Home
last modified time | relevance | path

Searched refs:root_of_trust (Results 1 – 8 of 8) sorted by relevance

/hardware/interfaces/keymaster/4.1/support/
Dattestation_record.cpp98 KM_ROOT_OF_TRUST* root_of_trust; member
147 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
393 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in MAKE_OPENSSL_PTR_TYPE() local
395 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE()
396 root_of_trust = record->tee_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE()
397 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE()
398 root_of_trust = record->software_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE()
404 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE()
409 RootOfTrust& rot = result.root_of_trust; in MAKE_OPENSSL_PTR_TYPE()
410 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE()
[all …]
/hardware/interfaces/keymaster/4.0/support/
Dattestation_record.cpp89 KM_ROOT_OF_TRUST* root_of_trust; member
136 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
362 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in parse_root_of_trust() local
363 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in parse_root_of_trust()
364 root_of_trust = record->tee_enforced->root_of_trust; in parse_root_of_trust()
365 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in parse_root_of_trust()
366 root_of_trust = record->software_enforced->root_of_trust; in parse_root_of_trust()
371 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust()
376 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust()
381 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust()
[all …]
/hardware/interfaces/security/keymint/support/
Dattestation_record.cpp92 KM_ROOT_OF_TRUST* root_of_trust; member
145 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
380 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in parse_root_of_trust() local
381 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in parse_root_of_trust()
382 root_of_trust = record->tee_enforced->root_of_trust; in parse_root_of_trust()
383 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in parse_root_of_trust()
384 root_of_trust = record->software_enforced->root_of_trust; in parse_root_of_trust()
389 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust()
394 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust()
399 static_cast<VerifiedBoot>(ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust()
[all …]
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
Dattestation_record.h41 RootOfTrust root_of_trust; member
/hardware/interfaces/security/keymint/support/include/keymint_support/
Dattestation_record.h62 RootOfTrust root_of_trust; member
/hardware/interfaces/keymaster/4.1/vts/functional/
DDeviceUniqueAttestationTest.cpp111 void check_root_of_trust(const RootOfTrust& root_of_trust) { in check_root_of_trust() argument
117 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust()
123 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust()
124 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust()
170 check_root_of_trust(attestation.root_of_trust); in check_attestation_record()
/hardware/interfaces/keymaster/3.0/vts/functional/
Dattestation_record.cpp81 KM_ROOT_OF_TRUST* root_of_trust; member
111 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
/hardware/interfaces/identity/aidl/vts/
DUtil.cpp395 EXPECT_GE(attRec.root_of_trust.security_level, in validateAttestationCertificate()