/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/lib/tpm/ |
D | sub.mk | 34 ./lib/tpm/tpm_symlink: 36 @if [ -L ./lib/tpm/tpm_symlink ] ; \ 41 ln -s ../../$(TPM_ROOT) ./lib/tpm/tpm_symlink; \ 46 @if [ -e ./lib/tpm/tpm_symlink ] ; \ 48 unlink ./lib/tpm/tpm_symlink ; \ 52 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include 53 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/ltc 54 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/prototypes 55 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/wolf 63 srcs-y += tpm_symlink/TPMCmd/tpm/src/command/Asymmetric/ECC_Parameters.c [all …]
|
/external/ms-tpm-20-ref/ |
D | Android.bp | 19 default_applicable_licenses: ["external_ms-tpm-20-ref_license"], 37 name: "external_ms-tpm-20-ref_license", 51 name: "ms-tpm-20-ref-defaults", 57 "TPMCmd/tpm/include", 58 "TPMCmd/tpm/include/Ossl", 59 "TPMCmd/tpm/include/prototypes", 79 name: "ms-tpm-20-ref-lib", 84 "TPMCmd/tpm/src/command/**/*.c", 85 "TPMCmd/tpm/src/crypt/*.c", 86 "TPMCmd/tpm/src/crypt/ossl/*.c", [all …]
|
D | README.md | 3 …tatus](https://travis-ci.org/Microsoft/ms-tpm-20-ref.svg?branch=master)](https://travis-ci.org/Mic… 5 …mentation of the [TPM 2.0 Specification](https://trustedcomputinggroup.org/tpm-library-specificati… 7 …ION`, `SPEC_YEAR` and `SPEC_DAY_OF_YEAR` values in the [TpmTypes.h](TPMCmd/tpm/include/TpmTypes.h)… 44 * If necessary, update the definitions of the following macros in the [VendorString.h](TPMCmd/tpm/i…
|
D | CONTRIBUTING.md | 4 https://github.com/Microsoft/ms-tpm-20-ref/issues 13 https://trustedcomputinggroup.org/tpm-library-specification/ 16 TPMCmd/tpm and its subdirectories, must be approved by TCG voting
|
/external/vboot_reference/utility/ |
D | chromeos-tpm-recovery-test | 9 rm -rf tpm-recovery-test-workdir 10 mkdir tpm-recovery-test-workdir 11 cd tpm-recovery-test-workdir 30 ctr=../chromeos-tpm-recovery 33 ctr=chromeos-tpm-recovery 58 if [ -e space.$index.data -a -e tpm-owned ]; then 83 rm -f tpm-owned 160 cat > tpm-nvtool <<"EOF" 180 if [ ! -f tpm-owned ]; then 198 if [ -f tpm-owned ]; then [all …]
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | network_VPNConnect.py | 88 def get_vpn_client_properties(self, tpm): argument 116 tpm.install_certificate(site_eap_certs.client_cert_1, 118 tpm.install_private_key(site_eap_certs.client_private_key_1, 123 'L2TPIPsec.ClientCertSlot': tpm.SLOT_ID, 126 'L2TPIPsec.PIN': tpm.PIN, 133 tpm.install_certificate(site_eap_certs.client_cert_1, 135 tpm.install_private_key(site_eap_certs.client_private_key_1, 144 'OpenVPN.Pkcs11.PIN': tpm.PIN, 179 with tpm_store.TPMStore() as tpm: 181 self.get_vpn_client_properties(tpm))
|
/external/linux-kselftest/tools/testing/selftests/tpm2/ |
D | tpm2_tests.py | 169 self.client.tpm.write(cmd) 170 hdr = self.client.tpm.read(10) 172 rsp = self.client.tpm.read() 186 self.client.tpm.write(cmd) 188 rsp1 = self.client.tpm.read(15) 191 self.client.tpm.write(cmd) 194 rsp2 = self.client.tpm.read() 209 self.client.tpm.write(cmd) 212 self.client.tpm.write(cmd) 213 rsp = self.client.tpm.read() [all …]
|
D | tpm2.py | 362 self.tpm = open('/dev/tpm0', 'r+b', buffering=0) 364 self.tpm = open('/dev/tpmrm0', 'r+b', buffering=0) 367 flags = fcntl.fcntl(self.tpm, fcntl.F_GETFL) 369 fcntl.fcntl(self.tpm, fcntl.F_SETFL, flags) 373 self.tpm.close() 376 self.tpm.write(cmd) 379 self.tpm_poll.register(self.tpm, select.POLLIN) 382 rsp = self.tpm.read() 385 self.tpm_poll.unregister(self.tpm)
|
/external/ms-tpm-20-ref/TPMCmd/ |
D | Makefile.am | 39 TPM_INC = -I $(srcdir)/tpm/include \ 40 -I $(srcdir)/tpm/include/prototypes 43 libtpm = tpm/src/libtpm.a
|
D | configure.ac | 33 AC_INIT([ms-tpm-20-ref], 35 [https://github.com/microsoft/ms-tpm-20-ref/issues], 37 [https://github.com/microsoft/ms-tpm-20-ref]) 46 dnl By enabling this feature tpm simulator gets seeds derived from hardware parameters. 52 …[tpm simulator get seeds derived from hardware parameters. Seeds are not derived from secure hardw…
