Searched refs:verified_boot_key (Results 1 – 6 of 6) sorted by relevance
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 54 params.verified_boot_key = {vboot_key_, sizeof(vboot_key_)}; in GetVerifiedBootParams() 61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() argument 63 EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length); in VerifyRootOfTrust() 64 if (sizeof(vboot_key_) == verified_boot_key.data_length) { in VerifyRootOfTrust() 65 EXPECT_EQ(0, memcmp(verified_boot_key.data, vboot_key_, sizeof(vboot_key_))); in VerifyRootOfTrust() 157 keymaster_blob_t verified_boot_key; in TEST() local 160 EXPECT_EQ(KM_ERROR_OK, parse_root_of_trust(asn1.get(), asn1_len, &verified_boot_key, in TEST() 162 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 163 delete[] verified_boot_key.data; in TEST() 203 keymaster_blob_t verified_boot_key = {}; in TEST() local [all …]
|
/system/keymaster/contexts/ |
D | soft_attestation_context.cpp | 31 params.verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
|
D | pure_soft_keymaster_context.cpp | 552 params.verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
|
/system/keymaster/include/keymaster/ |
D | attestation_context.h | 69 keymaster_blob_t verified_boot_key; member
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 845 if (vb_params->verified_boot_key.data_length) { in build_eat_record() 846 eat_record.add(EatClaim::VERIFIED_BOOT_KEY, blob_to_bstr(vb_params->verified_boot_key)); in build_eat_record() 988 if (vb_params->verified_boot_key.data_length && in build_attestation_record() 989 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, vb_params->verified_boot_key.data, in build_attestation_record() 990 vb_params->verified_boot_key.data_length)) { in build_attestation_record() 1289 if (!rot->verified_boot_key) return KM_ERROR_INVALID_KEY_BLOB; in extract_auth_list() 1433 keymaster_blob_t* verified_boot_key, in parse_root_of_trust() argument 1448 if (!record->tee_enforced->root_of_trust->verified_boot_key) { in parse_root_of_trust() 1452 verified_boot_key->data = dup_buffer(root_of_trust->verified_boot_key->data, in parse_root_of_trust() 1453 root_of_trust->verified_boot_key->length); in parse_root_of_trust() [all …]
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 59 ASN1_OCTET_STRING* verified_boot_key; member 66 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 364 keymaster_blob_t* verified_boot_key, 378 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
|