/system/tpm/attestation/server/ |
org.chromium.Attestation.conf | 5 <policy user="attestation"> 6 <allow own="org.chromium.Attestation" /> 7 <allow send_destination="org.chromium.Attestation" /> 10 <allow send_destination="org.chromium.Attestation" /> 12 <deny send_destination="org.chromium.Attestation"
|
main.cc | 29 #include "attestation/common/dbus_interface.h" 30 #include "attestation/server/attestation_service.h" 31 #include "attestation/server/dbus_service.h" 38 const char kAttestationUser[] = "attestation"; 39 const char kAttestationGroup[] = "attestation"; 49 << "Error getting attestation uid and gid."; 60 << "AttestationDaemon was not able to drop to attestation user."; 62 << "AttestationDaemon was not able to drop to attestation group."; 72 : brillo::DBusServiceDaemon(attestation::kAttestationServiceName) { 73 attestation_service_.reset(new attestation::AttestationService) [all...] |
mock_database.cc | 17 #include "attestation/server/mock_database.h" 22 namespace attestation { namespace 33 } // namespace attestation
|
mock_database.h | 20 #include "attestation/server/database.h" 24 namespace attestation { namespace 40 } // namespace attestation
|
database.h | 20 #include "attestation/common/database.pb.h" 22 namespace attestation { namespace 24 // Manages a persistent database of attestation-related data. 44 } // namespace attestation
|
attestation_service.h | 20 #include "attestation/common/attestation_interface.h" 32 #include "attestation/common/crypto_utility.h" 33 #include "attestation/common/crypto_utility_impl.h" 34 #include "attestation/common/tpm_utility.h" 35 #include "attestation/common/tpm_utility_v1.h" 36 #include "attestation/server/database.h" 37 #include "attestation/server/database_impl.h" 38 #include "attestation/server/key_store.h" 39 #include "attestation/server/pkcs11_key_store.h" 41 namespace attestation { namespace [all...] |
mock_key_store.cc | 17 #include "attestation/server/mock_key_store.h" 22 namespace attestation { namespace 35 } // namespace attestation
|
database_impl.cc | 17 #include "attestation/server/database_impl.h" 38 "/mnt/stateful_partition/unencrypted/preserve/attestation.epb"; 48 namespace attestation { namespace 65 LOG(WARNING) << "Creating new attestation database."; 90 LOG(INFO) << "Loading attestation database."; 104 LOG(WARNING) << "Attempting to fix permissions on attestation database."; 108 PLOG(ERROR) << "Failed to read attestation database"; 173 LOG(ERROR) << "Attestation: Failed to encrypt database."; 182 LOG(ERROR) << "Attestation: Could not unseal decryption key."; 187 LOG(ERROR) << "Attestation: Failed to decrypt database." [all...] |
mock_key_store.h | 20 #include "attestation/server/key_store.h" 27 namespace attestation { namespace 58 } // namespace attestation
|
database_impl.h | 20 #include "attestation/server/database.h" 28 #include "attestation/common/crypto_utility.h" 30 namespace attestation { namespace 89 } // namespace attestation
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 19 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_SOFTWARE; 20 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT; 85 * Tests for Android KeysStore attestation. 174 fail("Attestation challenges larger than 128 bytes should be rejected"); 205 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID)); 269 fail("Attestation challenges larger than 128 bytes should be rejected"); 299 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID)); 395 Attestation attestation = new Attestation(attestationCert) local 449 Attestation attestation = new Attestation(attestationCert); local [all...] |
Attestation.java | 28 * Parses an attestation certificate and provides an easy-to-use interface for examining the 31 public class Attestation { 56 * Constructs an {@code Attestation} object from the provided {@link X509Certificate}, 57 * extracting the attestation data from the attestation extension. 60 * attestation extension. 62 public Attestation(X509Certificate x509Cert) throws CertificateParsingException { 71 Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.ATTESTATION_CHALLENGE_INDEX)); 73 uniqueId = Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.UNIQUE_ID_INDEX));
|
/external/autotest/client/site_tests/platform_Attestation/ |
control | 7 PURPOSE = "Tests the TPM attestation enrollment process." 8 CRITERIA = "Fails if attestation enrollment fails." 15 This test verifies that the TPM attestation enrollment process works correctly.
