Searched refs:verified_boot_hash (Results 1 – 6 of 6) sorted by relevance
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 55 ASN1_OCTET_STRING* verified_boot_hash; member 62 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 313 hidl_vec<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 314 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 356 auto& vb_hash = root_of_trust->verified_boot_hash; in parse_root_of_trust() 361 verified_boot_hash->resize(vb_hash->length); in parse_root_of_trust() 362 memcpy(verified_boot_hash->data(), vb_hash->data, vb_hash->length); in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 35 hidl_vec<uint8_t> verified_boot_hash; member
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | attestation_record.h | 65 hidl_vec<uint8_t>* verified_boot_hash);
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 63 ASN1_OCTET_STRING* verified_boot_hash; member 70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_hash, ASN1_OCTET_STRING), 373 auto& vb_hash = root_of_trust->verified_boot_hash; in MAKE_OPENSSL_PTR_TYPE() 378 rot.verified_boot_hash.resize(vb_hash->length); in MAKE_OPENSSL_PTR_TYPE() 379 memcpy(rot.verified_boot_hash.data(), vb_hash->data, vb_hash->length); in MAKE_OPENSSL_PTR_TYPE()
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 103 EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash)); in check_root_of_trust()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 423 HidlBuf verified_boot_hash; in verify_attestation_record() local 425 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 432 EXPECT_EQ(prop_string, bin2hex(verified_boot_hash)); in verify_attestation_record()
|