Searched refs:verified_boot_state (Results 1 – 7 of 7) sorted by relevance
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 110 auto& verified_boot_state = root_of_trust.verified_boot_state; in check_root_of_trust() local 113 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_VERIFIED); in check_root_of_trust() 116 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_SELF_SIGNED); in check_root_of_trust() 119 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED); in check_root_of_trust() 122 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_FAILED); in check_root_of_trust() 124 EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED); in check_root_of_trust()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | attestation_record.cpp | 54 ASN1_ENUMERATED* verified_boot_state; member 61 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED), 312 keymaster_verified_boot_t* verified_boot_state, bool* device_locked, in parse_root_of_trust() argument 314 if (!verified_boot_key || !verified_boot_state || !device_locked || !verified_boot_hash) { in parse_root_of_trust() 343 *verified_boot_state = static_cast<keymaster_verified_boot_t>( in parse_root_of_trust() 344 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in parse_root_of_trust() 345 if (!verified_boot_state) { in parse_root_of_trust()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | attestation_record.h | 36 keymaster_verified_boot_t verified_boot_state; member
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | attestation_record.h | 64 keymaster_verified_boot_t* verified_boot_state, bool* device_locked,
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 62 ASN1_ENUMERATED* verified_boot_state; member 69 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED), 369 rot.verified_boot_state = static_cast<keymaster_verified_boot_t>( in MAKE_OPENSSL_PTR_TYPE() 370 ASN1_ENUMERATED_get(root_of_trust->verified_boot_state)); in MAKE_OPENSSL_PTR_TYPE()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 50 ASN1_ENUMERATED* verified_boot_state; member 56 ASN1_SIMPLE(KM_ROOT_OF_TRUST, verified_boot_state, ASN1_ENUMERATED),
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 421 keymaster_verified_boot_t verified_boot_state; in verify_attestation_record() local 425 &verified_boot_state, &device_locked, &verified_boot_hash); in verify_attestation_record() 457 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_VERIFIED); in verify_attestation_record() 461 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_SELF_SIGNED); in verify_attestation_record() 465 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_UNVERIFIED); in verify_attestation_record() 469 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_FAILED); in verify_attestation_record() 471 EXPECT_EQ(verified_boot_state, KM_VERIFIED_BOOT_UNVERIFIED); in verify_attestation_record()
|