Searched refs:verified_boot_key (Results 1 – 7 of 7) sorted by relevance
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 42 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key, in GetVerifiedBootParams() argument 45 verified_boot_key->data = vboot_key_; in GetVerifiedBootParams() 46 verified_boot_key->data_length = sizeof(vboot_key_); in GetVerifiedBootParams() 52 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() argument 54 EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length); in VerifyRootOfTrust() 55 if (sizeof(vboot_key_) == verified_boot_key.data_length) { in VerifyRootOfTrust() 56 EXPECT_EQ(0, memcmp(verified_boot_key.data, vboot_key_, sizeof(vboot_key_))); in VerifyRootOfTrust() 134 keymaster_blob_t verified_boot_key; in TEST() local 137 EXPECT_EQ(KM_ERROR_OK, parse_root_of_trust(asn1.get(), asn1_len, &verified_boot_key, in TEST() 139 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() [all …]
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 402 keymaster_blob_t verified_boot_key; in build_attestation_record() local 406 keymaster_error_t error = context.GetVerifiedBootParams(&verified_boot_key, &verified_boot_hash, in build_attestation_record() 409 if (verified_boot_key.data_length && in build_attestation_record() 410 !ASN1_OCTET_STRING_set(root_of_trust->verified_boot_key, verified_boot_key.data, in build_attestation_record() 411 verified_boot_key.data_length)) { in build_attestation_record() 667 if (!rot->verified_boot_key) in extract_auth_list() 788 keymaster_blob_t* verified_boot_key, in parse_root_of_trust() argument 803 if (!record->tee_enforced->root_of_trust->verified_boot_key) { in parse_root_of_trust() 807 verified_boot_key->data = dup_buffer(root_of_trust->verified_boot_key->data, in parse_root_of_trust() 808 root_of_trust->verified_boot_key->length); in parse_root_of_trust() [all …]
|
/system/keymaster/include/keymaster/ |
D | attestation_record.h | 45 ASN1_OCTET_STRING* verified_boot_key; member 52 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_key, ASN1_OCTET_STRING), 289 keymaster_blob_t* verified_boot_key,
|
/system/keymaster/include/keymaster/contexts/ |
D | pure_soft_keymaster_context.h | 99 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
|
D | soft_keymaster_context.h | 111 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
|
/system/keymaster/contexts/ |
D | soft_keymaster_context.cpp | 480 keymaster_blob_t* verified_boot_key, keymaster_blob_t* verified_boot_hash, in GetVerifiedBootParams() argument 484 *verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
|
D | pure_soft_keymaster_context.cpp | 448 keymaster_blob_t* verified_boot_key, keymaster_blob_t* verified_boot_hash, in GetVerifiedBootParams() argument 452 *verified_boot_key = {reinterpret_cast<uint8_t*>(fake_vb_key.data()), fake_vb_key.size()}; in GetVerifiedBootParams()
|