/aosp12/system/keymaster/tests/ |
H A D | attestation_record_test.cpp | 56 params.device_locked = true; in GetVerifiedBootParams() 62 keymaster_verified_boot_t verified_boot_state, bool device_locked) { in VerifyRootOfTrust() argument 67 EXPECT_TRUE(device_locked); in VerifyRootOfTrust() 168 bool device_locked; in TEST() local 170 &verified_boot_state, &device_locked)); in TEST() 171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 222 bool device_locked; in TEST() local 229 &device_locked, &unexpected_claims)); in TEST() 265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 329 bool device_locked; in TEST() local [all …]
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 58 bool device_locked; member 84 VerifiedBoot* verified_boot_state, bool* device_locked,
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | attestation_record.cpp | 53 ASN1_BOOLEAN device_locked; member 60 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN), 349 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_root_of_trust() argument 351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 387 *device_locked = root_of_trust->device_locked; in parse_root_of_trust() 388 if (!device_locked) { in parse_root_of_trust()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | attestation_record.cpp | 54 ASN1_BOOLEAN device_locked; member 61 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN), 368 bool* device_locked, vector<uint8_t>* verified_boot_hash) { in parse_root_of_trust() argument 369 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 405 *device_locked = root_of_trust->device_locked; in parse_root_of_trust() 406 if (!device_locked) { in parse_root_of_trust()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 63 ASN1_BOOLEAN device_locked; member 70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN), 378 bool* device_locked); 391 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_attestation_context.cpp | 35 params.device_locked = false; in GetVerifiedBootParams()
|
H A D | pure_soft_keymaster_context.cpp | 556 params.device_locked = false; in GetVerifiedBootParams()
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | attestation_record.h | 64 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 37 bool device_locked; member
|
/aosp12/hardware/interfaces/keymaster/4.1/support/ |
H A D | attestation_record.cpp | 61 ASN1_BOOLEAN device_locked; member 68 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN), 416 rot.device_locked = root_of_trust->device_locked; in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | attestation_context.h | 72 bool device_locked; member
|
H A D | keymaster_enforcement.h | 203 void device_locked(bool password_only) { in device_locked() function
|
/aosp12/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 831 if (vb_params->device_locked) { in build_eat_record() 832 eat_record.add(EatClaim::DEVICE_LOCKED, vb_params->device_locked); in build_eat_record() 1002 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record() 1432 bool* device_locked) { in parse_root_of_trust() argument 1454 *device_locked = root_of_trust->device_locked; in parse_root_of_trust() 1466 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_eat_record() argument 1555 *device_locked = simple_value->asBool()->value(); in parse_eat_record()
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | attestation_record.cpp | 49 ASN1_BOOLEAN device_locked; member 55 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintAidlTestBase.cpp | 1400 bool device_locked; in verify_attestation_record() local 1403 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 1414 EXPECT_FALSE(device_locked); in verify_attestation_record() 1416 EXPECT_TRUE(device_locked); in verify_attestation_record() 1423 EXPECT_TRUE(device_locked); in verify_attestation_record() 1425 EXPECT_FALSE(device_locked); in verify_attestation_record()
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 493 bool device_locked; in verify_attestation_record() local 496 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 507 EXPECT_FALSE(device_locked); in verify_attestation_record() 509 EXPECT_TRUE(device_locked); in verify_attestation_record() 516 EXPECT_TRUE(device_locked); in verify_attestation_record() 518 EXPECT_FALSE(device_locked); in verify_attestation_record()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | android_keymaster.cpp | 903 context_->enforcement_policy()->device_locked(request.passwordOnly); in DeviceLocked()
|