Home
last modified time | relevance | path

Searched refs:tpm (Results 1 – 25 of 64) sorted by relevance

123

/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/lib/tpm/
Dsub.mk34 ./lib/tpm/tpm_symlink:
36 @if [ -L ./lib/tpm/tpm_symlink ] ; \
41 ln -s ../../$(TPM_ROOT) ./lib/tpm/tpm_symlink; \
46 @if [ -e ./lib/tpm/tpm_symlink ] ; \
48 unlink ./lib/tpm/tpm_symlink ; \
52 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include
53 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/ltc
54 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/prototypes
55 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/wolf
63 srcs-y += tpm_symlink/TPMCmd/tpm/src/command/Asymmetric/ECC_Parameters.c
[all …]
/external/ms-tpm-20-ref/
DAndroid.bp19 default_applicable_licenses: ["external_ms-tpm-20-ref_license"],
37 name: "external_ms-tpm-20-ref_license",
51 name: "ms-tpm-20-ref-defaults",
57 "TPMCmd/tpm/include",
58 "TPMCmd/tpm/include/Ossl",
59 "TPMCmd/tpm/include/prototypes",
79 name: "ms-tpm-20-ref-lib",
84 "TPMCmd/tpm/src/command/**/*.c",
85 "TPMCmd/tpm/src/crypt/*.c",
86 "TPMCmd/tpm/src/crypt/ossl/*.c",
[all …]
DREADME.md3 …tatus](https://travis-ci.org/Microsoft/ms-tpm-20-ref.svg?branch=master)](https://travis-ci.org/Mic…
5 …mentation of the [TPM 2.0 Specification](https://trustedcomputinggroup.org/tpm-library-specificati…
7 …ION`, `SPEC_YEAR` and `SPEC_DAY_OF_YEAR` values in the [TpmTypes.h](TPMCmd/tpm/include/TpmTypes.h)…
44 * If necessary, update the definitions of the following macros in the [VendorString.h](TPMCmd/tpm/i…
DCONTRIBUTING.md4 https://github.com/Microsoft/ms-tpm-20-ref/issues
13 https://trustedcomputinggroup.org/tpm-library-specification/
16 TPMCmd/tpm and its subdirectories, must be approved by TCG voting
/external/vboot_reference/utility/
Dchromeos-tpm-recovery-test9 rm -rf tpm-recovery-test-workdir
10 mkdir tpm-recovery-test-workdir
11 cd tpm-recovery-test-workdir
30 ctr=../chromeos-tpm-recovery
33 ctr=chromeos-tpm-recovery
58 if [ -e space.$index.data -a -e tpm-owned ]; then
83 rm -f tpm-owned
160 cat > tpm-nvtool <<"EOF"
180 if [ ! -f tpm-owned ]; then
198 if [ -f tpm-owned ]; then
[all …]
/external/autotest/client/site_tests/network_VPNConnect/
Dnetwork_VPNConnect.py88 def get_vpn_client_properties(self, tpm): argument
116 tpm.install_certificate(site_eap_certs.client_cert_1,
118 tpm.install_private_key(site_eap_certs.client_private_key_1,
123 'L2TPIPsec.ClientCertSlot': tpm.SLOT_ID,
126 'L2TPIPsec.PIN': tpm.PIN,
133 tpm.install_certificate(site_eap_certs.client_cert_1,
135 tpm.install_private_key(site_eap_certs.client_private_key_1,
144 'OpenVPN.Pkcs11.PIN': tpm.PIN,
179 with tpm_store.TPMStore() as tpm:
181 self.get_vpn_client_properties(tpm))
/external/linux-kselftest/tools/testing/selftests/tpm2/
Dtpm2_tests.py169 self.client.tpm.write(cmd)
170 hdr = self.client.tpm.read(10)
172 rsp = self.client.tpm.read()
186 self.client.tpm.write(cmd)
188 rsp1 = self.client.tpm.read(15)
191 self.client.tpm.write(cmd)
194 rsp2 = self.client.tpm.read()
209 self.client.tpm.write(cmd)
212 self.client.tpm.write(cmd)
213 rsp = self.client.tpm.read()
[all …]
Dtpm2.py362 self.tpm = open('/dev/tpm0', 'r+b', buffering=0)
364 self.tpm = open('/dev/tpmrm0', 'r+b', buffering=0)
367 flags = fcntl.fcntl(self.tpm, fcntl.F_GETFL)
369 fcntl.fcntl(self.tpm, fcntl.F_SETFL, flags)
373 self.tpm.close()
376 self.tpm.write(cmd)
379 self.tpm_poll.register(self.tpm, select.POLLIN)
382 rsp = self.tpm.read()
385 self.tpm_poll.unregister(self.tpm)
/external/ms-tpm-20-ref/TPMCmd/
DMakefile.am39 TPM_INC = -I $(srcdir)/tpm/include \
40 -I $(srcdir)/tpm/include/prototypes
43 libtpm = tpm/src/libtpm.a
Dconfigure.ac33 AC_INIT([ms-tpm-20-ref],
35 [https://github.com/microsoft/ms-tpm-20-ref/issues],
37 [https://github.com/microsoft/ms-tpm-20-ref])
46 dnl By enabling this feature tpm simulator gets seeds derived from hardware parameters.
