Searched refs:root_of_trust (Results 1 – 8 of 8) sorted by relevance
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 98 KM_ROOT_OF_TRUST* root_of_trust; member 147 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()), 393 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in MAKE_OPENSSL_PTR_TYPE() local 395 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE() 396 root_of_trust = record->tee_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE() 397 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE() 398 root_of_trust = record->software_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE() 404 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE() 409 RootOfTrust& rot = result.root_of_trust; in MAKE_OPENSSL_PTR_TYPE() 410 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE() [all …]
|
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 89 KM_ROOT_OF_TRUST* root_of_trust; member 136 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()), 362 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in parse_root_of_trust() local 363 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in parse_root_of_trust() 364 root_of_trust = record->tee_enforced->root_of_trust; in parse_root_of_trust() 365 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in parse_root_of_trust() 366 root_of_trust = record->software_enforced->root_of_trust; in parse_root_of_trust() 371 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 376 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 381 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust() [all …]
|
/hardware/interfaces/security/keymint/support/ |
D | attestation_record.cpp | 92 KM_ROOT_OF_TRUST* root_of_trust; member 145 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()), 380 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in parse_root_of_trust() local 381 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in parse_root_of_trust() 382 root_of_trust = record->tee_enforced->root_of_trust; in parse_root_of_trust() 383 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in parse_root_of_trust() 384 root_of_trust = record->software_enforced->root_of_trust; in parse_root_of_trust() 389 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 394 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 399 static_cast<VerifiedBoot>(ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust() [all …]
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 41 RootOfTrust root_of_trust; member
|
/hardware/interfaces/security/keymint/support/include/keymint_support/ |
D | attestation_record.h | 62 RootOfTrust root_of_trust; member
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 111 void check_root_of_trust(const RootOfTrust& root_of_trust) { in check_root_of_trust() argument 117 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust() 123 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust() 124 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust() 170 check_root_of_trust(attestation.root_of_trust); in check_attestation_record()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 81 KM_ROOT_OF_TRUST* root_of_trust; member 111 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
|
/hardware/interfaces/identity/aidl/vts/ |
D | Util.cpp | 395 EXPECT_GE(attRec.root_of_trust.security_level, in validateAttestationCertificate()
|