/trusty/vendor/google/aosp/ |
D | lk_inc_aosp.mk | 22 trusty/device/arm/generic-arm64 \ 23 trusty/device/arm/vexpress-a15 \ 24 trusty/device/nxp/imx7d \ 25 trusty/device/x86/generic-x86_64 \
|
/trusty/device/arm/generic-arm64/project/qemu/ |
D | run-qemu-helper | 58 -device virtio-blk-device,drive=hdc 60 -device virtio-blk-device,drive=hdb 62 -device virtio-blk-device,drive=hda
|
/trusty/user/base/app/device_tree/tests/dtb/ |
D | test.dts | 17 /* A device tree overlay with a node for device tree tests */ 26 * when the overlay is applied to a base device tree
|
/trusty/user/app/keymint/ |
D | secure_storage_manager.rs | 27 use kmr_ta::device::{ 227 device: &[u8], in provision_attestation_id_file() 242 if !device.is_empty() { in provision_attestation_id_file() 243 attestation_ids.set_device(try_to_vec(device)?); in provision_attestation_id_file() 337 let device = attestation_ids_pb.take_device(); in read_attestation_ids() localVariable 356 Ok(AttestationIdInfo { brand, device, product, serial, imei, imei2, meid, manufacturer, model }) in read_attestation_ids() 481 use kmr_ta::device::{SigningAlgorithm, SigningKey, SigningKeyType}; 527 expect_eq!(lhs.device, rhs.device, "device doesn't match"); in compare_attestation_ids() 842 expect_eq!(attestation_ids.device.len(), 0, "device should be empty"); in unprovisioned_attestation_ids_do_not_error() 879 expect_eq!(attestation_ids_info.device.len(), 0, "shouldn't have a device"); in single_attestation_id_field() [all …]
|
D | main.rs | 93 let dev = kmr_ta::device::Implementation { in main() 98 bootloader: Box::new(kmr_ta::device::BootloaderDone), in main() 103 tup: Box::new(kmr_ta::device::TrustedPresenceUnsupported), in main()
|
D | lib.rs | 46 impl kmr_ta::device::BootloaderStatus for TrustyBootLoaderStatus {}
|
D | keymaster_attributes.rs | 251 device: ::protobuf::SingularField<::std::vec::Vec<u8>>, field 315 match self.device.as_ref() { in get_device() 321 self.device.clear(); in clear_device() 325 self.device.is_some() in has_device() 330 self.device = ::protobuf::SingularField::some(v); in set_device() 336 if self.device.is_none() { in mut_device() 337 self.device.set_default(); in mut_device() 339 self.device.as_mut().unwrap() in mut_device() 344 self.device.take().unwrap_or_else(|| ::std::vec::Vec::new()) in take_device() 613 ::protobuf::rt::read_singular_bytes_into(wire_type, is, &mut self.device)?; in merge_from() [all …]
|
D | ipc_manager.rs | 35 use kmr_ta::{self, device::SigningAlgorithm, split_rsp, HardwareInfo, KeyMintTa, RpcInfo}; 363 &req.device, in handle_message() 377 &req.base.device, in handle_message() 475 &req.device, in handle_message() 565 dev: kmr_ta::device::Implementation, in handle_port_connections() 728 device: &Vec<u8>, in get_set_attestation_ids_message() 738 device.serialize_into(&mut req)?; in get_set_attestation_ids_message() 782 let device = b"a new device".to_vec(); in set_attestation_ids_secure() localVariable 791 &device, in set_attestation_ids_secure() 821 let device = b"a new device".to_vec(); in set_attestation_ids() localVariable [all …]
|
D | rpc.rs | 22 use kmr_ta::device::{
|
D | key_wrapper.rs | 26 use kmr_ta::device::StorageKeyWrapper;
|
D | keys.rs | 228 impl kmr_ta::device::RetrieveKeyMaterial for TrustyKeys { 301 use kmr_ta::device::RetrieveKeyMaterial;
|
