Searched refs:root_of_trust (Results 1 – 13 of 13) sorted by relevance
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 999 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in build_attestation_record() local 1001 key_desc->software_enforced->root_of_trust = KM_ROOT_OF_TRUST_new(); in build_attestation_record() 1002 root_of_trust = key_desc->software_enforced->root_of_trust; in build_attestation_record() 1004 key_desc->tee_enforced->root_of_trust = KM_ROOT_OF_TRUST_new(); in build_attestation_record() 1005 root_of_trust = key_desc->tee_enforced->root_of_trust; in build_attestation_record() 1012 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, vb_params->verified_boot_key.data, in build_attestation_record() 1017 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_hash, in build_attestation_record() 1023 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record() 1024 if (!ASN1_ENUMERATED_set(root_of_trust->verified_boot_state, vb_params->verified_boot_state)) { in build_attestation_record() 1305 if (record->root_of_trust) { in extract_auth_list() [all …]
|
/system/keymaster/include/keymaster/key_blob_utils/ |
D | software_keyblobs.h | 38 const KeymasterBlob& root_of_trust);
|
/system/keymint/common/src/ |
D | keyblob.rs | 121 fn is_legacy_key(&self, keyblob: &[u8], params: &[KeyParam], root_of_trust: &BootInfo) -> bool { in is_legacy_key() 128 root_of_trust, in is_legacy_key() 150 root_of_trust: &BootInfo, in convert_legacy_key()
|
/system/security/keystore2/src/ |
D | shared_secret_negotiation.rs | 318 let root_of_trust = match tee.getRootOfTrust(&challenge) { in transfer_root_of_trust() localVariable 327 let result = strongbox.sendRootOfTrust(&root_of_trust); in transfer_root_of_trust()
|
D | km_compat.rs | 308 fn sendRootOfTrust(&self, root_of_trust: &[u8]) -> binder::Result<()> { in sendRootOfTrust() 309 self.real.sendRootOfTrust(root_of_trust) in sendRootOfTrust()
|
/system/keymaster/include/keymaster/contexts/ |
D | soft_keymaster_context.h | 49 explicit SoftKeymasterContext(KmVersion version, const std::string& root_of_trust = "SW");
|
/system/keymint/hal/src/ |
D | keymint.rs | 260 fn sendRootOfTrust(&self, root_of_trust: &[u8]) -> binder::Result<()> { in sendRootOfTrust() 262 self.execute(SendRootOfTrustRequest { root_of_trust: root_of_trust.to_vec() })?; in sendRootOfTrust()
|
/system/keymaster/contexts/ |
D | soft_keymaster_context.cpp | 53 SoftKeymasterContext::SoftKeymasterContext(KmVersion version, const std::string& root_of_trust) in SoftKeymasterContext() argument 63 km1_dev_(nullptr), root_of_trust_(string2Blob(root_of_trust)), os_version_(0), in SoftKeymasterContext()
|
/system/keymaster/key_blob_utils/ |
D | software_keyblobs.cpp | 81 const KeymasterBlob& root_of_trust) { in BuildHiddenAuthorizations() argument 88 hidden->push_back(TAG_ROOT_OF_TRUST, root_of_trust); in BuildHiddenAuthorizations()
|
/system/keymint/ta/src/ |
D | lib.rs | 351 let hidden = tag::hidden(params, self.root_of_trust()?)?; in keyblob_parse_decrypt_backlevel() 806 match self.send_root_of_trust(&req.root_of_trust) { in process_req() 1031 fn send_root_of_trust(&mut self, root_of_trust: &[u8]) -> Result<(), Error> { in send_root_of_trust() 1035 let mac0 = coset::CoseMac0::from_tagged_slice(root_of_trust) in send_root_of_trust() 1115 fn root_of_trust(&self) -> Result<&[u8], Error> { in root_of_trust() method
|
D | keys.rs | 459 let hidden = tag::hidden(params, self.root_of_trust()?)?; in finish_keyblob_creation() 755 let hidden = tag::hidden(&upgrade_params, self.root_of_trust()?)?; in upgrade_key()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 108 KM_ROOT_OF_TRUST* root_of_trust; member 168 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.masked_tag()),
|
/system/keymint/wire/src/ |
D | types.rs | 198 pub root_of_trust: Vec<u8>, field
|