Home
last modified time | relevance | path

Searched refs:device_locked (Results 1 – 10 of 10) sorted by relevance

/system/keymaster/tests/
Dattestation_record_test.cpp56 params.device_locked = true; in GetVerifiedBootParams()
62 keymaster_verified_boot_t verified_boot_state, bool device_locked) { in VerifyRootOfTrust() argument
67 EXPECT_TRUE(device_locked); in VerifyRootOfTrust()
168 bool device_locked; in TEST() local
170 &verified_boot_state, &device_locked)); in TEST()
171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
222 bool device_locked; in TEST() local
229 &device_locked, &unexpected_claims)); in TEST()
265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
329 bool device_locked; in TEST() local
[all …]
/system/keymaster/contexts/
Dsoft_attestation_context.cpp35 params.device_locked = false; in GetVerifiedBootParams()
Dpure_soft_keymaster_context.cpp631 params.device_locked = false; in GetVerifiedBootParams()
/system/keymaster/include/keymaster/
Dattestation_context.h72 bool device_locked; member
Dkeymaster_enforcement.h216 void device_locked(bool password_only) { in device_locked() function
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h63 ASN1_BOOLEAN device_locked; member
70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
382 bool* device_locked);
395 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
/system/keymint/ta/src/
Dcert.rs1256 device_locked: bool, field
1273 device_locked: info.device_boot_locked, in from()
1331 device_locked: false, in test_attest_ext_encode_decode()
1401 device_locked: false, in test_authz_list_encode_decode()
1448 device_locked: false, in test_authz_list_user_secure_id_encode()
1515 device_locked: false, in test_authz_list_user_secure_id_decode()
1539 device_locked: false, in test_authz_list_dup_encode()
1559 device_locked: false, in test_authz_list_order_fail()
/system/keymaster/km_openssl/
Dattestation_record.cpp836 if (vb_params->device_locked) { in build_eat_record()
837 eat_record.add(EatClaim::DEVICE_LOCKED, vb_params->device_locked); in build_eat_record()
1023 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record()
1459 bool* device_locked) { in parse_root_of_trust() argument
1481 *device_locked = root_of_trust->device_locked; in parse_root_of_trust()
1493 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_eat_record() argument
1582 *device_locked = simple_value->asBool()->value(); in parse_eat_record()
/system/keymint/wire/src/
Dlegacy.rs499 pub device_locked: bool, field
690 device_locked: false, in test_inner_serialize()
/system/keymaster/android_keymaster/
Dandroid_keymaster.cpp997 context_->enforcement_policy()->device_locked(request.passwordOnly); in DeviceLocked()
1045 vbParams->device_locked, // in GetRootOfTrust()