HomeSort by relevance Sort by last modified time
    Searched full:attestation (Results 1 - 25 of 104) sorted by null

1 2 3 4 5

  /system/tpm/attestation/server/
org.chromium.Attestation.conf 5 <policy user="attestation">
6 <allow own="org.chromium.Attestation" />
7 <allow send_destination="org.chromium.Attestation" />
10 <allow send_destination="org.chromium.Attestation" />
12 <deny send_destination="org.chromium.Attestation"
main.cc 29 #include "attestation/common/dbus_interface.h"
30 #include "attestation/server/attestation_service.h"
31 #include "attestation/server/dbus_service.h"
38 const char kAttestationUser[] = "attestation";
39 const char kAttestationGroup[] = "attestation";
49 << "Error getting attestation uid and gid.";
60 << "AttestationDaemon was not able to drop to attestation user.";
62 << "AttestationDaemon was not able to drop to attestation group.";
72 : brillo::DBusServiceDaemon(attestation::kAttestationServiceName) {
73 attestation_service_.reset(new attestation::AttestationService)
    [all...]
mock_database.cc 17 #include "attestation/server/mock_database.h"
22 namespace attestation { namespace
33 } // namespace attestation
mock_database.h 20 #include "attestation/server/database.h"
24 namespace attestation { namespace
40 } // namespace attestation
database.h 20 #include "attestation/common/database.pb.h"
22 namespace attestation { namespace
24 // Manages a persistent database of attestation-related data.
44 } // namespace attestation
attestation_service.h 20 #include "attestation/common/attestation_interface.h"
32 #include "attestation/common/crypto_utility.h"
33 #include "attestation/common/crypto_utility_impl.h"
34 #include "attestation/common/tpm_utility.h"
35 #include "attestation/common/tpm_utility_v1.h"
36 #include "attestation/server/database.h"
37 #include "attestation/server/database_impl.h"
38 #include "attestation/server/key_store.h"
39 #include "attestation/server/pkcs11_key_store.h"
41 namespace attestation { namespace
    [all...]
mock_key_store.cc 17 #include "attestation/server/mock_key_store.h"
22 namespace attestation { namespace
35 } // namespace attestation
database_impl.cc 17 #include "attestation/server/database_impl.h"
38 "/mnt/stateful_partition/unencrypted/preserve/attestation.epb";
48 namespace attestation { namespace
65 LOG(WARNING) << "Creating new attestation database.";
90 LOG(INFO) << "Loading attestation database.";
104 LOG(WARNING) << "Attempting to fix permissions on attestation database.";
108 PLOG(ERROR) << "Failed to read attestation database";
173 LOG(ERROR) << "Attestation: Failed to encrypt database.";
182 LOG(ERROR) << "Attestation: Could not unseal decryption key.";
187 LOG(ERROR) << "Attestation: Failed to decrypt database."
    [all...]
mock_key_store.h 20 #include "attestation/server/key_store.h"
27 namespace attestation { namespace
58 } // namespace attestation
database_impl.h 20 #include "attestation/server/database.h"
28 #include "attestation/common/crypto_utility.h"
30 namespace attestation { namespace
89 } // namespace attestation
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyAttestationTest.java 19 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_SOFTWARE;
20 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT;
85 * Tests for Android KeysStore attestation.
174 fail("Attestation challenges larger than 128 bytes should be rejected");
205 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID));
269 fail("Attestation challenges larger than 128 bytes should be rejected");
299 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID));
395 Attestation attestation = new Attestation(attestationCert) local
449 Attestation attestation = new Attestation(attestationCert); local
    [all...]
Attestation.java 28 * Parses an attestation certificate and provides an easy-to-use interface for examining the
31 public class Attestation {
56 * Constructs an {@code Attestation} object from the provided {@link X509Certificate},
57 * extracting the attestation data from the attestation extension.
60 * attestation extension.
62 public Attestation(X509Certificate x509Cert) throws CertificateParsingException {
71 Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.ATTESTATION_CHALLENGE_INDEX));
