/system/tpm/attestation/server/ |
org.chromium.Attestation.conf | 5 <policy user="attestation"> 6 <allow own="org.chromium.Attestation" /> 7 <allow send_destination="org.chromium.Attestation" /> 10 <allow send_destination="org.chromium.Attestation" /> 12 <deny send_destination="org.chromium.Attestation"
|
main.cc | 29 #include "attestation/common/dbus_interface.h" 30 #include "attestation/server/attestation_service.h" 31 #include "attestation/server/dbus_service.h" 38 const char kAttestationUser[] = "attestation"; 39 const char kAttestationGroup[] = "attestation"; 48 << "Error getting attestation uid and gid."; 59 << "AttestationDaemon was not able to drop to attestation user."; 61 << "AttestationDaemon was not able to drop to attestation group."; 71 : brillo::DBusServiceDaemon(attestation::kAttestationServiceName) { 72 attestation_service_.reset(new attestation::AttestationService) [all...] |
mock_database.cc | 17 #include "attestation/server/mock_database.h" 22 namespace attestation { namespace 33 } // namespace attestation
|
mock_database.h | 20 #include "attestation/server/database.h" 24 namespace attestation { namespace 40 } // namespace attestation
|
database.h | 20 #include "attestation/common/database.pb.h" 22 namespace attestation { namespace 24 // Manages a persistent database of attestation-related data. 44 } // namespace attestation
|
attestation_service.h | 20 #include "attestation/common/attestation_interface.h" 32 #include "attestation/common/crypto_utility.h" 33 #include "attestation/common/crypto_utility_impl.h" 34 #include "attestation/common/tpm_utility.h" 35 #include "attestation/common/tpm_utility_v1.h" 36 #include "attestation/server/database.h" 37 #include "attestation/server/database_impl.h" 38 #include "attestation/server/key_store.h" 39 #include "attestation/server/pkcs11_key_store.h" 41 namespace attestation { namespace [all...] |
mock_key_store.cc | 17 #include "attestation/server/mock_key_store.h" 22 namespace attestation { namespace 35 } // namespace attestation
|
database_impl.cc | 17 #include "attestation/server/database_impl.h" 38 "/mnt/stateful_partition/unencrypted/preserve/attestation.epb"; 48 namespace attestation { namespace 65 LOG(WARNING) << "Creating new attestation database."; 90 LOG(INFO) << "Loading attestation database."; 104 LOG(WARNING) << "Attempting to fix permissions on attestation database."; 108 PLOG(ERROR) << "Failed to read attestation database"; 173 LOG(ERROR) << "Attestation: Failed to encrypt database."; 182 LOG(ERROR) << "Attestation: Could not unseal decryption key."; 187 LOG(ERROR) << "Attestation: Failed to decrypt database." [all...] |
mock_key_store.h | 20 #include "attestation/server/key_store.h" 27 namespace attestation { namespace 63 } // namespace attestation
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 19 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_SOFTWARE; 20 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT; 92 * Tests for Android KeysStore attestation. 182 fail("Attestation challenges larger than 128 bytes should be rejected"); 213 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID)); 230 fail("Attestation should have failed."); 232 // Attestation is expected to fail because of lack of permissions. 300 fail("Attestation challenges larger than 128 bytes should be rejected"); 330 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID)); 432 Attestation attestation = new Attestation(attestationCert) local 486 Attestation attestation = new Attestation(attestationCert); local [all...] |
/external/autotest/client/site_tests/platform_Attestation/ |
control | 7 PURPOSE = "Tests the TPM attestation enrollment process." 8 CRITERIA = "Fails if attestation enrollment fails." 15 This test verifies that the TPM attestation enrollment process works correctly.
