/hardware/interfaces/security/keymint/support/include/keymint_support/ |
D | attestation_record.h | 58 vector<uint8_t> verified_boot_hash; member 87 std::vector<uint8_t>* verified_boot_hash);
|
/hardware/interfaces/security/keymint/aidl/default/hal/ |
D | lib.rs | 53 let verified_boot_hash = hex::decode(&vbmeta_digest).unwrap_or_else(|_e| { in get_boot_info() localVariable 96 verified_boot_hash, in get_boot_info()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 55 ASN1_OCTET_STRING* verified_boot_hash; member 62 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 350 hidl_vec<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 393 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust() 398 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust() 399 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
|
/hardware/interfaces/security/keymint/support/ |
D | attestation_record.cpp | 56 ASN1_OCTET_STRING* verified_boot_hash; member 63 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 372 bool* device_locked, vector<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 373 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 415 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust() 420 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust() 421 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 35 hidl_vec<uint8_t> verified_boot_hash; member
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | attestation_record.h | 65 hidl_vec<uint8_t>* verified_boot_hash);
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 63 ASN1_OCTET_STRING* verified_boot_hash; member 70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 419 auto& vb_hash = root_of_trust->verified_boot_hash; in MAKE_OPENSSL_PTR_TYPE() 424 rot.verified_boot_hash.resize(vb_hash->length); in MAKE_OPENSSL_PTR_TYPE() 425 memcpy(rot.verified_boot_hash.data(), vb_hash->data, vb_hash->length); in MAKE_OPENSSL_PTR_TYPE()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintAidlTestBase.cpp | 1788 const vector<uint8_t>& verified_boot_hash) { in verify_root_of_trust() argument 1795 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_root_of_trust() 1954 vector<uint8_t> verified_boot_hash; in verify_attestation_record() local 1956 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 1958 verify_root_of_trust(verified_boot_key, device_locked, verified_boot_state, verified_boot_hash); in verify_attestation_record()
|
D | KeyMintAidlTestBase.h | 413 const vector<uint8_t>& verified_boot_hash);
|
/hardware/interfaces/security/rkp/aidl/vts/functional/ |
D | VtsRemotelyProvisionedComponentTests.cpp | 893 bool* device_locked, vector<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 901 verified_boot_state, device_locked, verified_boot_hash); in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 117 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 500 HidlBuf verified_boot_hash; in verify_attestation_record() local 502 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 509 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_attestation_record()
|