/system/keymaster/tests/ |
D | attestation_record_test.cpp | 56 params.device_locked = true; in GetVerifiedBootParams() 62 keymaster_verified_boot_t verified_boot_state, bool device_locked) { in VerifyRootOfTrust() argument 67 EXPECT_TRUE(device_locked); in VerifyRootOfTrust() 168 bool device_locked; in TEST() local 170 &verified_boot_state, &device_locked)); in TEST() 171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 222 bool device_locked; in TEST() local 229 &device_locked, &unexpected_claims)); in TEST() 265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST() 329 bool device_locked; in TEST() local [all …]
|
/system/keymaster/contexts/ |
D | soft_attestation_context.cpp | 35 params.device_locked = false; in GetVerifiedBootParams()
|
D | pure_soft_keymaster_context.cpp | 631 params.device_locked = false; in GetVerifiedBootParams()
|
/system/keymaster/include/keymaster/ |
D | attestation_context.h | 72 bool device_locked; member
|
D | keymaster_enforcement.h | 216 void device_locked(bool password_only) { in device_locked() function
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 63 ASN1_BOOLEAN device_locked; member 70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN), 382 bool* device_locked); 395 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 836 if (vb_params->device_locked) { in build_eat_record() 837 eat_record.add(EatClaim::DEVICE_LOCKED, vb_params->device_locked); in build_eat_record() 1023 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record() 1461 bool* device_locked) { in parse_root_of_trust() argument 1483 *device_locked = root_of_trust->device_locked; in parse_root_of_trust() 1495 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_eat_record() argument 1584 *device_locked = simple_value->asBool()->value(); in parse_eat_record()
|
/system/keymint/ta/src/ |
D | cert.rs | 1143 device_locked: bool, field 1160 device_locked: info.device_boot_locked, in from() 1219 device_locked: false, in test_attest_ext_encode_decode() 1286 device_locked: false, in test_authz_list_encode_decode() 1332 device_locked: false, in test_authz_list_dup_encode() 1352 device_locked: false, in test_authz_list_order_fail()
|
D | lib.rs | 128 device_locked: RefCell<LockState>, field 280 device_locked: RefCell::new(LockState::Unlocked), in new() 765 match self.device_locked(req.password_only, req.timestamp_token) { in process_req() 910 fn device_locked( in device_locked() method 934 *self.device_locked.borrow_mut() = if password_only { in device_locked()
|
D | operation.rs | 722 let (locked, lock_time, need_password) = match *self.device_locked.borrow() { in maybe_unlock() 736 *self.device_locked.borrow_mut() = LockState::Unlocked; in maybe_unlock()
|
/system/keymint/wire/src/ |
D | legacy.rs | 485 pub device_locked: bool, field 671 device_locked: false, in test_inner_serialize()
|
/system/keymaster/android_keymaster/ |
D | android_keymaster.cpp | 995 context_->enforcement_policy()->device_locked(request.passwordOnly); in DeviceLocked() 1043 vbParams->device_locked, // in GetRootOfTrust()
|