/external/u-boot/drivers/tpm/ |
D | Kconfig | 2 # TPM subsystem configuration 5 menu "TPM support" 7 comment "Please select only one TPM revision" 12 depends on TPM 15 Major TPM versions are not compatible at all, choose either 21 bool "Enable sandbox TPM driver" 25 such as reading and writing TPM private data. This is enough to 30 bool "Enable Atmel TWI TPM device driver" 33 This driver supports an Atmel TPM device connected on the I2C bus. 35 to the device using the standard TPM Interface Specification (TIS) [all …]
|
/external/autotest/client/site_tests/hardware_TPMLoadKey/ |
D | control | 7 PURPOSE = "Detect that the TPM can execute the LoadKey function" 8 CRITERIA = "The TPM must be able to execute the TPM LoadKey function to pass" 15 This test determines that the TPM can execute a TPM LoadKey function.
|
/external/autotest/client/site_tests/hardware_TPMttci/ |
D | control | 7 PURPOSE = "Exercise TPM TTCI board modules with TPM" 8 CRITERIA = "Check TTCI module functionality and TPM sanity check" 16 check of the TPM (Trusted Platform Module) module (version & self-test).
|
/external/autotest/server/site_tests/platform_CryptohomeTpmLiveTestServer/ |
D | control | 15 This test clears the TPM if necessary, kicks off a client side test that runs 16 cryptohome's TPM live tests and clears the TPM again. Every time the TPM is
|
/external/llvm/lib/IR/ |
D | LegacyPassManager.cpp | 825 const PassInfo *PInf = TPM->findAnalysisPassInfo(PI); in recordAvailableAnalysis() 835 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis() 859 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis() 875 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis() 929 if (!TPM) in removeDeadPasses() 932 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses() 958 if (const PassInfo *PInf = TPM->findAnalysisPassInfo(PI)) { in freePass() 1023 TPM->setLastUser(LastUses, P); in add() 1027 TPM->setLastUser(TransferLastUses, My_PM); in add() 1033 const PassInfo *PI = TPM->findAnalysisPassInfo(ID); in add() [all …]
|
/external/swiftshader/third_party/llvm-7.0/llvm/lib/IR/ |
D | LegacyPassManager.cpp | 889 const PassInfo *PInf = TPM->findAnalysisPassInfo(PI); in recordAvailableAnalysis() 899 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis() 919 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis() 933 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis() 985 if (!TPM) in removeDeadPasses() 988 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses() 1013 if (const PassInfo *PInf = TPM->findAnalysisPassInfo(PI)) { in freePass() 1078 TPM->setLastUser(LastUses, P); in add() 1082 TPM->setLastUser(TransferLastUses, My_PM); in add() 1088 const PassInfo *PI = TPM->findAnalysisPassInfo(ID); in add() [all …]
|
/external/autotest/client/site_tests/hardware_TPMtspi/ |
D | control | 7 PURPOSE = "Exercise TPM modules using TSPI library API" 8 CRITERIA = "Check TPM functionality" 15 This test exercises the basic functionalities of the TPM
|
/external/autotest/client/site_tests/hardware_TPMCheck/ |
D | control | 8 PURPOSE = "Basic check of the TPM state" 9 CRITERIA = "Check that the TPM is in the expected state for use in Chrome OS." 16 A basic sanity check of the state of the TPM (Trusted Platform Module)
|
/external/autotest/client/site_tests/platform_CryptohomeTPMReOwn/ |
D | control | 7 PURPOSE = "Verify that cryptohome re-creates the user's vault directory when the TPM is re-owned." 8 CRITERIA = "This will run a test of re-owning the TPM." 16 when the TPM is re-owned.
|
/external/autotest/server/site_tests/enterprise_KioskEnrollmentServer/ |
D | control | 15 This test clears the TPM if necessary, kicks off a client side test that enrolls 16 a device in enterprise and clears the TPM again. Every time the TPM is cleared,
|
/external/autotest/server/site_tests/firmware_Cr50VirtualNVRamServer/ |
D | control | 15 This test clears the TPM if necessary, the runs a client side test that checks 16 Virtual NVRAM functionality in cr50. Finally, it clears the TPM again. 17 Every time the TPM is cleared, the system is rebooted.