|
/system/tpm/attestation/client/ |
dbus_proxy.cc | 17 #include "attestation/client/dbus_proxy.h" 22 #include "attestation/common/dbus_interface.h" 32 namespace attestation { namespace 46 attestation::kAttestationServiceName, 47 dbus::ObjectPath(attestation::kAttestationServicePath)); 60 kDBusTimeoutMS, object_proxy_, attestation::kAttestationInterface, 61 attestation::kCreateGoogleAttestedKey, callback, base::Bind(on_error), 73 kDBusTimeoutMS, object_proxy_, attestation::kAttestationInterface, 74 attestation::kGetKeyInfo, callback, base::Bind(on_error), request); 85 kDBusTimeoutMS, object_proxy_, attestation::kAttestationInterface [all...] |
dbus_proxy.h | 20 #include "attestation/common/attestation_interface.h" 28 namespace attestation { namespace 32 // std::unique_ptr<AttestationInterface> attestation = new DBusProxy(); 33 // attestation->Initialize(); 34 // attestation->CreateGoogleAttestedKey(...); 75 } // namespace attestation
|
/system/tpm/attestation/common/ |
dbus_interface.h | 20 namespace attestation { namespace 23 constexpr char kAttestationInterface[] = "org.chromium.Attestation"; 24 constexpr char kAttestationServicePath[] = "/org/chromium/Attestation"; 25 constexpr char kAttestationServiceName[] = "org.chromium.Attestation"; 27 // Methods exported by attestation. 38 } // namespace attestation
|
mock_attestation_interface.h | 24 #include "attestation/common/attestation_interface.h" 26 namespace attestation { namespace 58 } // namespace attestation
|
mock_crypto_utility.cc | 17 #include "attestation/common/mock_crypto_utility.h" 38 namespace attestation { namespace 54 } // namespace attestation
|
print_common_proto.h | 24 #include "attestation/common/common.pb.h" 26 namespace attestation { namespace 48 } // namespace attestation
|
interface.proto | 21 package attestation; 57 // intermediate authorities, in order. The Google Attestation CA root 75 // The signature of certify_info by the Attestation Key. 99 // The attestation public key (X.509/DER SubjectPublicKeyInfo). 101 // The attestation public key in TPM_PUBKEY form. 103 // The attestation key certificate. 105 // A quote of PCR0 at the time of attestation key creation. 107 // A quote of PCR1 at the time of attestation key creation. 119 // The decrypted attestation key certificate. 140 // The signature of certify_info by the Attestation Key [all...] |
tpm_utility.h | 22 #include "attestation/common/interface.pb.h" 24 namespace attestation { namespace 31 // Returns true iff the TPM is enabled, owned, and ready for attestation. 34 // Activates an attestation identity key. Effectively this decrypts a 51 // storage root key. The new key will be certified with the attestation 95 } // namespace attestation
|
mock_crypto_utility.h | 20 #include "attestation/common/crypto_utility.h" 26 namespace attestation { namespace 69 } // namespace attestation
|
mock_tpm_utility.cc | 17 #include "attestation/common/mock_tpm_utility.h" 30 *out = attestation::MockTpmUtility::Transform(method_, in); 57 namespace attestation { namespace 83 } // namespace attestation
|
/frameworks/base/keystore/java/android/security/ |
AttestedKeyPair.java | 27 * keys generated by Keystore and owned by KeyChain, as well as an attestation 47 * Returns the generated key pair associated with the attestation record 55 * Returns the attestation record for the key pair in this instance. 57 * The attestation record is a chain of certificates. The leaf certificate links to the public 59 * hardware, and if the secure hardware supports attestation, the leaf certificate will be 63 * The attestation record could be for properties of the key, or include device identifiers. 66 * and <a href="https://developer.android.com/training/articles/security-key-attestation.html"> 67 * Key Attestation</a> for the format of the attestation record inside the certificate.
|
/frameworks/base/keystore/java/android/security/keystore/ |
AttestationUtils.java | 86 throw new KeyAttestationException("Attestation certificate chain contained " 105 // Verify that device ID attestation types are provided. 114 * Prepares Keymaster Arguments with attestation data. 120 // Check method arguments, retrieve requested device IDs and prepare attestation arguments. 122 throw new NullPointerException("Missing attestation challenge"); 127 // attestation record. 185 * Performs attestation of the device's identifiers. This method returns a certificate chain 187 * manufacturer, model, brand, device and product are always also included in the attestation. 188 * If the device supports attestation in secure hardware, the chain will be rooted at a 190 * <a href="https://developer.android.com/training/articles/security-key-attestation.html" [all...] |
/cts/tests/security/src/android/keystore/cts/ |
Attestation.java | 28 * Parses an attestation certificate and provides an easy-to-use interface for examining the 31 public class Attestation { 56 * Constructs an {@code Attestation} object from the provided {@link X509Certificate}, 57 * extracting the attestation data from the attestation extension. 60 * attestation extension. 62 public Attestation(X509Certificate x509Cert) throws CertificateParsingException { 71 Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.ATTESTATION_CHALLENGE_INDEX)); 73 uniqueId = Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.UNIQUE_ID_INDEX));
|
/system/security/keystore/ |
keystore_attestation_id.h | 50 * Gathers the attestation id for the application determined by uid by querying the package manager 51 * As of this writing uids can be shared in android, which is why the asn.1 encoded attestation 55 * @returns the asn.1 encoded attestation application id or an error code. Check the result with
|