Home
last modified time | relevance | path

Searched refs:secure_env (Results 1 – 25 of 25) sorted by relevance

/device/google/cuttlefish/host/commands/secure_env/doc/
Dlinkage.dot5 secure_env [label = < <B>secure_env</B> >, penwidth=2]
44 run_cvd -> secure_env
49 { rank = same; secure_env -> confirmationui_sign -> webRTC [color = "red", dir = "both"] }
51 secure_env -> host_gatekeeper_out -> vmm [color = "green", dir = "back"]
52 secure_env -> host_gatekeeper_in -> vmm [color = "green"]
55 secure_env -> host_keymaster_out -> vmm [color = "blue", dir = "back"]
56 secure_env -> host_keymaster_in -> vmm [color = "blue"]
60 secure_env -> host_keymint_out -> vmm [color = "blue", dir = "back"]
61 secure_env -> host_keymint_in -> vmm [color = "blue"]
/device/google/cuttlefish/host/commands/secure_env/
Dtpm_gatekeeper.cpp39 secure_env::Storage& secure_storage, in TpmGatekeeper()
40 secure_env::Storage& insecure_storage) in TpmGatekeeper()
140 static Result<secure_env::ManagedStorageData> RecordToStorageData( in RecordToStorageData()
142 return CF_EXPECT(secure_env::CreateStorageData(&record, sizeof(record))); in RecordToStorageData()
146 const secure_env::StorageData& data) { in StorageDataToRecord()
154 secure_env::Storage& storage, in GetFailureRecordImpl()
182 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in GetFailureRecord()
192 secure_env::Storage& storage, in WriteFailureRecordImpl()
203 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in ClearFailureRecord()
215 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in WriteFailureRecord()
Dsecure_env_not_windows_main.cpp182 [](TpmResourceManager& resource_manager) -> secure_env::Storage* { in ChooseOemlockComponent()
184 return new secure_env::InsecureJsonStorage("oemlock_insecure"); in ChooseOemlockComponent()
186 return new secure_env::TpmStorage(resource_manager, in ChooseOemlockComponent()
194 .registerProvider([](secure_env::Storage& storage) -> oemlock::OemLock* { in ChooseOemlockComponent()
235 return new secure_env::TpmStorage(resource_manager, in SecureEnvComponent()
239 return new secure_env::InsecureJsonStorage("gatekeeper_insecure"); in SecureEnvComponent()
242 secure_env::TpmStorage& secure_storage, in SecureEnvComponent()
243 secure_env::InsecureJsonStorage& insecure_storage) { in SecureEnvComponent()
Dtpm_gatekeeper.h35 secure_env::Storage& secure_storage,
36 secure_env::Storage& insecure_storage);
84 secure_env::Storage& secure_storage_;
85 secure_env::Storage& insecure_storage_;
DREADME.md5 Gatekeeper and Keymint communicate with `secure_env` through virtio-console
8 operations only to `secure_env`.
14 …d/platform/superproject/+/master:device/google/cuttlefish/host/commands/secure_env/doc/linkage.svg)
Dsecure_env_windows_lib.h28 namespace secure_env {
Dsecure_env_windows_main.cpp45 if (!secure_env::StartSecureEnv(keymaster_pipe.c_str(), in main()
Dsecure_env_windows_lib.cpp35 namespace secure_env { namespace
DAndroid.bp153 name: "secure_env",
/device/google/cuttlefish/guest/hals/oemlock/remote/
Dremote_oemlock.cpp53 return resultToStatus(setValue(secure_env::OemLockField::ALLOWED_BY_CARRIER, in_allowed)); in setOemUnlockAllowedByCarrier()
57 return resultToStatus(requestValue(secure_env::OemLockField::ALLOWED_BY_CARRIER, out_allowed)); in isOemUnlockAllowedByCarrier()
61 return resultToStatus(setValue(secure_env::OemLockField::ALLOWED_BY_DEVICE, in_allowed)); in setOemUnlockAllowedByDevice()
65 return resultToStatus(requestValue(secure_env::OemLockField::ALLOWED_BY_DEVICE, out_allowed)); in isOemUnlockAllowedByDevice()
68 Result<void> OemLock::requestValue(secure_env::OemLockField field, bool *out) { in requestValue()
81 Result<void> OemLock::setValue(secure_env::OemLockField field, bool value) { in setValue()
Dremote_oemlock.h48 Result<void> requestValue(secure_env::OemLockField field, bool *out);
49 Result<void> setValue(secure_env::OemLockField field, bool value);
/device/google/cuttlefish/host/commands/secure_env/oemlock/
Doemlock.cpp35 Result<void> InitializeDefaultState(secure_env::Storage& storage) { in InitializeDefaultState()
40 secure_env::CreateStorageData(&kDefaultState, sizeof(kDefaultState))); in InitializeDefaultState()
45 Result<bool> ReadFlag(secure_env::Storage& storage, int bit) { in ReadFlag()
51 Result<void> WriteFlag(secure_env::Storage& storage, int bit, bool value) { in WriteFlag()
56 CF_EXPECT(secure_env::CreateStorageData(&state, sizeof(state))); in WriteFlag()
63 OemLock::OemLock(secure_env::Storage& storage) : storage_(storage) { in OemLock()
Doemlock_responder.cpp37 switch (secure_env::OemLockField(request->command)) { in ProcessMessage()
38 case secure_env::OemLockField::ALLOWED_BY_CARRIER: { in ProcessMessage()
48 case secure_env::OemLockField::ALLOWED_BY_DEVICE: { in ProcessMessage()
58 case secure_env::OemLockField::ALLOWED: { in ProcessMessage()
65 case secure_env::OemLockField::LOCKED: { in ProcessMessage()
Doemlock.h35 OemLock(secure_env::Storage& storage);
47 secure_env::Storage& storage_;
/device/google/cuttlefish/host/commands/secure_env/storage/
Dinsecure_json_storage.h21 namespace secure_env {
23 class InsecureJsonStorage : public secure_env::Storage {
Dtpm_storage.h33 namespace secure_env {
48 class TpmStorage : public secure_env::Storage {
Dstorage.cpp22 namespace secure_env { namespace
Dstorage.h24 namespace secure_env {
Dinsecure_json_storage.cpp28 namespace secure_env { namespace
Dtpm_storage.cpp25 namespace secure_env { namespace
/device/google/cuttlefish/host/commands/run_cvd/
DAndroid.bp43 "launch/secure_env.cpp",
86 "secure_env",
/device/google/cuttlefish/host/frontend/webrtc/doc/
Dinterface.dot15 secure_env
49 webrtc -> confirmationui_sign -> secure_env [dir = both]
/device/google/cuttlefish/host/commands/run_cvd/doc/
Dlinkage.dot20 secure_env
112 run_cvd -> secure_env
/device/google/cuttlefish/common/libs/security/
Doemlock.h22 namespace secure_env {
/device/google/cuttlefish/build/
DAndroid.bp172 "secure_env",