/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 56 vector<uint8_t> verified_boot_hash; member 85 std::vector<uint8_t>* verified_boot_hash);
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | attestation_record.cpp | 55 ASN1_OCTET_STRING* verified_boot_hash; member 62 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 350 hidl_vec<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 393 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust() 398 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust() 399 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | attestation_record.cpp | 56 ASN1_OCTET_STRING* verified_boot_hash; member 63 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 368 bool* device_locked, vector<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 369 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 411 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust() 416 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust() 417 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
|
/aosp12/hardware/interfaces/keymaster/4.1/support/ |
H A D | attestation_record.cpp | 63 ASN1_OCTET_STRING* verified_boot_hash; member 70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 419 auto& vb_hash = root_of_trust->verified_boot_hash; in MAKE_OPENSSL_PTR_TYPE() 424 rot.verified_boot_hash.resize(vb_hash->length); in MAKE_OPENSSL_PTR_TYPE() 425 memcpy(rot.verified_boot_hash.data(), vb_hash->data, vb_hash->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_attestation_context.cpp | 32 params.verified_boot_hash = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), in GetVerifiedBootParams()
|
H A D | pure_soft_keymaster_context.cpp | 553 params.verified_boot_hash = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), in GetVerifiedBootParams()
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | attestation_record.h | 65 hidl_vec<uint8_t>* verified_boot_hash);
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 35 hidl_vec<uint8_t> verified_boot_hash; member
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | attestation_context.h | 70 keymaster_blob_t verified_boot_hash; member
|
/aosp12/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 828 if (vb_params->verified_boot_hash.data_length) { in build_eat_record() 829 eat_record.add(EatClaim::VERIFIED_BOOT_HASH, blob_to_bstr(vb_params->verified_boot_hash)); in build_eat_record() 995 if (vb_params->verified_boot_hash.data_length && in build_attestation_record() 996 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_hash, in build_attestation_record() 997 vb_params->verified_boot_hash.data, in build_attestation_record() 998 vb_params->verified_boot_hash.data_length)) { in build_attestation_record()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 65 ASN1_OCTET_STRING* verified_boot_hash; member 72 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING),
|
/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 117 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust()
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintAidlTestBase.cpp | 1401 vector<uint8_t> verified_boot_hash; in verify_attestation_record() local 1403 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 1410 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_attestation_record()
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 494 HidlBuf verified_boot_hash; in verify_attestation_record() local 496 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 503 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_attestation_record()
|