Searched refs:device_locked (Results 1 – 10 of 10) sorted by relevance
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 56 params.device_locked = true; in GetVerifiedBootParams() 62 keymaster_verified_boot_t verified_boot_state, bool device_locked) { in VerifyRootOfTrust() argument 67 EXPECT_TRUE(device_locked); in VerifyRootOfTrust() 168 bool device_locked; in TEST() local 170 &verified_boot_state, &device_locked)); in TEST() 171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 222 bool device_locked; in TEST() local 229 &device_locked, &unexpected_claims)); in TEST() 265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 329 bool device_locked; in TEST() local [all …]
|
/system/keymaster/contexts/ |
D | soft_attestation_context.cpp | 35 params.device_locked = false; in GetVerifiedBootParams()
|
D | pure_soft_keymaster_context.cpp | 631 params.device_locked = false; in GetVerifiedBootParams()
|
/system/keymaster/include/keymaster/ |
D | attestation_context.h | 72 bool device_locked; member
|
D | keymaster_enforcement.h | 216 void device_locked(bool password_only) { in device_locked() function
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 63 ASN1_BOOLEAN device_locked; member 70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN), 382 bool* device_locked); 395 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
|
/system/keymint/ta/src/ |
D | cert.rs | 1256 device_locked: bool, field 1273 device_locked: info.device_boot_locked, in from() 1331 device_locked: false, in test_attest_ext_encode_decode() 1401 device_locked: false, in test_authz_list_encode_decode() 1448 device_locked: false, in test_authz_list_user_secure_id_encode() 1515 device_locked: false, in test_authz_list_user_secure_id_decode() 1539 device_locked: false, in test_authz_list_dup_encode() 1559 device_locked: false, in test_authz_list_order_fail()
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 836 if (vb_params->device_locked) { in build_eat_record() 837 eat_record.add(EatClaim::DEVICE_LOCKED, vb_params->device_locked); in build_eat_record() 1023 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record() 1459 bool* device_locked) { in parse_root_of_trust() argument 1481 *device_locked = root_of_trust->device_locked; in parse_root_of_trust() 1493 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_eat_record() argument 1582 *device_locked = simple_value->asBool()->value(); in parse_eat_record()
|
/system/keymint/wire/src/ |
D | legacy.rs | 499 pub device_locked: bool, field 690 device_locked: false, in test_inner_serialize()
|
/system/keymaster/android_keymaster/ |
D | android_keymaster.cpp | 997 context_->enforcement_policy()->device_locked(request.passwordOnly); in DeviceLocked() 1045 vbParams->device_locked, // in GetRootOfTrust()
|