Home
last modified time | relevance | path

Searched refs:device_locked (Results 1 – 17 of 17) sorted by relevance

/aosp12/system/keymaster/tests/
H A Dattestation_record_test.cpp56 params.device_locked = true; in GetVerifiedBootParams()
62 keymaster_verified_boot_t verified_boot_state, bool device_locked) { in VerifyRootOfTrust() argument
67 EXPECT_TRUE(device_locked); in VerifyRootOfTrust()
168 bool device_locked; in TEST() local
170 &verified_boot_state, &device_locked)); in TEST()
171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
222 bool device_locked; in TEST() local
229 &device_locked, &unexpected_claims)); in TEST()
265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
329 bool device_locked; in TEST() local
[all …]
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/
H A Dattestation_record.h58 bool device_locked; member
84 VerifiedBoot* verified_boot_state, bool* device_locked,
/aosp12/hardware/interfaces/keymaster/4.0/support/
H A Dattestation_record.cpp53 ASN1_BOOLEAN device_locked; member
60 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
349 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_root_of_trust() argument
351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
387 *device_locked = root_of_trust->device_locked; in parse_root_of_trust()
388 if (!device_locked) { in parse_root_of_trust()
/aosp12/hardware/interfaces/security/keymint/support/
H A Dattestation_record.cpp54 ASN1_BOOLEAN device_locked; member
61 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
368 bool* device_locked, vector<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument
369 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
405 *device_locked = root_of_trust->device_locked; in parse_root_of_trust()
406 if (!device_locked) { in parse_root_of_trust()
/aosp12/system/keymaster/include/keymaster/km_openssl/
H A Dattestation_record.h63 ASN1_BOOLEAN device_locked; member
70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
378 bool* device_locked);
391 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
/aosp12/system/keymaster/contexts/
H A Dsoft_attestation_context.cpp35 params.device_locked = false; in GetVerifiedBootParams()
H A Dpure_soft_keymaster_context.cpp556 params.device_locked = false; in GetVerifiedBootParams()
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
H A Dattestation_record.h64 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
H A Dattestation_record.h37 bool device_locked; member
/aosp12/hardware/interfaces/keymaster/4.1/support/
H A Dattestation_record.cpp61 ASN1_BOOLEAN device_locked; member
68 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
416 rot.device_locked = root_of_trust->device_locked; in MAKE_OPENSSL_PTR_TYPE()
/aosp12/system/keymaster/include/keymaster/
H A Dattestation_context.h72 bool device_locked; member
H A Dkeymaster_enforcement.h203 void device_locked(bool password_only) { in device_locked() function
/aosp12/system/keymaster/km_openssl/
H A Dattestation_record.cpp831 if (vb_params->device_locked) { in build_eat_record()
832 eat_record.add(EatClaim::DEVICE_LOCKED, vb_params->device_locked); in build_eat_record()
1002 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record()
1432 bool* device_locked) { in parse_root_of_trust() argument
1454 *device_locked = root_of_trust->device_locked; in parse_root_of_trust()
1466 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_eat_record() argument
1555 *device_locked = simple_value->asBool()->value(); in parse_eat_record()
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/
H A Dattestation_record.cpp49 ASN1_BOOLEAN device_locked; member
55 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/
H A DKeyMintAidlTestBase.cpp1400 bool device_locked; in verify_attestation_record() local
1403 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record()
1414 EXPECT_FALSE(device_locked); in verify_attestation_record()
1416 EXPECT_TRUE(device_locked); in verify_attestation_record()
1423 EXPECT_TRUE(device_locked); in verify_attestation_record()
1425 EXPECT_FALSE(device_locked); in verify_attestation_record()
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/
H A Dkeymaster_hidl_hal_test.cpp493 bool device_locked; in verify_attestation_record() local
496 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record()
507 EXPECT_FALSE(device_locked); in verify_attestation_record()
509 EXPECT_TRUE(device_locked); in verify_attestation_record()
516 EXPECT_TRUE(device_locked); in verify_attestation_record()
518 EXPECT_FALSE(device_locked); in verify_attestation_record()
/aosp12/system/keymaster/android_keymaster/
H A Dandroid_keymaster.cpp903 context_->enforcement_policy()->device_locked(request.passwordOnly); in DeviceLocked()