|
/system/tpm/attestation/client/ |
dbus_proxy.cc | 17 #include "attestation/client/dbus_proxy.h" 22 #include "attestation/common/dbus_interface.h" 32 namespace attestation { namespace 46 attestation::kAttestationServiceName, 47 dbus::ObjectPath(attestation::kAttestationServicePath)); 62 attestation::kAttestationInterface, 63 attestation::kCreateGoogleAttestedKey, 79 attestation::kAttestationInterface, 80 attestation::kGetKeyInfo, 96 attestation::kAttestationInterface [all...] |
dbus_proxy.h | 20 #include "attestation/common/attestation_interface.h" 28 namespace attestation { namespace 32 // std::unique_ptr<AttestationInterface> attestation = new DBusProxy(); 33 // attestation->Initialize(); 34 // attestation->CreateGoogleAttestedKey(...); 75 } // namespace attestation
|
/system/tpm/attestation/common/ |
dbus_interface.h | 20 namespace attestation { namespace 23 constexpr char kAttestationInterface[] = "org.chromium.Attestation"; 24 constexpr char kAttestationServicePath[] = "/org/chromium/Attestation"; 25 constexpr char kAttestationServiceName[] = "org.chromium.Attestation"; 27 // Methods exported by attestation. 38 } // namespace attestation
|
mock_attestation_interface.h | 24 #include "attestation/common/attestation_interface.h" 26 namespace attestation { namespace 56 } // namespace attestation
|
mock_crypto_utility.cc | 17 #include "attestation/common/mock_crypto_utility.h" 38 namespace attestation { namespace 54 } // namespace attestation
|
print_common_proto.h | 24 #include "attestation/common/common.pb.h" 26 namespace attestation { namespace 48 } // namespace attestation
|
interface.proto | 21 package attestation; 57 // intermediate authorities, in order. The Google Attestation CA root 75 // The signature of certify_info by the Attestation Key. 99 // The attestation public key (X.509/DER SubjectPublicKeyInfo). 101 // The attestation public key in TPM_PUBKEY form. 103 // The attestation key certificate. 105 // A quote of PCR0 at the time of attestation key creation. 107 // A quote of PCR1 at the time of attestation key creation. 119 // The decrypted attestation key certificate. 140 // The signature of certify_info by the Attestation Key [all...] |
tpm_utility.h | 22 #include "attestation/common/interface.pb.h" 24 namespace attestation { namespace 31 // Returns true iff the TPM is enabled, owned, and ready for attestation. 34 // Activates an attestation identity key. Effectively this decrypts a 51 // storage root key. The new key will be certified with the attestation 95 } // namespace attestation
|
mock_crypto_utility.h | 20 #include "attestation/common/crypto_utility.h" 26 namespace attestation { namespace 65 } // namespace attestation
|
mock_tpm_utility.cc | 17 #include "attestation/common/mock_tpm_utility.h" 30 *out = attestation::MockTpmUtility::Transform(method_, in); 57 namespace attestation { namespace 83 } // namespace attestation
|
/frameworks/base/docs/html/training/articles/ |
security-key-attestation.jd | 1 page.title=Key Attestation 3 page.keywords="security", "TEE", "hardware-backed", "keystore", "certificate", "key attestation" 18 Key Attestation gives you more confidence that the keys you use in your app 21 interpret the schema of the attestation certificate's extension data. 26 level 24) support hardware-level key attestation; all other devices running 27 Android 7.0 use software-level key attestation instead. Before you verify the 30 attestation. To do so, you should check that the attestation certificate chain 31 contains a root certificate that is signed by the Google attestation root key 42 During key attestation, you specify the alias of a key pair. The attestatio [all...] |
/system/keymaster/ |
attestation_record.h | 29 * The OID for Android attestation records. For the curious, it breaks down as follows: 40 * 17 = Android attestation extension.
|