Home
last modified time | relevance | path

Searched refs:verified_boot_hash (Results 1 – 14 of 14) sorted by relevance

/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/
H A Dattestation_record.h56 vector<uint8_t> verified_boot_hash; member
85 std::vector<uint8_t>* verified_boot_hash);
/aosp12/hardware/interfaces/keymaster/4.0/support/
H A Dattestation_record.cpp55 ASN1_OCTET_STRING* verified_boot_hash; member
62 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING),
350 hidl_vec<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument
351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
393 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust()
398 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust()
399 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
/aosp12/hardware/interfaces/security/keymint/support/
H A Dattestation_record.cpp56 ASN1_OCTET_STRING* verified_boot_hash; member
63 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING),
368 bool* device_locked, vector<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument
369 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
411 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust()
416 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust()
417 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
/aosp12/hardware/interfaces/keymaster/4.1/support/
H A Dattestation_record.cpp63 ASN1_OCTET_STRING* verified_boot_hash; member
70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING),
419 auto& vb_hash = root_of_trust->verified_boot_hash; in MAKE_OPENSSL_PTR_TYPE()
424 rot.verified_boot_hash.resize(vb_hash->length); in MAKE_OPENSSL_PTR_TYPE()
425 memcpy(rot.verified_boot_hash.data(), vb_hash->data, vb_hash->length); in MAKE_OPENSSL_PTR_TYPE()
/aosp12/system/keymaster/contexts/
H A Dsoft_attestation_context.cpp32 params.verified_boot_hash = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), in GetVerifiedBootParams()
H A Dpure_soft_keymaster_context.cpp553 params.verified_boot_hash = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), in GetVerifiedBootParams()
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
H A Dattestation_record.h65 hidl_vec<uint8_t>* verified_boot_hash);
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
H A Dattestation_record.h35 hidl_vec<uint8_t> verified_boot_hash; member
/aosp12/system/keymaster/include/keymaster/
H A Dattestation_context.h70 keymaster_blob_t verified_boot_hash; member
/aosp12/system/keymaster/km_openssl/
H A Dattestation_record.cpp828 if (vb_params->verified_boot_hash.data_length) { in build_eat_record()
829 eat_record.add(EatClaim::VERIFIED_BOOT_HASH, blob_to_bstr(vb_params->verified_boot_hash)); in build_eat_record()
995 if (vb_params->verified_boot_hash.data_length && in build_attestation_record()
996 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_hash, in build_attestation_record()
997 vb_params->verified_boot_hash.data, in build_attestation_record()
998 vb_params->verified_boot_hash.data_length)) { in build_attestation_record()
/aosp12/system/keymaster/include/keymaster/km_openssl/
H A Dattestation_record.h65 ASN1_OCTET_STRING* verified_boot_hash; member
72 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING),
/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/
H A DDeviceUniqueAttestationTest.cpp117 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust()
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/
H A DKeyMintAidlTestBase.cpp1401 vector<uint8_t> verified_boot_hash; in verify_attestation_record() local
1403 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record()
1410 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_attestation_record()
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/
H A Dkeymaster_hidl_hal_test.cpp494 HidlBuf verified_boot_hash; in verify_attestation_record() local
496 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record()
503 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_attestation_record()