/hardware/interfaces/security/keymint/support/include/keymint_support/ |
D | attestation_record.h | 57 vector<uint8_t> verified_boot_key; member 85 std::vector<uint8_t>* verified_boot_key,
|
/hardware/interfaces/security/keymint/aidl/default/hal/ |
D | lib.rs | 51 let verified_boot_key = vec![0; 32]; in get_boot_info() localVariable 93 verified_boot_key, in get_boot_info()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 52 ASN1_OCTET_STRING* verified_boot_key; member 59 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 348 hidl_vec<uint8_t>* verified_boot_key, in parse_root_of_trust() argument 351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 371 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 376 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 377 verified_boot_key->resize(vb_key->length); in parse_root_of_trust() 378 memcpy(verified_boot_key->data(), vb_key->data, vb_key->length); in parse_root_of_trust()
|
/hardware/interfaces/security/keymint/support/ |
D | attestation_record.cpp | 53 ASN1_OCTET_STRING* verified_boot_key; member 60 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 371 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument 373 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 393 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 398 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 399 verified_boot_key->resize(vb_key->length); in parse_root_of_trust() 400 memcpy(verified_boot_key->data(), vb_key->data, vb_key->length); in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 123 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust() local 128 EXPECT_NE(verified_boot_key, empty_boot_key); in check_root_of_trust() 131 EXPECT_NE(verified_boot_key, empty_boot_key); in check_root_of_trust() 134 EXPECT_EQ(verified_boot_key, empty_boot_key); in check_root_of_trust() 139 EXPECT_EQ(verified_boot_key, empty_boot_key); in check_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 34 hidl_vec<uint8_t> verified_boot_key; member
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | attestation_record.h | 63 hidl_vec<uint8_t>* verified_boot_key,
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 60 ASN1_OCTET_STRING* verified_boot_key; member 67 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 404 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE() 410 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE() 411 rot.verified_boot_key.resize(vb_key->length); in MAKE_OPENSSL_PTR_TYPE() 412 memcpy(rot.verified_boot_key.data(), vb_key->data, vb_key->length); in MAKE_OPENSSL_PTR_TYPE()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintAidlTestBase.cpp | 1786 void verify_root_of_trust(const vector<uint8_t>& verified_boot_key, bool device_locked, in verify_root_of_trust() argument 1816 std::string verified_boot_key_str((const char*)verified_boot_key.data(), in verify_root_of_trust() 1817 verified_boot_key.size()); in verify_root_of_trust() 1822 EXPECT_LE(verified_boot_key.size(), 32); in verify_root_of_trust() 1827 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_root_of_trust() 1828 verified_boot_key.size())); in verify_root_of_trust() 1831 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_root_of_trust() 1832 verified_boot_key.size())); in verify_root_of_trust() 1835 EXPECT_EQ(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_root_of_trust() 1836 verified_boot_key.size())); in verify_root_of_trust() [all …]
|
D | KeyMintAidlTestBase.h | 410 void verify_root_of_trust(const vector<uint8_t>& verified_boot_key, //
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 48 ASN1_OCTET_STRING* verified_boot_key; member 54 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 497 HidlBuf verified_boot_key; in verify_attestation_record() local 501 error = parse_root_of_trust(attest_rec->data, attest_rec->length, &verified_boot_key, in verify_attestation_record() 530 std::string verified_boot_key_str((const char*)verified_boot_key.data(), in verify_attestation_record() 531 verified_boot_key.size()); in verify_attestation_record() 535 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 536 verified_boot_key.size())); in verify_attestation_record() 539 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 540 verified_boot_key.size())); in verify_attestation_record() 543 EXPECT_EQ(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 544 verified_boot_key.size())); in verify_attestation_record() [all …]
|
/hardware/interfaces/security/rkp/aidl/vts/functional/ |
D | VtsRemotelyProvisionedComponentTests.cpp | 892 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument 900 auto error = parse_root_of_trust(attest_rec->data, attest_rec->length, verified_boot_key, in parse_root_of_trust()
|