Home
last modified time | relevance | path

Searched refs:root_of_trust (Results 1 – 5 of 5) sorted by relevance

/hardware/interfaces/keymaster/4.1/support/
Dattestation_record.cpp94 KM_ROOT_OF_TRUST* root_of_trust; member
137 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
354 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in MAKE_OPENSSL_PTR_TYPE() local
355 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE()
356 root_of_trust = record->tee_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE()
357 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in MAKE_OPENSSL_PTR_TYPE()
358 root_of_trust = record->software_enforced->root_of_trust; in MAKE_OPENSSL_PTR_TYPE()
363 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE()
368 RootOfTrust& rot = result.root_of_trust; in MAKE_OPENSSL_PTR_TYPE()
369 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE()
[all …]
/hardware/interfaces/keymaster/4.0/support/
Dattestation_record.cpp86 KM_ROOT_OF_TRUST* root_of_trust; member
124 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),
325 KM_ROOT_OF_TRUST* root_of_trust = nullptr; in parse_root_of_trust() local
326 if (record->tee_enforced && record->tee_enforced->root_of_trust) { in parse_root_of_trust()
327 root_of_trust = record->tee_enforced->root_of_trust; in parse_root_of_trust()
328 } else if (record->software_enforced && record->software_enforced->root_of_trust) { in parse_root_of_trust()
329 root_of_trust = record->software_enforced->root_of_trust; in parse_root_of_trust()
334 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust()
339 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust()
344 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust()
[all …]
/hardware/interfaces/keymaster/4.1/vts/functional/
DDeviceUniqueAttestationTest.cpp108 void check_root_of_trust(const RootOfTrust& root_of_trust) { in check_root_of_trust() argument
114 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust()
120 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust()
121 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust()
167 check_root_of_trust(attestation.root_of_trust); in check_attestation_record()
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
Dattestation_record.h41 RootOfTrust root_of_trust; member
/hardware/interfaces/keymaster/3.0/vts/functional/
Dattestation_record.cpp81 KM_ROOT_OF_TRUST* root_of_trust; member
111 ASN1_EXP_OPT(KM_AUTH_LIST, root_of_trust, KM_ROOT_OF_TRUST, TAG_ROOT_OF_TRUST.maskedTag()),