry_count = 0; 371 cert_chain->entries = nullptr; 391 // Allocate and clear storage for cert_chain. 393 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( 394 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); 395 if (!cert_chain->entries) { 398 cert_chain->entry_count = rsp_chain.entry_count; 399 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) [all...] |
trusty_keymaster_device.h | 65 keymaster_cert_chain_t* cert_chain); 120 keymaster_cert_chain_t* cert_chain);
|
/system/core/trusty/keymaster/ |
trusty_keymaster_device.cpp | 367 keymaster_cert_chain_t* cert_chain) { 376 if (!cert_chain) { 380 cert_chain->entry_count = 0; 381 cert_chain->entries = nullptr; 401 // Allocate and clear storage for cert_chain. 403 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( 404 malloc(rsp_chain.entry_count * sizeof(*cert_chain->entries))); 405 if (!cert_chain->entries) { 408 cert_chain->entry_count = rsp_chain.entry_count; 409 for (keymaster_blob_t& entry : array_range(cert_chain->entries, cert_chain->entry_count)) [all...] |
trusty_keymaster_device.h | 65 keymaster_cert_chain_t* cert_chain); 120 keymaster_cert_chain_t* cert_chain);
|
/system/keymaster/include/keymaster/ |
keymaster_context.h | 139 CertChainPtr* cert_chain) const = 0;
|
/system/keymaster/include/keymaster/contexts/ |
keymaster2_passthrough_context.h | 104 CertChainPtr* cert_chain) const override;
|
keymaster1_passthrough_context.h | 111 CertChainPtr* cert_chain) const override;
|
pure_soft_keymaster_context.h | 71 CertChainPtr* cert_chain) const override;
|
soft_keymaster_context.h | 85 CertChainPtr* cert_chain) const override;
|
/external/boringssl/src/ssl/ |
ssl_asn1.cc | 669 CBS cert_chain; local 670 CBS_init(&cert_chain, NULL, 0); 672 if (!CBS_get_optional_asn1(&session, &cert_chain, &has_cert_chain, 674 (has_cert_chain && CBS_len(&cert_chain) == 0)) { 698 while (CBS_len(&cert_chain) > 0) { 700 if (!CBS_get_any_asn1_element(&cert_chain, &cert, NULL, NULL) ||
|
/system/keymaster/ng/ |
AndroidKeymaster3Device.cpp | 155 kmCertChain2Hidl(const keymaster_cert_chain_t& cert_chain) { 157 if (!cert_chain.entry_count || !cert_chain.entries) return result; 159 result.resize(cert_chain.entry_count); 160 for (size_t i = 0; i < cert_chain.entry_count; ++i) { 161 result[i] = kmBlob2hidlVec(cert_chain.entries[i]);
|
/hardware/libhardware/include/hardware/ |
keymaster2.h | 235 * \param[out] cert_chain An array of DER-encoded X.509 certificates. The first will be the 242 keymaster_cert_chain_t* cert_chain);
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
KeymasterHidlTest.h | 161 hidl_vec<hidl_vec<uint8_t>>* cert_chain); 163 hidl_vec<hidl_vec<uint8_t>>* cert_chain);
|