Lines Matching refs:cert_params
111 CertificateCallerParams* cert_params, in get_certificate_params() argument
113 if (!cert_params) return KM_ERROR_UNEXPECTED_NULL_POINTER; in get_certificate_params()
129 cert_params->serial = std::move(serial); in get_certificate_params()
131 cert_params->active_date_time = 0; in get_certificate_params()
132 cert_params->expire_date_time = kUndefinedExpirationDateTime; in get_certificate_params()
138 cert_params->active_date_time = static_cast<int64_t>(tmp); in get_certificate_params()
142 cert_params->expire_date_time = static_cast<int64_t>(tmp); in get_certificate_params()
149 cert_params->active_date_time = static_cast<int64_t>(tmp); in get_certificate_params()
155 cert_params->expire_date_time = static_cast<int64_t>(tmp); in get_certificate_params()
159 cert_params->active_date_time, cert_params->expire_date_time); in get_certificate_params()
163 return make_name_from_der(subject, &cert_params->subject_name); in get_certificate_params()
166 return make_name_from_str(kDefaultSubject, &cert_params->subject_name); in get_certificate_params()
243 const CertificateCallerParams& cert_params, X509_Ptr* cert_out) { in make_cert_rump() argument
256 !BN_to_ASN1_INTEGER(cert_params.serial.get(), serial_number.get()) || in make_cert_rump()
263 const_cast<X509_NAME*>(cert_params.subject_name.get()))) { in make_cert_rump()
273 LOG_D("Setting notBefore to %" PRId64, cert_params.active_date_time / 1000); in make_cert_rump()
274 int64_t notBeforeTime = cert_params.active_date_time / 1000; in make_cert_rump()
282 LOG_D("Setting notAfter to %" PRId64, cert_params.expire_date_time / 1000); in make_cert_rump()
283 int64_t notAfterTime = cert_params.expire_date_time / 1000; in make_cert_rump()
295 const CertificateCallerParams& cert_params, X509_Ptr* cert_out) { in make_cert() argument
299 if (keymaster_error_t error = make_cert_rump(issuer, cert_params, &certificate)) { in make_cert()
311 make_key_usage_extension(cert_params.is_signing_key, cert_params.is_encryption_key, in make_cert()
312 cert_params.is_agreement_key, &key_usage_extension)) { in make_cert()
351 CertificateCallerParams cert_params{}; in generate_self_signed_cert() local
356 *error = get_certificate_params(params, &cert_params, KmVersion::KEYMINT_1); in generate_self_signed_cert()
359 cert_params.is_signing_key = in generate_self_signed_cert()
362 cert_params.is_encryption_key = key.authorizations().Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT); in generate_self_signed_cert()
363 cert_params.is_agreement_key = key.authorizations().Contains(TAG_PURPOSE, KM_PURPOSE_AGREE_KEY); in generate_self_signed_cert()
366 *error = make_cert(pkey.get(), cert_params.subject_name.get() /* issuer */, cert_params, &cert); in generate_self_signed_cert()