/device/google/cuttlefish/host/commands/secure_env/doc/ |
D | linkage.dot | 5 secure_env [label = < <B>secure_env</B> >, penwidth=2] 44 run_cvd -> secure_env 49 { rank = same; secure_env -> confirmationui_sign -> webRTC [color = "red", dir = "both"] } 51 secure_env -> host_gatekeeper_out -> vmm [color = "green", dir = "back"] 52 secure_env -> host_gatekeeper_in -> vmm [color = "green"] 55 secure_env -> host_keymaster_out -> vmm [color = "blue", dir = "back"] 56 secure_env -> host_keymaster_in -> vmm [color = "blue"] 60 secure_env -> host_keymint_out -> vmm [color = "blue", dir = "back"] 61 secure_env -> host_keymint_in -> vmm [color = "blue"]
|
/device/google/cuttlefish/host/commands/secure_env/ |
D | tpm_gatekeeper.cpp | 39 secure_env::Storage& secure_storage, in TpmGatekeeper() 40 secure_env::Storage& insecure_storage) in TpmGatekeeper() 140 static Result<secure_env::ManagedStorageData> RecordToStorageData( in RecordToStorageData() 142 return CF_EXPECT(secure_env::CreateStorageData(&record, sizeof(record))); in RecordToStorageData() 146 const secure_env::StorageData& data) { in StorageDataToRecord() 154 secure_env::Storage& storage, in GetFailureRecordImpl() 182 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in GetFailureRecord() 192 secure_env::Storage& storage, in WriteFailureRecordImpl() 203 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in ClearFailureRecord() 215 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in WriteFailureRecord()
|
D | secure_env_not_windows_main.cpp | 182 [](TpmResourceManager& resource_manager) -> secure_env::Storage* { in ChooseOemlockComponent() 184 return new secure_env::InsecureJsonStorage("oemlock_insecure"); in ChooseOemlockComponent() 186 return new secure_env::TpmStorage(resource_manager, in ChooseOemlockComponent() 194 .registerProvider([](secure_env::Storage& storage) -> oemlock::OemLock* { in ChooseOemlockComponent() 235 return new secure_env::TpmStorage(resource_manager, in SecureEnvComponent() 239 return new secure_env::InsecureJsonStorage("gatekeeper_insecure"); in SecureEnvComponent() 242 secure_env::TpmStorage& secure_storage, in SecureEnvComponent() 243 secure_env::InsecureJsonStorage& insecure_storage) { in SecureEnvComponent()
|
D | tpm_gatekeeper.h | 35 secure_env::Storage& secure_storage, 36 secure_env::Storage& insecure_storage); 84 secure_env::Storage& secure_storage_; 85 secure_env::Storage& insecure_storage_;
|
D | README.md | 5 Gatekeeper and Keymint communicate with `secure_env` through virtio-console 8 operations only to `secure_env`. 14 …d/platform/superproject/+/master:device/google/cuttlefish/host/commands/secure_env/doc/linkage.svg)
|
D | secure_env_windows_lib.h | 28 namespace secure_env {
|
D | secure_env_windows_main.cpp | 45 if (!secure_env::StartSecureEnv(keymaster_pipe.c_str(), in main()
|
D | secure_env_windows_lib.cpp | 35 namespace secure_env { namespace
|
D | Android.bp | 153 name: "secure_env",
|
/device/google/cuttlefish/guest/hals/oemlock/remote/ |
D | remote_oemlock.cpp | 53 return resultToStatus(setValue(secure_env::OemLockField::ALLOWED_BY_CARRIER, in_allowed)); in setOemUnlockAllowedByCarrier() 57 return resultToStatus(requestValue(secure_env::OemLockField::ALLOWED_BY_CARRIER, out_allowed)); in isOemUnlockAllowedByCarrier() 61 return resultToStatus(setValue(secure_env::OemLockField::ALLOWED_BY_DEVICE, in_allowed)); in setOemUnlockAllowedByDevice() 65 return resultToStatus(requestValue(secure_env::OemLockField::ALLOWED_BY_DEVICE, out_allowed)); in isOemUnlockAllowedByDevice() 68 Result<void> OemLock::requestValue(secure_env::OemLockField field, bool *out) { in requestValue() 81 Result<void> OemLock::setValue(secure_env::OemLockField field, bool value) { in setValue()
|
D | remote_oemlock.h | 48 Result<void> requestValue(secure_env::OemLockField field, bool *out); 49 Result<void> setValue(secure_env::OemLockField field, bool value);
|
/device/google/cuttlefish/host/commands/secure_env/oemlock/ |
D | oemlock.cpp | 35 Result<void> InitializeDefaultState(secure_env::Storage& storage) { in InitializeDefaultState() 40 secure_env::CreateStorageData(&kDefaultState, sizeof(kDefaultState))); in InitializeDefaultState() 45 Result<bool> ReadFlag(secure_env::Storage& storage, int bit) { in ReadFlag() 51 Result<void> WriteFlag(secure_env::Storage& storage, int bit, bool value) { in WriteFlag() 56 CF_EXPECT(secure_env::CreateStorageData(&state, sizeof(state))); in WriteFlag() 63 OemLock::OemLock(secure_env::Storage& storage) : storage_(storage) { in OemLock()
|
D | oemlock_responder.cpp | 37 switch (secure_env::OemLockField(request->command)) { in ProcessMessage() 38 case secure_env::OemLockField::ALLOWED_BY_CARRIER: { in ProcessMessage() 48 case secure_env::OemLockField::ALLOWED_BY_DEVICE: { in ProcessMessage() 58 case secure_env::OemLockField::ALLOWED: { in ProcessMessage() 65 case secure_env::OemLockField::LOCKED: { in ProcessMessage()
|
D | oemlock.h | 35 OemLock(secure_env::Storage& storage); 47 secure_env::Storage& storage_;
|
/device/google/cuttlefish/host/commands/secure_env/storage/ |
D | insecure_json_storage.h | 21 namespace secure_env { 23 class InsecureJsonStorage : public secure_env::Storage {
|
D | tpm_storage.h | 33 namespace secure_env { 48 class TpmStorage : public secure_env::Storage {
|
D | storage.cpp | 22 namespace secure_env { namespace
|
D | storage.h | 24 namespace secure_env {
|
D | insecure_json_storage.cpp | 28 namespace secure_env { namespace
|
D | tpm_storage.cpp | 25 namespace secure_env { namespace
|
/device/google/cuttlefish/host/commands/run_cvd/ |
D | Android.bp | 43 "launch/secure_env.cpp", 86 "secure_env",
|
/device/google/cuttlefish/host/frontend/webrtc/doc/ |
D | interface.dot | 15 secure_env 49 webrtc -> confirmationui_sign -> secure_env [dir = both]
|
/device/google/cuttlefish/host/commands/run_cvd/doc/ |
D | linkage.dot | 20 secure_env 112 run_cvd -> secure_env
|
/device/google/cuttlefish/common/libs/security/ |
D | oemlock.h | 22 namespace secure_env {
|
/device/google/cuttlefish/build/ |
D | Android.bp | 172 "secure_env",
|