|
/external/autotest/server/site_tests/firmware_TPMNotCorruptedDevMode/ |
D | firmware_TPMNotCorruptedDevMode.py | 96 self.faft_client.tpm.stop_daemon() 102 self.faft_client.tpm.restart_daemon() 127 self.faft_client.tpm.stop_daemon() 136 self.faft_client.tpm.restart_daemon()
|
/external/autotest/server/site_tests/platform_InitLoginPerfServer/ |
D | control | 15 This test clears the tpm owner, then goes through OOBE and verifies that the 16 user logs in, the tpm is initialized, and the device is prepared for enrollment. 17 It captures the performance data for tpm initialization, as well as first-boot
|
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/lib/ |
D | sub.mk | 2 create_lib_symlinks: ./lib/tpm/tpm_symlink ./lib/wolf/wolf_symlink 8 subdirs-y += tpm
|
/external/ltp/testscripts/ |
D | tpm_tools.sh | 146 if [ -d $P11DIR/var/lib/opencryptoki/tpm/$USER ] 148 rm -rf $P11DIR/var/lib/opencryptoki/tpm/$USER 170 $LTPROOT/bin/ltp-pan -d 5 -S -a $LTPROOT/results/tpm_tools -n ltp-tpm-tools -l $LTPROOT/results/tpm…
|
/external/tpm2-tss/dist/ |
D | tpm-udev.rules | 1 # tpm devices can only be accessed by the tss user but the tss 3 KERNEL=="tpm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss"
|
/external/autotest/server/hosts/ |
D | cros_repair.py | 373 tpm = status['tpm'] 374 if not tpm['enabled']: 377 if not tpm['can_connect']: 380 'last_error=%d.' % tpm['last_error'])) 381 if tpm['owned'] and not tpm['can_load_srk']: 384 if tpm['can_load_srk'] and not tpm['can_load_srk_pubkey']: 1415 self.tpm = self['tpm'] 1420 return self.tpm.get('enabled') == True 1425 return self.tpm.get('owned') == True 1430 return self.tpm.get('can_load_srk') == True [all …]
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/ |
D | firmware_UpdateFirmwareVersion.py | 30 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version() 61 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_version() 74 if self.faft_client.tpm.get_firmware_version() != self.fw_ver_tpm:
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/ |
D | firmware_UpdateFirmwareDataKeyVersion.py | 44 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version() 74 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_datakey_version() 89 if (self.faft_client.tpm.get_firmware_datakey_version() !=
|
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/ |
D | README.md | 67 #### 6. Clone the ms-tpm-20-ref source code 70 git clone https://github.com/Microsoft/ms-tpm-20-ref.git 75 cd ~/ms-tpm-20-ref 87 …directory the optee_os TA devkit was compiled to in [step 5](#6-clone-the-ms-tpm-20-ref-source-code 93 cd ~/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | platform_EncryptedStateful.py | 272 tpm = "/dev/tpm0" 273 off = "%s.off" % (tpm) 275 if os.path.exists(tpm): 276 utils.system("mv %s %s" % (tpm, off)) 281 utils.system("mv %s %s" % (off, tpm))
|
/external/autotest/server/site_tests/firmware_ClearTPMOwnerAndReset/ |
D | control | 7 PURPOSE = "Verify normal boot after clearing the tpm owner and rebooting the ec" 14 after the tpm owner has been cleared.
|
D | control.stress | 7 PURPOSE = "Verify normal boot after clearing the tpm owner and rebooting the ec" 15 after the tpm owner has been cleared.
|
/external/autotest/server/site_tests/firmware_TPMKernelVersion/ |
D | firmware_TPMKernelVersion.py | 52 version = self.faft_client.tpm.get_kernel_version() 54 version = self.faft_client.tpm.get_kernel_datakey_version()
|
/external/autotest/server/site_tests/firmware_TPMVersionCheck/ |
D | control.dev | 9 PURPOSE = "Crossystem reports the tpm versions correctly" 10 CRITERIA = "This test will fail if crossystem reports tpm version incorrectly"
|
/external/autotest/server/site_tests/firmware_FAFTRPC/ |
D | control.tpm | 8 NAME = "firmware_FAFTRPC.tpm" 33 category_under_test="tpm"
|