HomeSort by relevance Sort by last modified time
    Searched full:attestation (Results 1 - 25 of 146) sorted by null

1 2 3 4 5 6

  /system/tpm/attestation/server/
org.chromium.Attestation.conf 5 <policy user="attestation">
6 <allow own="org.chromium.Attestation" />
7 <allow send_destination="org.chromium.Attestation" />
10 <allow send_destination="org.chromium.Attestation" />
12 <deny send_destination="org.chromium.Attestation"
main.cc 29 #include "attestation/common/dbus_interface.h"
30 #include "attestation/server/attestation_service.h"
31 #include "attestation/server/dbus_service.h"
38 const char kAttestationUser[] = "attestation";
39 const char kAttestationGroup[] = "attestation";
48 << "Error getting attestation uid and gid.";
59 << "AttestationDaemon was not able to drop to attestation user.";
61 << "AttestationDaemon was not able to drop to attestation group.";
71 : brillo::DBusServiceDaemon(attestation::kAttestationServiceName) {
72 attestation_service_.reset(new attestation::AttestationService)
    [all...]
mock_database.cc 17 #include "attestation/server/mock_database.h"
22 namespace attestation { namespace
33 } // namespace attestation
mock_database.h 20 #include "attestation/server/database.h"
24 namespace attestation { namespace
40 } // namespace attestation
database.h 20 #include "attestation/common/database.pb.h"
22 namespace attestation { namespace
24 // Manages a persistent database of attestation-related data.
44 } // namespace attestation
attestation_service.h 20 #include "attestation/common/attestation_interface.h"
32 #include "attestation/common/crypto_utility.h"
33 #include "attestation/common/crypto_utility_impl.h"
34 #include "attestation/common/tpm_utility.h"
35 #include "attestation/common/tpm_utility_v1.h"
36 #include "attestation/server/database.h"
37 #include "attestation/server/database_impl.h"
38 #include "attestation/server/key_store.h"
39 #include "attestation/server/pkcs11_key_store.h"
41 namespace attestation { namespace
    [all...]
mock_key_store.cc 17 #include "attestation/server/mock_key_store.h"
22 namespace attestation { namespace
35 } // namespace attestation
database_impl.cc 17 #include "attestation/server/database_impl.h"
38 "/mnt/stateful_partition/unencrypted/preserve/attestation.epb";
48 namespace attestation { namespace
65 LOG(WARNING) << "Creating new attestation database.";
90 LOG(INFO) << "Loading attestation database.";
104 LOG(WARNING) << "Attempting to fix permissions on attestation database.";
108 PLOG(ERROR) << "Failed to read attestation database";
173 LOG(ERROR) << "Attestation: Failed to encrypt database.";
182 LOG(ERROR) << "Attestation: Could not unseal decryption key.";
187 LOG(ERROR) << "Attestation: Failed to decrypt database."
    [all...]
mock_key_store.h 20 #include "attestation/server/key_store.h"
27 namespace attestation { namespace
63 } // namespace attestation
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyAttestationTest.java 19 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_SOFTWARE;
20 import static android.keystore.cts.Attestation.KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT;
92 * Tests for Android KeysStore attestation.
182 fail("Attestation challenges larger than 128 bytes should be rejected");
213 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID));
230 fail("Attestation should have failed.");
232 // Attestation is expected to fail because of lack of permissions.
300 fail("Attestation challenges larger than 128 bytes should be rejected");
330 assertNull(attestationCert.getExtensionValue(Attestation.KEY_DESCRIPTION_OID));
432 Attestation attestation = new Attestation(attestationCert) local
486 Attestation attestation = new Attestation(attestationCert); local
    [all...]
  /external/autotest/client/site_tests/platform_Attestation/
control 7 PURPOSE = "Tests the TPM attestation enrollment process."
8 CRITERIA = "Fails if attestation enrollment fails."
15 This test verifies that the TPM attestation enrollment process works correctly.
  /system/tpm/attestation/client/
dbus_proxy.cc 17 #include "attestation/client/dbus_proxy.h"
22 #include "attestation/common/dbus_interface.h"
32 namespace attestation { namespace
46 attestation::kAttestationServiceName,
47 dbus::ObjectPath(attestation::kAttestationServicePath));
60 kDBusTimeoutMS, object_proxy_, attestation::kAttestationInterface,
61 attestation::kCreateGoogleAttestedKey, callback, base::Bind(on_error),
73 kDBusTimeoutMS, object_proxy_, attestation::kAttestationInterface,
74 attestation::kGetKeyInfo, callback, base::Bind(on_error), request);
85 kDBusTimeoutMS, object_proxy_, attestation::kAttestationInterface
    [all...]
dbus_proxy.h 20 #include "attestation/common/attestation_interface.h"
28 namespace attestation { namespace
32 // std::unique_ptr<AttestationInterface> attestation = new DBusProxy();
