Home
last modified time | relevance | path

Searched refs:root_of_trust (Results 1 – 13 of 13) sorted by relevance

/system/keymaster/km_openssl/
Dattestation_record.cpp999 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in build_attestation_record() local
1001 key_desc->software_enforced->root_of_trust = KM_ROOT_OF_TRUST_new(); in build_attestation_record()
1002 root_of_trust = key_desc->software_enforced->root_of_trust; in build_attestation_record()
1004 key_desc->tee_enforced->root_of_trust = KM_ROOT_OF_TRUST_new(); in build_attestation_record()
1005 root_of_trust = key_desc->tee_enforced->root_of_trust; in build_attestation_record()
1012 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, vb_params->verified_boot_key.data, in build_attestation_record()
1017 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_hash, in build_attestation_record()
1023 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record()
1024 if (!ASN1_ENUMERATED_set(root_of_trust->verified_boot_state, vb_params->verified_boot_state)) { in build_attestation_record()
1305 if (record->root_of_trust) { in extract_auth_list()
[all …]
/system/keymaster/include/keymaster/key_blob_utils/
Dsoftware_keyblobs.h38 const KeymasterBlob& root_of_trust);
/system/keymint/common/src/
Dkeyblob.rs121 fn is_legacy_key(&self, keyblob: &[u8], params: &[KeyParam], root_of_trust: &BootInfo) -> bool { in is_legacy_key()
128 root_of_trust, in is_legacy_key()
150 root_of_trust: &BootInfo, in convert_legacy_key()
/system/security/keystore2/src/
Dshared_secret_negotiation.rs318 let root_of_trust = match tee.getRootOfTrust(&challenge) { in transfer_root_of_trust() localVariable
327 let result = strongbox.sendRootOfTrust(&root_of_trust); in transfer_root_of_trust()
Dkm_compat.rs308 fn sendRootOfTrust(&self, root_of_trust: &[u8]) -> binder::Result<()> { in sendRootOfTrust()
309 self.real.sendRootOfTrust(root_of_trust) in sendRootOfTrust()
/system/keymaster/include/keymaster/contexts/
Dsoft_keymaster_context.h49 explicit SoftKeymasterContext(KmVersion version, const std::string& root_of_trust = "SW");
/system/keymint/hal/src/
Dkeymint.rs260 fn sendRootOfTrust(&self, root_of_trust: &[u8]) -> binder::Result<()> { in sendRootOfTrust()
262 self.execute(SendRootOfTrustRequest { root_of_trust: root_of_trust.to_vec() })?; in sendRootOfTrust()
/system/keymaster/contexts/
Dsoft_keymaster_context.cpp53 SoftKeymasterContext::SoftKeymasterContext(KmVersion version, const std::string& root_of_trust) in SoftKeymasterContext() argument
63 km1_dev_(nullptr), root_of_trust_(string2Blob(root_of_trust)), os_version_(0), in SoftKeymasterContext()
/system/keymaster/key_blob_utils/
Dsoftware_keyblobs.cpp81 const KeymasterBlob& root_of_trust) { in BuildHiddenAuthorizations() argument
88 hidden->push_back(TAG_ROOT_OF_TRUST, root_of_trust); in BuildHiddenAuthorizations()
/system/keymint/ta/src/
Dlib.rs351 let hidden = tag::hidden(params, self.root_of_trust()?)?; in keyblob_parse_decrypt_backlevel()
806 match self.send_root_of_trust(&req.root_of_trust) { in process_req()
1031 fn send_root_of_trust(&mut self, root_of_trust: &[u8]) -> Result<(), Error> { in send_root_of_trust()
1035 let mac0 = coset::CoseMac0::from_tagged_slice(root_of_trust) in send_root_of_trust()
1115 fn root_of_trust(&self) -> Result<&[u8], Error> { in root_of_trust() method
Dkeys.rs459 let hidden = tag::hidden(params, self.root_of_trust()?)?; in finish_keyblob_creation()
755 let hidden = tag::hidden(&upgrade_params, self.root_of_trust()?)?; in upgrade_key()
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h108 KM_ROOT_OF_TRUST* root_of_trust; member
168 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.masked_tag()),
/system/keymint/wire/src/
Dtypes.rs198 pub root_of_trust: Vec<u8>, field