Home
last modified time | relevance | path

Searched refs:verified_boot_key (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/tests/
Dattestation_record_test.cpp42 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key, in GetVerifiedBootParams() argument
45 verified_boot_key->data = vboot_key_; in GetVerifiedBootParams()
46 verified_boot_key->data_length = sizeof(vboot_key_); in GetVerifiedBootParams()
52 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() argument
54 EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length); in VerifyRootOfTrust()
55 if (sizeof(vboot_key_) == verified_boot_key.data_length) { in VerifyRootOfTrust()
56 EXPECT_EQ(0, memcmp(verified_boot_key.data, vboot_key_, sizeof(vboot_key_))); in VerifyRootOfTrust()
134 keymaster_blob_t verified_boot_key; in TEST() local
137 EXPECT_EQ(KM_ERROR_OK, parse_root_of_trust(asn1.get(), asn1_len, &verified_boot_key, in TEST()
139 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
[all …]
/system/keymaster/km_openssl/
Dattestation_record.cpp402 keymaster_blob_t verified_boot_key; in build_attestation_record() local
406 keymaster_error_t error = context.GetVerifiedBootParams(&verified_boot_key, &verified_boot_hash, in build_attestation_record()
409 if (verified_boot_key.data_length && in build_attestation_record()
410 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, verified_boot_key.data, in build_attestation_record()
411 verified_boot_key.data_length)) { in build_attestation_record()
667 if (!rot->verified_boot_key) in extract_auth_list()
788 keymaster_blob_t* verified_boot_key, in parse_root_of_trust() argument
803 if (!record->tee_enforced->root_of_trust->verified_boot_key) { in parse_root_of_trust()
807 verified_boot_key->data = dup_buffer(root_of_trust->verified_boot_key->data, in parse_root_of_trust()
808 root_of_trust->verified_boot_key->length); in parse_root_of_trust()
[all …]
/system/keymaster/include/keymaster/
Dattestation_record.h45 ASN1_OCTET_STRING* verified_boot_key; member
52 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING),
289 keymaster_blob_t* verified_boot_key,
/system/keymaster/include/keymaster/contexts/
Dpure_soft_keymaster_context.h99 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
Dsoft_keymaster_context.h111 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
/system/keymaster/contexts/
Dsoft_keymaster_context.cpp480 keymaster_blob_t* verified_boot_key, keymaster_blob_t* verified_boot_hash, in GetVerifiedBootParams() argument
484 *verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
Dpure_soft_keymaster_context.cpp448 keymaster_blob_t* verified_boot_key, keymaster_blob_t* verified_boot_hash, in GetVerifiedBootParams() argument
452 *verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()