/trusty/user/app/keymaster/ipc/ |
D | keymaster_ipc.cpp | 76 TrustyKeymaster* device; variable 200 Request req(device->message_version()); in do_dispatch() 206 Response rsp(device->message_version()); in do_dispatch() 207 (device->*operation)(req, &rsp); in do_dispatch() 211 device->set_configure_error(rsp.error); in do_dispatch() 235 Request req(device->message_version()); in do_dispatch() 241 Response rsp = ((device->*operation)(req)); in do_dispatch() 245 device->set_configure_error(rsp.error); in do_dispatch() 268 Response rsp = ((device->*operation)()); in do_dispatch() 272 device->set_configure_error(rsp.error); in do_dispatch() [all …]
|
/trusty/user/base/app/device_tree/tests/dtb/base/ |
D | base.dts | 18 * An empty base device tree which the test device tree overlay will be applied
|
/trusty/user/app/gatekeeper/ipc/ |
D | gatekeeper_ipc.cpp | 28 TrustyGateKeeper* device; variable 32 SessionManager(long* err) { *err = device->OpenSession(); } in SessionManager() 33 ~SessionManager() { device->CloseSession(); } in ~SessionManager() 70 (device->*operation)(req, &rsp); in exec_cmd() 292 device = new TrustyGateKeeper(); in main()
|
/trusty/user/app/keymaster/ |
D | keymaster_attributes.pb.c | 34 device, 44 device,
|
D | keymaster_attributes.pb.h | 37 AttestationIds_device_t device; member
|
D | secure_storage_manager.cpp | 483 if (request.device.buffer_size() > kAttestationIdLengthMax) { in ValidateAndSetBaseAttestationIds() 484 LOG_E("Error: Device ID too large: %zu", request.device.buffer_size()); in ValidateAndSetBaseAttestationIds() 486 } else if (request.device.buffer_size() > 0) { in ValidateAndSetBaseAttestationIds() 488 attestation_ids->device.size = request.device.buffer_size(); in ValidateAndSetBaseAttestationIds() 489 memcpy(attestation_ids->device.bytes, request.device.begin(), in ValidateAndSetBaseAttestationIds() 490 request.device.buffer_size()); in ValidateAndSetBaseAttestationIds()
|
D | keymaster_attributes.proto | 49 optional bytes device = 2 [(nanopb).max_size=64]; field
|
/trusty/user/app/avb/ |
D | README.md | 23 booting MUST fail. If the lock state is 0, or UNLOCKED, the device may boot 24 even when verification fails. When the device changes lock state, all stored
|
/trusty/vendor/google/aosp/scripts/ |
D | build-config | 90 "trusty/device/arm/generic-arm64/project/keys/apploader_sign_test_private_key_0.der", 91 "trusty/device/arm/generic-arm64/project/keys/apploader_sign_test_public_key_0.der"
|
/trusty/user/app/keymint/secure_storage_manager/ |
D | software.rs | 9 use kmr_ta::device::{RetrieveCertSigningInfo, SigningAlgorithm, SigningKeyType};
|
/trusty/kernel/lib/dtb_embedded/ |
D | dtb.ld | 29 ASSERT(SIZEOF(.dtb) > 0, "No embedded device tree blob was found");
|
/trusty/device/arm/generic-arm64/project/ |
D | qemu-inc.mk | 90 HAFNIUM_MANIFESTS := trusty/device/arm/generic-arm64/project/hafnium 175 @echo Initialize rpmb device
|
/trusty/user/app/storage/ |
D | README.md | 28 different ports, as it is device specific which ports share file systems. 57 The file system stores two super-blocks on a device that has tamper detection. 72 block is encrypted using this value and a device specific key.
|
/trusty/user/app/keymint/keys/ |
D | legacy.rs | 13 use kmr_ta::device; 35 pub keys: Box<dyn device::RetrieveKeyMaterial>,
|