Home
last modified time | relevance | path

Searched refs:device_locked (Results 1 – 12 of 12) sorted by relevance

/system/keymaster/tests/
Dattestation_record_test.cpp56 params.device_locked = true; in GetVerifiedBootParams()
62 keymaster_verified_boot_t verified_boot_state, bool device_locked) { in VerifyRootOfTrust() argument
67 EXPECT_TRUE(device_locked); in VerifyRootOfTrust()
168 bool device_locked; in TEST() local
170 &verified_boot_state, &device_locked)); in TEST()
171 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
222 bool device_locked; in TEST() local
229 &device_locked, &unexpected_claims)); in TEST()
265 context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked); in TEST()
329 bool device_locked; in TEST() local
[all …]
/system/keymaster/contexts/
Dsoft_attestation_context.cpp35 params.device_locked = false; in GetVerifiedBootParams()
Dpure_soft_keymaster_context.cpp631 params.device_locked = false; in GetVerifiedBootParams()
/system/keymaster/include/keymaster/
Dattestation_context.h72 bool device_locked; member
Dkeymaster_enforcement.h216 void device_locked(bool password_only) { in device_locked() function
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h63 ASN1_BOOLEAN device_locked; member
70 ASN1_SIMPLE(KM_ROOT_OF_TRUST, device_locked, ASN1_BOOLEAN),
382 bool* device_locked);
395 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
/system/keymaster/km_openssl/
Dattestation_record.cpp836 if (vb_params->device_locked) { in build_eat_record()
837 eat_record.add(EatClaim::DEVICE_LOCKED, vb_params->device_locked); in build_eat_record()
1023 root_of_trust->device_locked = vb_params->device_locked ? 0xFF : 0x00; in build_attestation_record()
1461 bool* device_locked) { in parse_root_of_trust() argument
1483 *device_locked = root_of_trust->device_locked; in parse_root_of_trust()
1495 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_eat_record() argument
1584 *device_locked = simple_value->asBool()->value(); in parse_eat_record()
/system/keymint/ta/src/
Dcert.rs1143 device_locked: bool, field
1160 device_locked: info.device_boot_locked, in from()
1219 device_locked: false, in test_attest_ext_encode_decode()
1286 device_locked: false, in test_authz_list_encode_decode()
1332 device_locked: false, in test_authz_list_dup_encode()
1352 device_locked: false, in test_authz_list_order_fail()
Dlib.rs128 device_locked: RefCell<LockState>, field
280 device_locked: RefCell::new(LockState::Unlocked), in new()
765 match self.device_locked(req.password_only, req.timestamp_token) { in process_req()
910 fn device_locked( in device_locked() method
934 *self.device_locked.borrow_mut() = if password_only { in device_locked()
Doperation.rs722 let (locked, lock_time, need_password) = match *self.device_locked.borrow() { in maybe_unlock()
736 *self.device_locked.borrow_mut() = LockState::Unlocked; in maybe_unlock()
/system/keymint/wire/src/
Dlegacy.rs485 pub device_locked: bool, field
671 device_locked: false, in test_inner_serialize()
/system/keymaster/android_keymaster/
Dandroid_keymaster.cpp995 context_->enforcement_policy()->device_locked(request.passwordOnly); in DeviceLocked()
1043 vbParams->device_locked, // in GetRootOfTrust()