Home
last modified time | relevance | path

Searched refs:device (Results 1 – 25 of 28) sorted by relevance

12

/trusty/vendor/google/aosp/
Dlk_inc_aosp.mk22 trusty/device/arm/generic-arm64 \
23 trusty/device/arm/vexpress-a15 \
24 trusty/device/nxp/imx7d \
25 trusty/device/x86/generic-x86_64 \
/trusty/device/arm/generic-arm64/project/qemu/
Drun-qemu-helper58 -device virtio-blk-device,drive=hdc
60 -device virtio-blk-device,drive=hdb
62 -device virtio-blk-device,drive=hda
/trusty/user/base/app/device_tree/tests/dtb/
Dtest.dts17 /* A device tree overlay with a node for device tree tests */
26 * when the overlay is applied to a base device tree
/trusty/user/app/keymint/
Dsecure_storage_manager.rs27 use kmr_ta::device::{
227 device: &[u8], in provision_attestation_id_file()
242 if !device.is_empty() { in provision_attestation_id_file()
243 attestation_ids.set_device(try_to_vec(device)?); in provision_attestation_id_file()
337 let device = attestation_ids_pb.take_device(); in read_attestation_ids() localVariable
356 Ok(AttestationIdInfo { brand, device, product, serial, imei, imei2, meid, manufacturer, model }) in read_attestation_ids()
481 use kmr_ta::device::{SigningAlgorithm, SigningKey, SigningKeyType};
527 expect_eq!(lhs.device, rhs.device, "device doesn't match"); in compare_attestation_ids()
842 expect_eq!(attestation_ids.device.len(), 0, "device should be empty"); in unprovisioned_attestation_ids_do_not_error()
879 expect_eq!(attestation_ids_info.device.len(), 0, "shouldn't have a device"); in single_attestation_id_field()
[all …]
Dmain.rs93 let dev = kmr_ta::device::Implementation { in main()
98 bootloader: Box::new(kmr_ta::device::BootloaderDone), in main()
103 tup: Box::new(kmr_ta::device::TrustedPresenceUnsupported), in main()
Dlib.rs46 impl kmr_ta::device::BootloaderStatus for TrustyBootLoaderStatus {}
Dkeymaster_attributes.rs251 device: ::protobuf::SingularField<::std::vec::Vec<u8>>, field
315 match self.device.as_ref() { in get_device()
321 self.device.clear(); in clear_device()
325 self.device.is_some() in has_device()
330 self.device = ::protobuf::SingularField::some(v); in set_device()
336 if self.device.is_none() { in mut_device()
337 self.device.set_default(); in mut_device()
339 self.device.as_mut().unwrap() in mut_device()
344 self.device.take().unwrap_or_else(|| ::std::vec::Vec::new()) in take_device()
613 ::protobuf::rt::read_singular_bytes_into(wire_type, is, &mut self.device)?; in merge_from()
[all …]
Dipc_manager.rs35 use kmr_ta::{self, device::SigningAlgorithm, split_rsp, HardwareInfo, KeyMintTa, RpcInfo};
363 &req.device, in handle_message()
377 &req.base.device, in handle_message()
475 &req.device, in handle_message()
565 dev: kmr_ta::device::Implementation, in handle_port_connections()
728 device: &Vec<u8>, in get_set_attestation_ids_message()
738 device.serialize_into(&mut req)?; in get_set_attestation_ids_message()
782 let device = b"a new device".to_vec(); in set_attestation_ids_secure() localVariable
791 &device, in set_attestation_ids_secure()
821 let device = b"a new device".to_vec(); in set_attestation_ids() localVariable
[all …]
Drpc.rs22 use kmr_ta::device::{
Dkey_wrapper.rs26 use kmr_ta::device::StorageKeyWrapper;
Dkeys.rs228 impl kmr_ta::device::RetrieveKeyMaterial for TrustyKeys {
301 use kmr_ta::device::RetrieveKeyMaterial;
/trusty/user/app/keymaster/ipc/
Dkeymaster_ipc.cpp76 TrustyKeymaster* device; variable
200 Request req(device->message_version()); in do_dispatch()
206 Response rsp(device->message_version()); in do_dispatch()
207 (device->*operation)(req, &rsp); in do_dispatch()
211 device->set_configure_error(rsp.error); in do_dispatch()
235 Request req(device->message_version()); in do_dispatch()
241 Response rsp = ((device->*operation)(req)); in do_dispatch()
245 device->set_configure_error(rsp.error); in do_dispatch()
268 Response rsp = ((device->*operation)()); in do_dispatch()
272 device->set_configure_error(rsp.error); in do_dispatch()
[all …]
/trusty/user/base/app/device_tree/tests/dtb/base/
Dbase.dts18 * An empty base device tree which the test device tree overlay will be applied
/trusty/user/app/gatekeeper/ipc/
Dgatekeeper_ipc.cpp28 TrustyGateKeeper* device; variable
32 SessionManager(long* err) { *err = device->OpenSession(); } in SessionManager()
33 ~SessionManager() { device->CloseSession(); } in ~SessionManager()
70 (device->*operation)(req, &rsp); in exec_cmd()
292 device = new TrustyGateKeeper(); in main()
/trusty/user/app/keymaster/
Dkeymaster_attributes.pb.c34 device,
44 device,
Dkeymaster_attributes.pb.h37 AttestationIds_device_t device; member
Dsecure_storage_manager.cpp483 if (request.device.buffer_size() > kAttestationIdLengthMax) { in ValidateAndSetBaseAttestationIds()
484 LOG_E("Error: Device ID too large: %zu", request.device.buffer_size()); in ValidateAndSetBaseAttestationIds()
486 } else if (request.device.buffer_size() > 0) { in ValidateAndSetBaseAttestationIds()
488 attestation_ids->device.size = request.device.buffer_size(); in ValidateAndSetBaseAttestationIds()
489 memcpy(attestation_ids->device.bytes, request.device.begin(), in ValidateAndSetBaseAttestationIds()
490 request.device.buffer_size()); in ValidateAndSetBaseAttestationIds()
Dkeymaster_attributes.proto49 optional bytes device = 2 [(nanopb).max_size=64]; field
/trusty/user/app/avb/
DREADME.md23 booting MUST fail. If the lock state is 0, or UNLOCKED, the device may boot
24 even when verification fails. When the device changes lock state, all stored
/trusty/vendor/google/aosp/scripts/
Dbuild-config90 "trusty/device/arm/generic-arm64/project/keys/apploader_sign_test_private_key_0.der",
91 "trusty/device/arm/generic-arm64/project/keys/apploader_sign_test_public_key_0.der"
/trusty/user/app/keymint/secure_storage_manager/
Dsoftware.rs9 use kmr_ta::device::{RetrieveCertSigningInfo, SigningAlgorithm, SigningKeyType};
/trusty/kernel/lib/dtb_embedded/
Ddtb.ld29 ASSERT(SIZEOF(.dtb) > 0, "No embedded device tree blob was found");
/trusty/device/arm/generic-arm64/project/
Dqemu-inc.mk90 HAFNIUM_MANIFESTS := trusty/device/arm/generic-arm64/project/hafnium
175 @echo Initialize rpmb device
/trusty/user/app/storage/
DREADME.md28 different ports, as it is device specific which ports share file systems.
57 The file system stores two super-blocks on a device that has tamper detection.
72 block is encrypted using this value and a device specific key.
/trusty/user/app/keymint/keys/
Dlegacy.rs13 use kmr_ta::device;
35 pub keys: Box<dyn device::RetrieveKeyMaterial>,

12