/hardware/interfaces/security/keymint/support/include/keymint_support/ |
D | attestation_record.h | 59 VerifiedBoot verified_boot_state; member 86 VerifiedBoot* verified_boot_state, bool* device_locked,
|
/hardware/interfaces/security/keymint/aidl/default/hal/ |
D | lib.rs | 68 let verified_boot_state = match get_property("ro.boot.verifiedbootstate") in get_boot_info() localVariable 95 verified_boot_state, in get_boot_info()
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 124 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust() local 127 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_VERIFIED); in check_root_of_trust() 130 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_SELF_SIGNED); in check_root_of_trust() 133 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED); in check_root_of_trust() 136 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_FAILED); in check_root_of_trust() 138 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED); in check_root_of_trust()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 54 ASN1_ENUMERATED* verified_boot_state; member 61 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED), 349 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_root_of_trust() argument 351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 380 *verified_boot_state = static_cast<keymaster_verified_boot_t>( in parse_root_of_trust() 381 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust() 382 if (!verified_boot_state) { in parse_root_of_trust()
|
/hardware/interfaces/security/keymint/support/ |
D | attestation_record.cpp | 55 ASN1_ENUMERATED* verified_boot_state; member 62 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED), 371 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument 373 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 402 *verified_boot_state = in parse_root_of_trust() 403 static_cast<VerifiedBoot>(ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust() 404 if (!verified_boot_state) { in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 36 keymaster_verified_boot_t verified_boot_state; member
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | attestation_record.h | 64 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 62 ASN1_ENUMERATED* verified_boot_state; member 69 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED), 414 rot.verified_boot_state = static_cast<keymaster_verified_boot_t>( in MAKE_OPENSSL_PTR_TYPE() 415 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in MAKE_OPENSSL_PTR_TYPE()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 50 ASN1_ENUMERATED* verified_boot_state; member 56 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED),
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintAidlTestBase.cpp | 1787 VerifiedBoot verified_boot_state, in verify_root_of_trust() argument 1826 EXPECT_EQ(verified_boot_state, VerifiedBoot::VERIFIED); in verify_root_of_trust() 1830 EXPECT_EQ(verified_boot_state, VerifiedBoot::SELF_SIGNED); in verify_root_of_trust() 1834 EXPECT_EQ(verified_boot_state, VerifiedBoot::UNVERIFIED); in verify_root_of_trust() 1838 EXPECT_EQ(verified_boot_state, VerifiedBoot::FAILED); in verify_root_of_trust() 1840 EXPECT_EQ(verified_boot_state, VerifiedBoot::UNVERIFIED); in verify_root_of_trust() 1952 VerifiedBoot verified_boot_state; in verify_attestation_record() local 1956 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 1958 verify_root_of_trust(verified_boot_key, device_locked, verified_boot_state, verified_boot_hash); in verify_attestation_record()
|
D | KeyMintAidlTestBase.h | 412 VerifiedBoot verified_boot_state, //
|
/hardware/interfaces/security/rkp/aidl/vts/functional/ |
D | VtsRemotelyProvisionedComponentTests.cpp | 892 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument 901 verified_boot_state, device_locked, verified_boot_hash); in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 498 keymaster_verified_boot_t verified_boot_state; in verify_attestation_record() local 502 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 534 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_VERIFIED); in verify_attestation_record() 538 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_SELF_SIGNED); in verify_attestation_record() 542 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_UNVERIFIED); in verify_attestation_record() 546 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_FAILED); in verify_attestation_record() 548 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_UNVERIFIED); in verify_attestation_record()
|