Home
last modified time | relevance | path

Searched refs:tee_enforced (Results 1 – 4 of 4) sorted by relevance

/system/keymaster/km_openssl/
Dattestation_utils.cpp49 const AuthorizationSet& tee_enforced, in build_attestation_extension() argument
59 keymaster_error_t error = build_attestation_record(attest_params, sw_enforced, tee_enforced, in build_attestation_extension()
79 const AuthorizationSet& tee_enforced, in build_eat_extension() argument
91 build_eat_record(attest_params, sw_enforced, tee_enforced, context, &eat_bytes); in build_eat_extension()
110 const AuthorizationSet& tee_enforced, in add_attestation_extension() argument
116 if (auto error = build_attestation_extension(attest_params, tee_enforced, sw_enforced, in add_attestation_extension()
121 if (auto error = build_eat_extension(attest_params, tee_enforced, sw_enforced, context, in add_attestation_extension()
138 const AuthorizationSet& tee_enforced, in make_attestation_cert() argument
149 if (auto error = add_attestation_extension(attest_params, tee_enforced, sw_enforced, context, in make_attestation_cert()
284 const AuthorizationSet& tee_enforced, in generate_attestation() argument
[all …]
Dattestation_record.cpp820 AuthorizationSet sw_enforced, AuthorizationSet tee_enforced, in build_eat_record() argument
897 context.GetSecurityLevel() == KM_SECURITY_LEVEL_SOFTWARE ? &sw_enforced : &tee_enforced); in build_eat_record()
920 error = build_eat_submod(tee_enforced, EatSecurityLevel::SECURE_RESTRICTED, &tee_submod); in build_eat_record()
937 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { in build_eat_record()
967 AuthorizationSet tee_enforced, in build_attestation_record() argument
981 key_desc->tee_enforced->root_of_trust = KM_ROOT_OF_TRUST_new(); in build_attestation_record()
982 root_of_trust = key_desc->tee_enforced->root_of_trust; in build_attestation_record()
1036 context.GetSecurityLevel() == KM_SECURITY_LEVEL_SOFTWARE ? &sw_enforced : &tee_enforced); in build_attestation_record()
1051 tee_enforced.push_back(TAG_DEVICE_UNIQUE_ATTESTATION); in build_attestation_record()
1057 error = build_auth_list(tee_enforced, key_desc->tee_enforced); in build_attestation_record()
[all …]
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h201 KM_AUTH_LIST* tee_enforced; member
213 ASN1_SIMPLE(KM_KEY_DESCRIPTION, tee_enforced, KM_AUTH_LIST),
333 AuthorizationSet tee_enforced,
342 AuthorizationSet tee_enforced, //
357 AuthorizationSet* tee_enforced,
377 AuthorizationSet* software_enforced, AuthorizationSet* tee_enforced,
384 AuthorizationSet* tee_enforced);
/system/keymaster/android_keymaster/
Dandroid_keymaster.cpp60 keymaster_error_t CheckPatchLevel(const AuthorizationSet& tee_enforced, in CheckPatchLevel() argument
64 if (tee_enforced.GetTagValue(tag, &key_patchlevel) || in CheckPatchLevel()
75 keymaster_error_t CheckVersionInfo(const AuthorizationSet& tee_enforced, in CheckVersionInfo() argument
83 CheckPatchLevel(tee_enforced, sw_enforced, TAG_OS_PATCHLEVEL, os_patchlevel); in CheckVersionInfo()
89 err = CheckPatchLevel(tee_enforced, sw_enforced, TAG_VENDOR_PATCHLEVEL, in CheckVersionInfo()
95 err = CheckPatchLevel(tee_enforced, sw_enforced, TAG_BOOT_PATCHLEVEL, in CheckVersionInfo()