Home
last modified time | relevance | path

Searched refs:tpm (Results 1 – 25 of 274) sorted by relevance

1234567891011

/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/lib/tpm/
Dsub.mk34 ./lib/tpm/tpm_symlink:
36 @if [ -L ./lib/tpm/tpm_symlink ] ; \
41 ln -s ../../$(TPM_ROOT) ./lib/tpm/tpm_symlink; \
46 @if [ -e ./lib/tpm/tpm_symlink ] ; \
48 unlink ./lib/tpm/tpm_symlink ; \
52 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include
53 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/ltc
54 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/prototypes
55 global-incdirs-y += tpm_symlink/TPMCmd/tpm/include/wolf
63 srcs-y += tpm_symlink/TPMCmd/tpm/src/command/Asymmetric/ECC_Parameters.c
[all …]
/external/ms-tpm-20-ref/
DAndroid.bp19 default_applicable_licenses: ["external_ms-tpm-20-ref_license"],
37 name: "external_ms-tpm-20-ref_license",
51 name: "ms-tpm-20-ref-defaults",
57 "TPMCmd/tpm/include",
58 "TPMCmd/tpm/include/Ossl",
59 "TPMCmd/tpm/include/prototypes",
86 name: "ms-tpm-20-ref-lib",
91 "TPMCmd/tpm/src/command/**/*.c",
92 "TPMCmd/tpm/src/crypt/*.c",
93 "TPMCmd/tpm/src/crypt/ossl/*.c",
[all …]
DREADME.md3 …tatus](https://travis-ci.org/Microsoft/ms-tpm-20-ref.svg?branch=master)](https://travis-ci.org/Mic…
5 …mentation of the [TPM 2.0 Specification](https://trustedcomputinggroup.org/tpm-library-specificati…
7 …ION`, `SPEC_YEAR` and `SPEC_DAY_OF_YEAR` values in the [TpmTypes.h](TPMCmd/tpm/include/TpmTypes.h)…
44 * If necessary, update the definitions of the following macros in the [VendorString.h](TPMCmd/tpm/i…
DCONTRIBUTING.md4 https://github.com/Microsoft/ms-tpm-20-ref/issues
13 https://trustedcomputinggroup.org/tpm-library-specification/
16 TPMCmd/tpm and its subdirectories, must be approved by TCG voting
/external/vboot_reference/utility/
Dchromeos-tpm-recovery-test9 rm -rf tpm-recovery-test-workdir
10 mkdir tpm-recovery-test-workdir
11 cd tpm-recovery-test-workdir
30 ctr=../chromeos-tpm-recovery
33 ctr=chromeos-tpm-recovery
58 if [ -e space.$index.data -a -e tpm-owned ]; then
83 rm -f tpm-owned
160 cat > tpm-nvtool <<"EOF"
180 if [ ! -f tpm-owned ]; then
198 if [ -f tpm-owned ]; then
[all …]
/external/linux-kselftest/tools/testing/selftests/tpm2/
Dtpm2_tests.py183 self.client.tpm.write(cmd)
184 hdr = self.client.tpm.read(10)
186 rsp = self.client.tpm.read()
200 self.client.tpm.write(cmd)
202 rsp1 = self.client.tpm.read(15)
205 self.client.tpm.write(cmd)
208 rsp2 = self.client.tpm.read()
223 self.client.tpm.write(cmd)
226 self.client.tpm.write(cmd)
227 rsp = self.client.tpm.read()
[all …]
Dtpm2.py364 self.tpm = open('/dev/tpm0', 'r+b', buffering=0)
366 self.tpm = open('/dev/tpmrm0', 'r+b', buffering=0)
369 flags = fcntl.fcntl(self.tpm, fcntl.F_GETFL)
371 fcntl.fcntl(self.tpm, fcntl.F_SETFL, flags)
375 if self.tpm:
376 self.tpm.close()
379 self.tpm.close()
382 self.tpm.write(cmd)
385 self.tpm_poll.register(self.tpm, select.POLLIN)
388 rsp = self.tpm.read()
[all …]
/external/gsc-utils/tpm_generated/
Dtpm_generated_test.cc121 Tpm tpm(&transceiver); in TEST() local
122 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST()
144 Tpm tpm(&transceiver); in TEST() local
145 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST()
255 Tpm tpm(&transceiver); in TEST() local
256 TPM_RC rc = tpm.CreatePrimarySync( in TEST()
347 Tpm tpm(&transceiver); in TEST_F() local
349 tpm.Startup(TPM_SU_CLEAR, &authorization, in TEST_F()
376 Tpm tpm(&transceiver); in TEST_F() local
377 tpm.Startup(TPM_SU_CLEAR, &authorization, in TEST_F()
[all …]
/external/ms-tpm-20-ref/TPMCmd/
DMakefile.am39 TPM_INC = -I $(srcdir)/tpm/include \
40 -I $(srcdir)/tpm/include/prototypes
43 libtpm = tpm/src/libtpm.a
Dconfigure.ac33 AC_INIT([ms-tpm-20-ref],
35 [https://github.com/microsoft/ms-tpm-20-ref/issues],
37 [https://github.com/microsoft/ms-tpm-20-ref])
