/aosp12/system/keymaster/tests/ |
H A D | attestation_record_test.cpp | 54 params.verified_boot_key = {vboot_key_, sizeof(vboot_key_)}; in GetVerifiedBootParams() 61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() argument 63 EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length); in VerifyRootOfTrust() 64 if (sizeof(vboot_key_) == verified_boot_key.data_length) { in VerifyRootOfTrust() 166 keymaster_blob_t verified_boot_key; in TEST() local 171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 172 delete[] verified_boot_key.data; in TEST() 220 keymaster_blob_t verified_boot_key = {}; in TEST() local 265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 266 delete[] verified_boot_key.data; in TEST() [all …]
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | attestation_record.cpp | 52 ASN1_OCTET_STRING* verified_boot_key; member 59 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 348 hidl_vec<uint8_t>* verified_boot_key, in parse_root_of_trust() argument 351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 371 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 376 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 377 verified_boot_key->resize(vb_key->length); in parse_root_of_trust() 378 memcpy(verified_boot_key->data(), vb_key->data, vb_key->length); in parse_root_of_trust()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | attestation_record.cpp | 53 ASN1_OCTET_STRING* verified_boot_key; member 60 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 367 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument 369 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 389 if (!root_of_trust->verified_boot_key) { in parse_root_of_trust() 394 auto& vb_key = root_of_trust->verified_boot_key; in parse_root_of_trust() 395 verified_boot_key->resize(vb_key->length); in parse_root_of_trust() 396 memcpy(verified_boot_key->data(), vb_key->data, vb_key->length); in parse_root_of_trust()
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 55 vector<uint8_t> verified_boot_key; member 83 std::vector<uint8_t>* verified_boot_key,
|
/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 123 auto& verified_boot_key = root_of_trust.verified_boot_key; in check_root_of_trust() local 128 EXPECT_NE(verified_boot_key, empty_boot_key); in check_root_of_trust() 131 EXPECT_NE(verified_boot_key, empty_boot_key); in check_root_of_trust() 134 EXPECT_EQ(verified_boot_key, empty_boot_key); in check_root_of_trust() 139 EXPECT_EQ(verified_boot_key, empty_boot_key); in check_root_of_trust()
|
/aosp12/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 825 if (vb_params->verified_boot_key.data_length) { in build_eat_record() 990 if (vb_params->verified_boot_key.data_length && in build_attestation_record() 991 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, vb_params->verified_boot_key.data, in build_attestation_record() 992 vb_params->verified_boot_key.data_length)) { in build_attestation_record() 1286 if (!rot->verified_boot_key) return KM_ERROR_INVALID_KEY_BLOB; in extract_auth_list() 1430 keymaster_blob_t* verified_boot_key, in parse_root_of_trust() argument 1445 if (!record->tee_enforced->root_of_trust->verified_boot_key) { in parse_root_of_trust() 1449 verified_boot_key->data = dup_buffer(root_of_trust->verified_boot_key->data, in parse_root_of_trust() 1451 verified_boot_key->data_length = root_of_trust->verified_boot_key->length; in parse_root_of_trust() 1465 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key, in parse_eat_record() argument [all …]
|
/aosp12/hardware/interfaces/keymaster/4.1/support/ |
H A D | attestation_record.cpp | 60 ASN1_OCTET_STRING* verified_boot_key; member 67 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 404 if (!root_of_trust->verified_boot_key) { in MAKE_OPENSSL_PTR_TYPE() 410 auto& vb_key = root_of_trust->verified_boot_key; in MAKE_OPENSSL_PTR_TYPE() 411 rot.verified_boot_key.resize(vb_key->length); in MAKE_OPENSSL_PTR_TYPE() 412 memcpy(rot.verified_boot_key.data(), vb_key->data, vb_key->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 62 ASN1_OCTET_STRING* verified_boot_key; member 69 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 376 keymaster_blob_t* verified_boot_key, 390 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_attestation_context.cpp | 31 params.verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
|
H A D | pure_soft_keymaster_context.cpp | 552 params.verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | attestation_record.h | 63 hidl_vec<uint8_t>* verified_boot_key,
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 34 hidl_vec<uint8_t> verified_boot_key; member
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintAidlTestBase.cpp | 1398 vector<uint8_t> verified_boot_key; in verify_attestation_record() local 1431 std::string verified_boot_key_str((const char*)verified_boot_key.data(), in verify_attestation_record() 1432 verified_boot_key.size()); in verify_attestation_record() 1436 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 1437 verified_boot_key.size())); in verify_attestation_record() 1440 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 1441 verified_boot_key.size())); in verify_attestation_record() 1444 EXPECT_EQ(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 1445 verified_boot_key.size())); in verify_attestation_record() 1450 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() [all …]
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | attestation_context.h | 69 keymaster_blob_t verified_boot_key; member
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | attestation_record.cpp | 48 ASN1_OCTET_STRING* verified_boot_key; member 54 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 491 HidlBuf verified_boot_key; in verify_attestation_record() local 524 std::string verified_boot_key_str((const char*)verified_boot_key.data(), in verify_attestation_record() 525 verified_boot_key.size()); in verify_attestation_record() 529 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 530 verified_boot_key.size())); in verify_attestation_record() 533 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 534 verified_boot_key.size())); in verify_attestation_record() 537 EXPECT_EQ(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() 538 verified_boot_key.size())); in verify_attestation_record() 543 EXPECT_NE(0, memcmp(verified_boot_key.data(), empty_boot_key.data(), in verify_attestation_record() [all …]
|