Home
last modified time | relevance | path

Searched refs:verified_boot_key (Results 1 – 13 of 13) sorted by relevance

/hardware/interfaces/security/keymint/support/include/keymint_support/
Dattestation_record.h57 vector<uint8_t> verified_boot_key; member
85 std::vector<uint8_t>* verified_boot_key,
/hardware/interfaces/security/keymint/aidl/default/hal/
Dlib.rs81 let verified_boot_key = match device_boot_locked { in get_boot_info() localVariable
116 verified_boot_key, in get_boot_info()
/hardware/interfaces/keymaster/4.0/support/
Dattestation_record.cpp52 ASN1_OCTET_STRING* verified_boot_key; member
59 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
348 hidl_vec<uint8_t>* verified_boot_key, in parse_root_of_trust() argument
351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
371 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust()
376 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust()
377 verified_boot_key->resize(vb_key->length); in parse_root_of_trust()
378 memcpy(verified_boot_key->data(), vb_key->data, vb_key->length); in parse_root_of_trust()
/hardware/interfaces/security/keymint/support/
Dattestation_record.cpp53 ASN1_OCTET_STRING* verified_boot_key; member
60 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
374 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument
376 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
396 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust()
401 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust()
402 verified_boot_key->resize(vb_key->length); in parse_root_of_trust()
403 memcpy(verified_boot_key->data(), vb_key->data, vb_key->length); in parse_root_of_trust()
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
Dattestation_record.h63 hidl_vec<uint8_t>* verified_boot_key,
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
Dattestation_record.h34 hidl_vec<uint8_t> verified_boot_key; member
/hardware/interfaces/keymaster/4.1/vts/functional/
DDeviceUniqueAttestationTest.cpp123 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust() local
128 EXPECT_NE(verified_boot_key, empty_boot_key); in check_root_of_trust()
131 EXPECT_NE(verified_boot_key, empty_boot_key); in check_root_of_trust()
134 EXPECT_EQ(verified_boot_key, empty_boot_key); in check_root_of_trust()
139 EXPECT_EQ(verified_boot_key, empty_boot_key); in check_root_of_trust()
/hardware/interfaces/keymaster/4.1/support/
Dattestation_record.cpp60 ASN1_OCTET_STRING* verified_boot_key; member
67 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
404 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE()
410 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE()
411 rot.verified_boot_key.resize(vb_key->length); in MAKE_OPENSSL_PTR_TYPE()
412 memcpy(rot.verified_boot_key.data(), vb_key->data, vb_key->length); in MAKE_OPENSSL_PTR_TYPE()
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintAidlTestBase.cpp1900 void verify_root_of_trust(const vector<uint8_t>& verified_boot_key, bool device_locked, in verify_root_of_trust() argument
1933 EXPECT_EQ(verified_boot_key.size(), 32); in verify_root_of_trust()
1944 EXPECT_LE(verified_boot_key.size(), 32); in verify_root_of_trust()
1949 std::string verified_boot_key_str((const char*)verified_boot_key.data(), in verify_root_of_trust()
1950 verified_boot_key.size()); in verify_root_of_trust()
1954 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_root_of_trust()
1955 verified_boot_key.size())); in verify_root_of_trust()
1958 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_root_of_trust()
1959 verified_boot_key.size())); in verify_root_of_trust()
1962 EXPECT_EQ(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_root_of_trust()
[all …]
DKeyMintAidlTestBase.h421 void verify_root_of_trust(const vector<uint8_t>& verified_boot_key, //
/hardware/interfaces/keymaster/3.0/vts/functional/
Dattestation_record.cpp48 ASN1_OCTET_STRING* verified_boot_key; member
54 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp497 HidlBuf verified_boot_key; in verify_attestation_record() local
501 error = parse_root_of_trust(attest_rec->data, attest_rec->length, &verified_boot_key, in verify_attestation_record()
530 std::string verified_boot_key_str((const char*)verified_boot_key.data(), in verify_attestation_record()
531 verified_boot_key.size()); in verify_attestation_record()
535 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record()
536 verified_boot_key.size())); in verify_attestation_record()
539 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record()
540 verified_boot_key.size())); in verify_attestation_record()
543 EXPECT_EQ(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record()
544 verified_boot_key.size())); in verify_attestation_record()
[all …]
/hardware/interfaces/security/rkp/aidl/vts/functional/
DVtsRemotelyProvisionedComponentTests.cpp1072 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument
1080 auto error = parse_root_of_trust(attest_rec->data, attest_rec->length, verified_boot_key, in parse_root_of_trust()