46 dnl By enabling this feature tpm simulator gets seeds derived from hardware parameters.
52 …[tpm simulator get seeds derived from hardware parameters. Seeds are not derived from secure hardw…
/external/autotest/server/site_tests/firmware_TPMNotCorruptedDevMode/
Dfirmware_TPMNotCorruptedDevMode.py96 self.faft_client.tpm.stop_daemon()
102 self.faft_client.tpm.restart_daemon()
127 self.faft_client.tpm.stop_daemon()
136 self.faft_client.tpm.restart_daemon()
/external/autotest/server/site_tests/platform_InitLoginPerfServer/
Dcontrol16 This test clears the tpm owner, then goes through OOBE and verifies that the
17 user logs in, the tpm is initialized, and the device is prepared for enrollment.
18 It captures the performance data for tpm initialization, as well as first-boot
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/lib/
Dsub.mk2 create_lib_symlinks: ./lib/tpm/tpm_symlink ./lib/wolf/wolf_symlink
8 subdirs-y += tpm
/external/tpm2-tss/dist/
Dtpm-udev.rules1 # tpm devices can only be accessed by the tss user but the tss
3 KERNEL=="tpm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss"
/external/ltp/testscripts/
Dtpm_tools.sh146 if [ -d $P11DIR/var/lib/opencryptoki/tpm/$USER ]
148 rm -rf $P11DIR/var/lib/opencryptoki/tpm/$USER
170 $LTPROOT/bin/ltp-pan -d 5 -S -a $LTPROOT/results/tpm_tools -n ltp-tpm-tools -l $LTPROOT/results/tpm…
/external/ltp/testcases/kernel/security/integrity/ima/tests/
Dima_tpm.sh58 if [ -f /sys/class/tpm/tpm0/tpm_version_major ]; then
59 cat /sys/class/tpm/tpm0/tpm_version_major
63 if [ -f /sys/class/tpm/tpm0/device/caps -o \
74 if [ ! -d /sys/class/tpm/tpm0/ -a ! -d /sys/class/misc/tpm0/ ]; then
/external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/
Dfirmware_UpdateFirmwareVersion.py30 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version()
61 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_version()
74 if self.faft_client.tpm.get_firmware_version() != self.fw_ver_tpm:
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/
Dfirmware_UpdateFirmwareDataKeyVersion.py44 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version()
74 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_datakey_version()
89 if (self.faft_client.tpm.get_firmware_datakey_version() !=
/external/autotest/client/site_tests/platform_EncryptedStateful/
Dplatform_EncryptedStateful.py293 tpm = "/dev/tpm0"
294 off = "%s.off" % (tpm)
296 if os.path.exists(tpm):
297 utils.system("mv %s %s" % (tpm, off))
302 utils.system("mv %s %s" % (off, tpm))
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/
DREADME.md67 #### 6. Clone the ms-tpm-20-ref source code
70 git clone https://github.com/Microsoft/ms-tpm-20-ref.git
75 cd ~/ms-tpm-20-ref
87 …directory the optee_os TA devkit was compiled to in [step 5](#6-clone-the-ms-tpm-20-ref-source-code
93 cd ~/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta
/external/autotest/server/site_tests/firmware_ClearTPMOwnerAndReset/
Dcontrol7 PURPOSE = "Verify normal boot after clearing the tpm owner and rebooting the ec"
16 after the tpm owner has been cleared.
Dcontrol.stress7 PURPOSE = "Verify normal boot after clearing the tpm owner and rebooting the ec"
16 after the tpm owner has been cleared.
/external/autotest/server/site_tests/firmware_FAFTRPC/
Dcontrol.tpm8 NAME = "firmware_FAFTRPC.tpm"
34 category_under_test="tpm"
/external/autotest/server/site_tests/firmware_TPMVersionCheck/
Dcontrol.dev9 PURPOSE = "Crossystem reports the tpm versions correctly"
10 CRITERIA = "This test will fail if crossystem reports tpm version incorrectly"
/external/autotest/server/site_tests/firmware_TPMKernelVersion/
Dfirmware_TPMKernelVersion.py52 version = self.faft_client.tpm.get_kernel_version()
54 version = self.faft_client.tpm.get_kernel_datakey_version()

1234567891011