33 // attestation->Initialize();
34 // attestation->CreateGoogleAttestedKey(...);
75 } // namespace attestation
  /system/tpm/attestation/common/
dbus_interface.h 20 namespace attestation { namespace
23 constexpr char kAttestationInterface[] = "org.chromium.Attestation";
24 constexpr char kAttestationServicePath[] = "/org/chromium/Attestation";
25 constexpr char kAttestationServiceName[] = "org.chromium.Attestation";
27 // Methods exported by attestation.
38 } // namespace attestation
mock_attestation_interface.h 24 #include "attestation/common/attestation_interface.h"
26 namespace attestation { namespace
58 } // namespace attestation
mock_crypto_utility.cc 17 #include "attestation/common/mock_crypto_utility.h"
38 namespace attestation { namespace
54 } // namespace attestation
print_common_proto.h 24 #include "attestation/common/common.pb.h"
26 namespace attestation { namespace
48 } // namespace attestation
interface.proto 21 package attestation;
57 // intermediate authorities, in order. The Google Attestation CA root
75 // The signature of certify_info by the Attestation Key.
99 // The attestation public key (X.509/DER SubjectPublicKeyInfo).
101 // The attestation public key in TPM_PUBKEY form.
103 // The attestation key certificate.
105 // A quote of PCR0 at the time of attestation key creation.
107 // A quote of PCR1 at the time of attestation key creation.
119 // The decrypted attestation key certificate.
140 // The signature of certify_info by the Attestation Key
    [all...]
tpm_utility.h 22 #include "attestation/common/interface.pb.h"
24 namespace attestation { namespace
31 // Returns true iff the TPM is enabled, owned, and ready for attestation.
34 // Activates an attestation identity key. Effectively this decrypts a
51 // storage root key. The new key will be certified with the attestation
95 } // namespace attestation
mock_crypto_utility.h 20 #include "attestation/common/crypto_utility.h"
26 namespace attestation { namespace
69 } // namespace attestation
mock_tpm_utility.cc 17 #include "attestation/common/mock_tpm_utility.h"
30 *out = attestation::MockTpmUtility::Transform(method_, in);
57 namespace attestation { namespace
83 } // namespace attestation
  /frameworks/base/keystore/java/android/security/
AttestedKeyPair.java 27 * keys generated by Keystore and owned by KeyChain, as well as an attestation
47 * Returns the generated key pair associated with the attestation record
55 * Returns the attestation record for the key pair in this instance.
57 * The attestation record is a chain of certificates. The leaf certificate links to the public
59 * hardware, and if the secure hardware supports attestation, the leaf certificate will be
63 * The attestation record could be for properties of the key, or include device identifiers.
66 * and <a href="https://developer.android.com/training/articles/security-key-attestation.html">
67 * Key Attestation</a> for the format of the attestation record inside the certificate.
  /frameworks/base/keystore/java/android/security/keystore/
AttestationUtils.java 86 throw new KeyAttestationException("Attestation certificate chain contained "
105 // Verify that device ID attestation types are provided.
114 * Prepares Keymaster Arguments with attestation data.
120 // Check method arguments, retrieve requested device IDs and prepare attestation arguments.
122 throw new NullPointerException("Missing attestation challenge");
127 // attestation record.
185 * Performs attestation of the device's identifiers. This method returns a certificate chain
187 * manufacturer, model, brand, device and product are always also included in the attestation.
188 * If the device supports attestation in secure hardware, the chain will be rooted at a
190 * <a href="https://developer.android.com/training/articles/security-key-attestation.html"
    [all...]
  /cts/tests/security/src/android/keystore/cts/
Attestation.java 28 * Parses an attestation certificate and provides an easy-to-use interface for examining the
31 public class Attestation {
56 * Constructs an {@code Attestation} object from the provided {@link X509Certificate},
57 * extracting the attestation data from the attestation extension.
60 * attestation extension.
62 public Attestation(X509Certificate x509Cert) throws CertificateParsingException {
71 Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.ATTESTATION_CHALLENGE_INDEX));
73 uniqueId = Asn1Utils.getByteArrayFromAsn1(seq.getObjectAt(Attestation.UNIQUE_ID_INDEX));
  /system/security/keystore/
keystore_attestation_id.h 50 * Gathers the attestation id for the application determined by uid by querying the package manager
51 * As of this writing uids can be shared in android, which is why the asn.1 encoded attestation
55 * @returns the asn.1 encoded attestation application id or an error code. Check the result with

Completed in 490 milliseconds

1 2 3 4 5 6