Home
last modified time | relevance | path

Searched refs:verified_boot_state (Results 1 – 13 of 13) sorted by relevance

/hardware/interfaces/security/keymint/support/include/keymint_support/
Dattestation_record.h59 VerifiedBoot verified_boot_state; member
86 VerifiedBoot* verified_boot_state, bool* device_locked,
/hardware/interfaces/security/keymint/aidl/default/hal/
Dlib.rs68 let verified_boot_state = match get_property("ro.boot.verifiedbootstate") in get_boot_info() localVariable
95 verified_boot_state, in get_boot_info()
/hardware/interfaces/keymaster/4.1/vts/functional/
DDeviceUniqueAttestationTest.cpp124 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust() local
127 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_VERIFIED); in check_root_of_trust()
130 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_SELF_SIGNED); in check_root_of_trust()
133 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED); in check_root_of_trust()
136 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_FAILED); in check_root_of_trust()
138 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED); in check_root_of_trust()
/hardware/interfaces/keymaster/4.0/support/
Dattestation_record.cpp54 ASN1_ENUMERATED* verified_boot_state; member
61 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED),
349 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_root_of_trust() argument
351 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
380 *verified_boot_state = static_cast<keymaster_verified_boot_t>( in parse_root_of_trust()
381 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust()
382 if (!verified_boot_state) { in parse_root_of_trust()
/hardware/interfaces/security/keymint/support/
Dattestation_record.cpp55 ASN1_ENUMERATED* verified_boot_state; member
62 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED),
371 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument
373 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust()
402 *verified_boot_state = in parse_root_of_trust()
403 static_cast<VerifiedBoot>(ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust()
404 if (!verified_boot_state) { in parse_root_of_trust()
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
Dattestation_record.h36 keymaster_verified_boot_t verified_boot_state; member
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
Dattestation_record.h64 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
/hardware/interfaces/keymaster/4.1/support/
Dattestation_record.cpp62 ASN1_ENUMERATED* verified_boot_state; member
69 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED),
414 rot.verified_boot_state = static_cast<keymaster_verified_boot_t>( in MAKE_OPENSSL_PTR_TYPE()
415 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in MAKE_OPENSSL_PTR_TYPE()
/hardware/interfaces/keymaster/3.0/vts/functional/
Dattestation_record.cpp50 ASN1_ENUMERATED* verified_boot_state; member
56 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED),
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintAidlTestBase.cpp1787 VerifiedBoot verified_boot_state, in verify_root_of_trust() argument
1826 EXPECT_EQ(verified_boot_state, VerifiedBoot::VERIFIED); in verify_root_of_trust()
1830 EXPECT_EQ(verified_boot_state, VerifiedBoot::SELF_SIGNED); in verify_root_of_trust()
1834 EXPECT_EQ(verified_boot_state, VerifiedBoot::UNVERIFIED); in verify_root_of_trust()
1838 EXPECT_EQ(verified_boot_state, VerifiedBoot::FAILED); in verify_root_of_trust()
1840 EXPECT_EQ(verified_boot_state, VerifiedBoot::UNVERIFIED); in verify_root_of_trust()
1952 VerifiedBoot verified_boot_state; in verify_attestation_record() local
1956 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record()
1958 verify_root_of_trust(verified_boot_key, device_locked, verified_boot_state, verified_boot_hash); in verify_attestation_record()
DKeyMintAidlTestBase.h412 VerifiedBoot verified_boot_state, //
/hardware/interfaces/security/rkp/aidl/vts/functional/
DVtsRemotelyProvisionedComponentTests.cpp892 vector<uint8_t>* verified_boot_key, VerifiedBoot* verified_boot_state, in parse_root_of_trust() argument
901 verified_boot_state, device_locked, verified_boot_hash); in parse_root_of_trust()
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp498 keymaster_verified_boot_t verified_boot_state; in verify_attestation_record() local
502 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record()
534 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_VERIFIED); in verify_attestation_record()
538 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_SELF_SIGNED); in verify_attestation_record()
542 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_UNVERIFIED); in verify_attestation_record()
546 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_FAILED); in verify_attestation_record()
548 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_UNVERIFIED); in verify_attestation_record()