/system/tpm/attestation/common/ |
tpm_utility_v1.h | 20 #include "attestation/common/tpm_utility.h" 28 namespace attestation { namespace 118 } // namespace attestation
|
crypto_utility_impl_test.cc | 26 #include "attestation/common/crypto_utility_impl.h" 27 #include "attestation/common/mock_tpm_utility.h" 56 namespace attestation { namespace 236 } // namespace attestation
|
common.proto | 7 package attestation; 21 // Enumerates various certificate profiles supported by the Attestation CA.
|
print_common_proto.cc | 19 #include "attestation/common/print_common_proto.h" 26 namespace attestation { namespace 238 } // namespace attestation
|
/system/tpm/attestation/server/ |
key_store.h | 24 #include "attestation/common/common.pb.h" 26 namespace attestation { namespace 80 } // namespace attestation
|
attestation_service.cc | 17 #include "attestation/server/attestation_service.h" 28 #include "attestation/common/attestation_ca.pb.h" 29 #include "attestation/common/database.pb.h" 30 #include "attestation/server/database_impl.h" 44 namespace attestation { namespace 50 LOG(INFO) << "Attestation service started."; 51 worker_thread_.reset(new base::Thread("Attestation Service Worker")); 98 LOG(ERROR) << "Attestation: TPM is not ready."; 490 LOG(ERROR) << __func__ << ": Enrollment is not possible, attestation data " 543 LOG(INFO) << "Attestation: Enrollment complete." [all...] |
dbus_service.cc | 17 #include "attestation/server/dbus_service.h" 26 #include "attestation/common/dbus_interface.h" 30 namespace attestation { namespace 230 } // namespace attestation
|
/device/linaro/bootloader/edk2/MdePkg/Include/Ppi/ |
LoadFile.h | 39 @param AuthenticationState On exit, points to the attestation
41 or 0 if no attestation was performed.
|
/external/tpm2/ |
CertifyCreation.c | 59 // Attestation type 66 // Sign attestation structure. A NULL signature will be returned if
|
GetCommandAuditDigest.c | 50 // Attestation type 63 // Sign attestation structure. A NULL signature will be returned if
|
GetSessionAuditDigest.c | 62 // Attestation type 74 // Sign attestation structure. A NULL signature will be returned if
|
GetTime.c | 50 // Attestation type 62 // Sign attestation structure. A NULL signature will be returned if
|
Quote.c | 48 // Attestation type 68 // Sign attestation structure. A NULL signature will be returned if
|
/frameworks/base/core/java/android/content/pm/ |
Signature.aidl | 20 /* For the key attestation application id provider service we needed a native implementation
|
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternChecker.java | 47 * @param attestation The attestation that the challenge was verified, or null. 49 * the call. Only non-0 if attestation is null. 51 void onVerified(byte[] attestation, int throttleTimeoutMs);
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyAttestationException.java | 21 * the resulting attestation record.
|
WrappedKeyEntry.java | 54 * with importKey. See <a href="https://developer.android.com/training/articles/security-key-attestation.html#certificate_schema">Key Attestation</a> for the AuthorizationList format.
|
/system/iot/attestation/at-factory-tool/ |
README | 5 https://android.googlesource.com/platform/system/iot/attestation/+/master/NOTICE
|
/system/iot/attestation/atap/libatap/ |
libatap.h | 25 * Android Things Attestation Provisioning reference library.
|
/hardware/interfaces/keymaster/4.0/ |
types.hal | 206 * Tag::INCLUDE_UNIQUE_ID is specified during key generation to indicate that an attestation 549 * in the key characteristics. It exists only to define the tag for use in the attestation 603 * in the attestation record. 605 * When a key with Tag::INCLUDE_UNIQUE_ID is attested, the unique ID is added to the attestation 636 * which must place the value in the KeyDescription SEQUENCE of the attestation extension. See 641 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /* Used to provide challenge in attestation */ 662 * copy the tag value into the attestation record. The DER-encoded string must not exceed 1 KiB [all...] |
/hardware/libhardware/include/hardware/ |
keymaster_defs.h | 71 KM_TAG_INCLUDE_UNIQUE_ID = KM_BOOL | 202, /* If true, attestation certificates for this key 138 KM_TAG_UNIQUE_ID = KM_BYTES | 707, /* Used to provide unique ID in attestation */ 139 KM_TAG_ATTESTATION_CHALLENGE = KM_BYTES | 708, /* Used to provide challenge in attestation */ 142 * a key attestation */ 144 included in attestation */ 146 included in attestation */ 148 be included in attestation */ 150 be included in attestation */ 152 included in attestation */ 154 included in attestation */ [all...] |
/external/perfetto/docs/ |
security-model.md | 53 **Attestation of trace contents** 66 to perform offline attestation of the contents of the trace.
|
/frameworks/base/core/java/android/service/gatekeeper/ |
IGateKeeperService.aidl | 59 * authentication attestation. 63 * @return a VerifyResponse with an attestation, or null on failure.
|
/hardware/interfaces/keymaster/3.0/ |
IKeymasterDevice.hal | 43 * key attestation certificates, signed with a key injected in a secure 45 * later must support hardware attestation. 168 * https://developer.android.com/training/articles/security-key-attestation.html. 173 * @param attestParams Parameters for the attestation, notably Tag::ATTESTATION_CHALLENGE. 222 * Destroys knowledge of the device's ids. This prevents all device id attestation in the 226 * Device id attestation may be provided only if this method is fully implemented, allowing the 227 * user to permanently disable device id attestation. If this cannot be guaranteed, the device 230 * This is a NOP if device id attestation is not supported.
|
/frameworks/base/core/java/android/security/keymaster/ |
KeyAttestationPackageInfo.java | 26 * key attestation. It is part of the KeyAttestationApplicationId, which is used by
|