52 …[tpm simulator get seeds derived from hardware parameters. Seeds are not derived from secure hardw…
/external/autotest/server/site_tests/firmware_TPMNotCorruptedDevMode/
Dfirmware_TPMNotCorruptedDevMode.py96 self.faft_client.tpm.stop_daemon()
102 self.faft_client.tpm.restart_daemon()
127 self.faft_client.tpm.stop_daemon()
136 self.faft_client.tpm.restart_daemon()
/external/autotest/server/site_tests/platform_InitLoginPerfServer/
Dcontrol15 This test clears the tpm owner, then goes through OOBE and verifies that the
16 user logs in, the tpm is initialized, and the device is prepared for enrollment.
17 It captures the performance data for tpm initialization, as well as first-boot
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/lib/
Dsub.mk2 create_lib_symlinks: ./lib/tpm/tpm_symlink ./lib/wolf/wolf_symlink
8 subdirs-y += tpm
/external/ltp/testscripts/
Dtpm_tools.sh146 if [ -d $P11DIR/var/lib/opencryptoki/tpm/$USER ]
148 rm -rf $P11DIR/var/lib/opencryptoki/tpm/$USER
170 $LTPROOT/bin/ltp-pan -d 5 -S -a $LTPROOT/results/tpm_tools -n ltp-tpm-tools -l $LTPROOT/results/tpm…
/external/tpm2-tss/dist/
Dtpm-udev.rules1 # tpm devices can only be accessed by the tss user but the tss
3 KERNEL=="tpm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss"
/external/autotest/server/hosts/
Dcros_repair.py373 tpm = status['tpm']
374 if not tpm['enabled']:
377 if not tpm['can_connect']:
380 'last_error=%d.' % tpm['last_error']))
381 if tpm['owned'] and not tpm['can_load_srk']:
384 if tpm['can_load_srk'] and not tpm['can_load_srk_pubkey']:
1415 self.tpm = self['tpm']
1420 return self.tpm.get('enabled') == True
1425 return self.tpm.get('owned') == True
1430 return self.tpm.get('can_load_srk') == True
[all …]
/external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/
Dfirmware_UpdateFirmwareVersion.py30 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version()
61 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_version()
74 if self.faft_client.tpm.get_firmware_version() != self.fw_ver_tpm:
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/
Dfirmware_UpdateFirmwareDataKeyVersion.py44 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version()
74 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_datakey_version()
89 if (self.faft_client.tpm.get_firmware_datakey_version() !=
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/
DREADME.md67 #### 6. Clone the ms-tpm-20-ref source code
70 git clone https://github.com/Microsoft/ms-tpm-20-ref.git
75 cd ~/ms-tpm-20-ref
87 …directory the optee_os TA devkit was compiled to in [step 5](#6-clone-the-ms-tpm-20-ref-source-code
93 cd ~/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta
/external/autotest/client/site_tests/platform_EncryptedStateful/
Dplatform_EncryptedStateful.py272 tpm = "/dev/tpm0"
273 off = "%s.off" % (tpm)
275 if os.path.exists(tpm):
276 utils.system("mv %s %s" % (tpm, off))
281 utils.system("mv %s %s" % (off, tpm))
/external/autotest/server/site_tests/firmware_ClearTPMOwnerAndReset/
Dcontrol7 PURPOSE = "Verify normal boot after clearing the tpm owner and rebooting the ec"
14 after the tpm owner has been cleared.
Dcontrol.stress7 PURPOSE = "Verify normal boot after clearing the tpm owner and rebooting the ec"
15 after the tpm owner has been cleared.
/external/autotest/server/site_tests/firmware_TPMKernelVersion/
Dfirmware_TPMKernelVersion.py52 version = self.faft_client.tpm.get_kernel_version()
54 version = self.faft_client.tpm.get_kernel_datakey_version()
/external/autotest/server/site_tests/firmware_TPMVersionCheck/
Dcontrol.dev9 PURPOSE = "Crossystem reports the tpm versions correctly"
10 CRITERIA = "This test will fail if crossystem reports tpm version incorrectly"
/external/autotest/server/site_tests/firmware_FAFTRPC/
Dcontrol.tpm8 NAME = "firmware_FAFTRPC.tpm"
33 category_under_test="tpm"

123