Home
last modified time | relevance | path

Searched refs:verified_boot_key (Results 1 – 6 of 6) sorted by relevance

/system/keymaster/tests/
Dattestation_record_test.cpp54 params.verified_boot_key = {vboot_key_, sizeof(vboot_key_)}; in GetVerifiedBootParams()
61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() argument
63 EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length); in VerifyRootOfTrust()
64 if (sizeof(vboot_key_) == verified_boot_key.data_length) { in VerifyRootOfTrust()
65 EXPECT_EQ(0, memcmp(verified_boot_key.data, vboot_key_, sizeof(vboot_key_))); in VerifyRootOfTrust()
157 keymaster_blob_t verified_boot_key; in TEST() local
160 EXPECT_EQ(KM_ERROR_OK, parse_root_of_trust(asn1.get(), asn1_len, &verified_boot_key, in TEST()
162 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
163 delete[] verified_boot_key.data; in TEST()
203 keymaster_blob_t verified_boot_key = {}; in TEST() local
[all …]
/system/keymaster/contexts/
Dsoft_attestation_context.cpp31 params.verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
Dpure_soft_keymaster_context.cpp552 params.verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
/system/keymaster/include/keymaster/
Dattestation_context.h69 keymaster_blob_t verified_boot_key; member
/system/keymaster/km_openssl/
Dattestation_record.cpp845 if (vb_params->verified_boot_key.data_length) { in build_eat_record()
846 eat_record.add(EatClaim::VERIFIED_BOOT_KEY, blob_to_bstr(vb_params->verified_boot_key)); in build_eat_record()
988 if (vb_params->verified_boot_key.data_length && in build_attestation_record()
989 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, vb_params->verified_boot_key.data, in build_attestation_record()
990 vb_params->verified_boot_key.data_length)) { in build_attestation_record()
1289 if (!rot->verified_boot_key) return KM_ERROR_INVALID_KEY_BLOB; in extract_auth_list()
1433 keymaster_blob_t* verified_boot_key, in parse_root_of_trust() argument
1448 if (!record->tee_enforced->root_of_trust->verified_boot_key) { in parse_root_of_trust()
1452 verified_boot_key->data = dup_buffer(root_of_trust->verified_boot_key->data, in parse_root_of_trust()
1453 root_of_trust->verified_boot_key->length); in parse_root_of_trust()
[all …]
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h59 ASN1_OCTET_STRING* verified_boot_key; member
66 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
364 keymaster_blob_t* verified_boot_key,
378 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,