/system/tpm/attestation/server/ |
pkcs11_key_store.h | 20 #include "attestation/server/key_store.h" 29 namespace attestation { namespace 120 } // namespace attestation
|
dbus_service_test.cc | 26 #include "attestation/common/dbus_interface.h" 27 #include "attestation/common/mock_attestation_interface.h" 28 #include "attestation/server/dbus_service.h" 37 namespace attestation { namespace 381 } // namespace attestation
|
attestation_service_test.cc | 30 #include "attestation/common/attestation_ca.pb.h" 31 #include "attestation/common/mock_crypto_utility.h" 32 #include "attestation/common/mock_tpm_utility.h" 33 #include "attestation/server/attestation_service.h" 34 #include "attestation/server/mock_database.h" 35 #include "attestation/server/mock_key_store.h" 46 namespace attestation { namespace 71 // Setup a fake Attestation CA for success by default. [all...] |
/prebuilts/vndk/v27/arm/arch-arm-armv7-a-neon/shared/vndk-core/ |
libsoftkeymasterdevice.so | |
/prebuilts/vndk/v27/arm64/arch-arm-armv7-a-neon/shared/vndk-core/ |
libsoftkeymasterdevice.so | |
/prebuilts/vndk/v27/x86/arch-x86-x86/shared/vndk-core/ |
libsoftkeymasterdevice.so | |
/prebuilts/vndk/v27/x86_64/arch-x86-x86_64/shared/vndk-core/ |
libsoftkeymasterdevice.so | |
/frameworks/base/services/core/java/com/android/server/security/ |
KeyAttestationApplicationIdProviderService.java | 36 * the initiating application of a key attestation procedure.
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Core/Dxe/ArchProtocol/Security/ |
Security.h | 62 flash upon failure to authenticate, attestation logging for all signed drivers,
123 attestation logging, and other exception operations.
|
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Security.h | 45 flash upon failure to authenticate, attestation logging for all signed drivers,
95 /// attestation logging, and other exception operations.
|
/external/autotest/client/site_tests/security_SandboxedServices/ |
baseline | 60 attestationd,attestation,attestation,No,No,No,No
|
/external/tpm2/ |
Attest_spt.c | 96 // If we move the data to the attestation structure, then we will not use 147 // Attestation command may cause the orderlyState to be cleared due to
|
/system/iot/attestation/atap/libatap/ |
atap_ops.h | 58 /* Writes the |key_type| attestation |key| and |cert_chain|. The data 69 * for attestation. The keypair to be certified may either be generated
|
/compatibility/cdd/9_security-model/ |
9_11_keys-and-credentials.md | 35 * [C-1-4] MUST support key attestation where the attestation signing key is 37 attestation signing keys MUST be shared across large enough number of devices to 39 requirement is to share the same attestation key unless at least 100,000 units 45 hardware-backed keystore and support the key attestation, unless it declares
|
/frameworks/base/core/java/android/security/ |
ConfirmationPrompt.java | 44 * CONFIRMATION tag} set. Device attestation, 49 * attestation to the <i>Relying Party</i>. 52 * next one in the chain, ending with <code>Kpub</code>, and that the attestation certificate
|
/system/iot/attestation/partner-tools/ |
provision-test.py | 18 """Test that implements the Android Things Attestation Provisioning protocol. 20 Enables testing of the device side of the Android Things Attestation 102 and issues or certifies attestation keys as applicable. The CA Response
|
/system/keymaster/km_openssl/ |
attestation_record.cpp | 362 // Construct an ASN1.1 DER-encoded attestation record containing the values from sw_enforced and 447 // The KeymasterContext implementation does not support device ID attestation. Bail out if 448 // device ID attestation is being attempted. 706 // Parse the DER-encoded attestation record, placing the results in keymaster_version,
|
/frameworks/base/keystore/java/android/security/ |
KeyChain.java | 261 * A key attestation challenge was provided to {@link #generateKeyPair}, but it shouldn't 298 * Attestation challenge missing when calling {@link #attestKey} 304 * The caller requested Device ID attestation when calling {@link #attestKey}, but has no 311 * The underlying hardware does not support Device ID attestation or cannot attest to the 313 * to get attestation records on the device.
|
/hardware/interfaces/keymaster/4.0/ |
IKeymasterDevice.hal | 37 * o Attestation to the presence and configuration of asymmetric keys. 286 * during each factory reset. It relies on use of the factory-installed attestation keys to 297 * 2. T sends K1_pub to S, signed with T's attestation key. 300 * 5. S sends {K1_pub, K2_pub}, to T, signed with S's attestation key. [all...] |
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 144 Log.e(TAG, "Key generation request should not include an Attestation challenge."); 181 Log.e(TAG, String.format("Missing attestation challenge for alias %s", alias)); 190 Log.e(TAG, "Failed collecting attestation data", e);
|
/system/tpm/attestation/client/ |
dbus_proxy_test.cc | 24 #include "attestation/client/dbus_proxy.h" 31 namespace attestation { namespace 415 } // namespace attestation
|
/system/tpm/attestation/common/ |
crypto_utility_impl.cc | 17 #include "attestation/common/crypto_utility_impl.h" 58 namespace attestation { namespace 471 } // namespace attestation
|
/external/autotest/client/site_tests/security_StatefulPermissions/ |
security_StatefulPermissions.py | 26 "attestation": ["/unencrypted/preserve", 27 "/unencrypted/preserve/attestation.epb"],
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/latest/ |
AndroidManifest.xml | 32 <!-- Needed to read the serial number during Device ID attestation tests -->
|
/external/autotest/server/site_tests/platform_InitLoginPerfServer/ |
platform_InitLoginPerfServer.py | 29 'name': 'attestation-duration',
|