Searched refs:root_of_trust (Results 1 – 5 of 5) sorted by relevance
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 94 KM_ROOT_OF_TRUST* root_of_trust; member 137 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()), 354 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in MAKE_OPENSSL_PTR_TYPE() local 355 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE() 356 root_of_trust = record->tee_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE() 357 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE() 358 root_of_trust = record->software_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE() 363 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE() 368 RootOfTrust& rot = result.root_of_trust; in MAKE_OPENSSL_PTR_TYPE() 369 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE() [all …]
|
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 86 KM_ROOT_OF_TRUST* root_of_trust; member 124 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()), 325 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in parse_root_of_trust() local 326 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in parse_root_of_trust() 327 root_of_trust = record->tee_enforced->root_of_trust; in parse_root_of_trust() 328 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in parse_root_of_trust() 329 root_of_trust = record->software_enforced->root_of_trust; in parse_root_of_trust() 334 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 339 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 344 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust() [all …]
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 108 void check_root_of_trust(const RootOfTrust& root_of_trust) { in check_root_of_trust() argument 114 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust() 120 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust() 121 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust() 167 check_root_of_trust(attestation.root_of_trust); in check_attestation_record()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 41 RootOfTrust root_of_trust; member
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 81 KM_ROOT_OF_TRUST* root_of_trust; member 111 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
|