73 uniqueId = Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.UNIQUE_ID_INDEX));
  /external/autotest/client/site_tests/platform_Attestation/
control 7 PURPOSE = "Tests the TPM attestation enrollment process."
8 CRITERIA = "Fails if attestation enrollment fails."
15 This test verifies that the TPM attestation enrollment process works correctly.
  /system/tpm/attestation/client/
dbus_proxy.cc 17 #include "attestation/client/dbus_proxy.h"
22 #include "attestation/common/dbus_interface.h"
32 namespace attestation { namespace
46 attestation::kAttestationServiceName,
47 dbus::ObjectPath(attestation::kAttestationServicePath));
62 attestation::kAttestationInterface,
63 attestation::kCreateGoogleAttestedKey,
79 attestation::kAttestationInterface,
80 attestation::kGetKeyInfo,
96 attestation::kAttestationInterface
    [all...]
dbus_proxy.h 20 #include "attestation/common/attestation_interface.h"
28 namespace attestation { namespace
32 // std::unique_ptr<AttestationInterface> attestation = new DBusProxy();
33 // attestation->Initialize();
34 // attestation->CreateGoogleAttestedKey(...);
75 } // namespace attestation
  /system/tpm/attestation/common/
dbus_interface.h 20 namespace attestation { namespace
23 constexpr char kAttestationInterface[] = "org.chromium.Attestation";
24 constexpr char kAttestationServicePath[] = "/org/chromium/Attestation";
25 constexpr char kAttestationServiceName[] = "org.chromium.Attestation";
27 // Methods exported by attestation.
38 } // namespace attestation
mock_attestation_interface.h 24 #include "attestation/common/attestation_interface.h"
26 namespace attestation { namespace
56 } // namespace attestation
mock_crypto_utility.cc 17 #include "attestation/common/mock_crypto_utility.h"
38 namespace attestation { namespace
54 } // namespace attestation
print_common_proto.h 24 #include "attestation/common/common.pb.h"
26 namespace attestation { namespace
48 } // namespace attestation
interface.proto 21 package attestation;
57 // intermediate authorities, in order. The Google Attestation CA root
75 // The signature of certify_info by the Attestation Key.
99 // The attestation public key (X.509/DER SubjectPublicKeyInfo).
101 // The attestation public key in TPM_PUBKEY form.
103 // The attestation key certificate.
105 // A quote of PCR0 at the time of attestation key creation.
107 // A quote of PCR1 at the time of attestation key creation.
119 // The decrypted attestation key certificate.
140 // The signature of certify_info by the Attestation Key
    [all...]
tpm_utility.h 22 #include "attestation/common/interface.pb.h"
24 namespace attestation { namespace
31 // Returns true iff the TPM is enabled, owned, and ready for attestation.
34 // Activates an attestation identity key. Effectively this decrypts a
51 // storage root key. The new key will be certified with the attestation
95 } // namespace attestation
mock_crypto_utility.h 20 #include "attestation/common/crypto_utility.h"
26 namespace attestation { namespace
65 } // namespace attestation
mock_tpm_utility.cc 17 #include "attestation/common/mock_tpm_utility.h"
30 *out = attestation::MockTpmUtility::Transform(method_, in);
57 namespace attestation { namespace
83 } // namespace attestation
  /frameworks/base/docs/html/training/articles/
security-key-attestation.jd 1 page.title=Key Attestation
3 page.keywords="security", "TEE", "hardware-backed", "keystore", "certificate", "key attestation"
18 Key Attestation gives you more confidence that the keys you use in your app
21 interpret the schema of the attestation certificate's extension data.
26 level 24) support hardware-level key attestation; all other devices running
27 Android 7.0 use software-level key attestation instead. Before you verify the
30 attestation. To do so, you should check that the attestation certificate chain
31 contains a root certificate that is signed by the Google attestation root key
42 During key attestation, you specify the alias of a key pair. The attestatio
    [all...]
  /system/keymaster/
attestation_record.h 29 * The OID for Android attestation records. For the curious, it breaks down as follows:
40 * 17 = Android attestation extension.

Completed in 312 milliseconds

1 2 3 4 5