|
/external/autotest/server/site_tests/enterprise_RemoraRequisitionServer/ |
D | control | 15 This test clears the TPM if necessary, kicks off a client side test that enrolls 16 a device as a remora device and clears the TPM again. Every time the TPM is
|
/external/swiftshader/third_party/LLVM/lib/VMCore/ |
D | PassManager.cpp | 805 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis() 829 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis() 845 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis() 899 if (!TPM) in removeDeadPasses() 902 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses() 996 TPM->setLastUser(LastUses, P); in add() 1000 TPM->setLastUser(TransferLastUses, My_PM); in add() 1029 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in collectRequiredAnalysis() 1055 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in initializeAnalysisImpl() 1083 return TPM->findAnalysisPass(AID); in findAnalysisPass() [all …]
|
/external/autotest/client/site_tests/kernel_TPMStress/ |
D | control | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 16 Sends commands to the TPM in a tight loop for some length of time, in
|
D | control.stress2 | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 16 Sends commands to the TPM in a tight loop for some length of time, in
|
D | control.stress3 | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 16 Sends commands to the TPM in a tight loop for some length of time, in
|
/external/autotest/server/site_tests/enterprise_CFM_MeetAppSanity/ |
D | control | 18 This test clears the TPM if necessary, enrolls the device into CFM and runs a 20 It clears the TPM at the end of the test run. Every time the TPM is cleared,
|
D | control.partners | 17 This test clears the TPM if necessary, enrolls the device into CFM and runs a 19 It clears the TPM at the end of the test run. Every time the TPM is cleared,
|
/external/autotest/client/site_tests/power_CheckAfterSuspend/ |
D | control.TPMCheckStress | 8 PURPOSE = "Check of the TPM state after S3" 9 CRITERIA = "Check that the TPM is in the expected state after many S3 Resumes." 16 A check of the state of the TPM (Trusted Platform Module) after S3 Resume
|
/external/autotest/client/site_tests/platform_TPMEvict/ |
D | control | 7 PURPOSE = "Tests the TPM under low-resource conditions." 16 This test verifies that PKCS #11 services remain functional when the TPM is 18 are able to fit in TPM memory which requires that previously loaded keys be
|
/external/autotest/client/site_tests/suite_TPM/ |
D | control | 7 PURPOSE = "Execute automated TPM functionality checks." 14 This test suite runs automated TPM Smogcheck tests. The purpose of 15 the suite is to sanity test basic TPM functionality in less than 10 minutes.
|
/external/autotest/server/site_tests/firmware_TPMKernelVersion/ |
D | control | 9 PURPOSE = "Check kernel version in TPM is not corrupted." 10 CRITERIA = "This test will fail if kernel version in TPM is corrupted." 20 in the TPM.
|
/external/autotest/server/site_tests/enterprise_CFM_Sanity/ |
D | control.partners | 16 This test clears the TPM if necessary, enrolls the device as a remora device 18 enrolled devices behave as expected. It clears the TPM at the end of the test 19 run. Every time the TPM is cleared, the system is rebooted.
|
/external/epid-sdk/ |
D | CHANGELOG.md | 18 the IBM TPM simulator due to a defect in version 532 of the 21 - Basenames are limited to 124 bytes in TPM mode. 64 the IBM TPM simulator due to a defect in version 532 of the 67 - Basenames are limited to 124 bytes in TPM mode. 78 using a TPM, using the ECDAA capabilities of TPM 2.0. 111 SDK with the IBM TPM simulator due to a defect in version 114 - Basenames are limited to 124 bytes in TPM mode.
|
/external/autotest/server/site_tests/firmware_TPMExtend/ |
D | control | 9 PURPOSE = "Ensure TPM PCRs have been correctly extended with boot mode and HWID" 10 CRITERIA = "This test will fail if TPM PCR 0 or 1 has an incorrect value" 19 This test ensures that the TPM PCRs 0 and 1 have been extended with a hash that
|