Home
last modified time | relevance | path

Searched refs:authorization (Results 1 – 22 of 22) sorted by relevance

/system/tpm/trunks/
Dhmac_authorization_delegate_test.cc129 std::string authorization; in TEST_F() local
132 &authorization)); in TEST_F()
133 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND(&authorization, in TEST_F()
156 &authorization)); in TEST_F()
157 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND(&authorization, in TEST_F()
172 std::string authorization; in TEST_F() local
174 &authorization)); in TEST_F()
177 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND(&authorization, in TEST_F()
200 std::string authorization; in TEST_F() local
202 &authorization)); in TEST_F()
[all …]
Dtpm_generated_test.cc107 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local
108 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST()
111 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST()
128 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local
129 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST()
132 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST()
194 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local
195 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST()
197 EXPECT_CALL(authorization, CheckResponseAuthorization(_, auth_out)) in TEST()
199 EXPECT_CALL(authorization, EncryptCommandParameter(_)) in TEST()
[all …]
Dpassword_authorization_delegate.cc38 std::string* authorization) { in GetCommandAuthorization() argument
45 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
55 const std::string& authorization) { in CheckResponseAuthorization() argument
57 std::string mutable_auth_string(authorization); in CheckResponseAuthorization()
62 if (authorization.size() != auth_bytes.size()) { in CheckResponseAuthorization()
Dpassword_authorization_delegate_test.cc43 std::string authorization; in TEST() local
47 &authorization); in TEST()
49 EXPECT_EQ(authorization.length(), expected_auth.length()); in TEST()
50 EXPECT_EQ(expected_auth.compare(authorization), 0); in TEST()
Dauthorization_delegate.h44 std::string* authorization) = 0;
51 const std::string& authorization) = 0;
Dpassword_authorization_delegate.h44 std::string* authorization) override;
46 const std::string& authorization) override;
Dhmac_authorization_delegate.cc58 std::string* authorization) { in GetCommandAuthorization() argument
60 authorization->clear(); in GetCommandAuthorization()
101 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
111 const std::string& authorization) { in CheckResponseAuthorization() argument
116 std::string mutable_auth_string(authorization); in CheckResponseAuthorization()
Dhmac_authorization_delegate.h70 std::string* authorization) override;
72 const std::string& authorization) override;
Dresource_manager_test.cc83 const std::string& authorization, in CreateCommand() argument
86 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateCommand()
87 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateCommand()
88 parameters.size() + (authorization.empty() ? 0 : 4); in CreateCommand()
95 if (!authorization.empty()) { in CreateCommand()
96 Serialize_UINT32(authorization.size(), &buffer); in CreateCommand()
98 return buffer + authorization + parameters; in CreateCommand()
104 const std::string& authorization, in CreateResponse() argument
107 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateResponse()
108 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateResponse()
[all …]
Dtpm_utility_impl.h172 AuthorizationDelegate* authorization);
176 TPM_RC DisablePlatformHierarchy(AuthorizationDelegate* authorization);
Dtrunks_factory_for_test.cc363 std::string* authorization) override { in GetCommandAuthorization() argument
368 authorization); in GetCommandAuthorization()
372 const std::string& authorization) override { in CheckResponseAuthorization() argument
373 return target_->CheckResponseAuthorization(response_hash, authorization); in CheckResponseAuthorization()
Dtpm_utility_impl.cc109 scoped_ptr<AuthorizationDelegate> authorization( in Clear() local
113 authorization.get()); in Clear()
171 scoped_ptr<AuthorizationDelegate> authorization( in InitializeTpm() local
173 result = DisablePlatformHierarchy(authorization.get()); in InitializeTpm()
1217 TPM2B_AUTH authorization = Make_TPM2B_DIGEST(""); in DefineNVSpace() local
1222 authorization, in DefineNVSpace()
1732 AuthorizationDelegate* authorization) { in SetHierarchyAuthorization() argument
1742 authorization); in SetHierarchyAuthorization()
1746 AuthorizationDelegate* authorization) { in DisablePlatformHierarchy() argument
1752 authorization); in DisablePlatformHierarchy()
Dresource_manager.cc564 TPM2B_DIGEST authorization; in ParseCommand() local
565 result = Parse_TPM2B_DIGEST(&buffer, &authorization, nullptr); in ParseCommand()
Dmock_tpm.h1299 void(const TPMI_RH_PLATFORM& authorization,
1308 TPM_RC(const TPMI_RH_PLATFORM& authorization,
Dtpm_generated.h6038 const TPMI_RH_PLATFORM& authorization,
6050 const TPMI_RH_PLATFORM& authorization,
6059 const TPMI_RH_PLATFORM& authorization,
Dtpm_generated.cc33892 const TPMI_RH_PLATFORM& authorization, in SerializeCommand_FieldUpgradeStart() argument
33918 authorization, in SerializeCommand_FieldUpgradeStart()
34132 const TPMI_RH_PLATFORM& authorization, in FieldUpgradeStart() argument
34149 authorization, in FieldUpgradeStart()
34165 const TPMI_RH_PLATFORM& authorization, in FieldUpgradeStartSync() argument
34175 authorization, in FieldUpgradeStartSync()
/system/tpm/trunks/generator/
Draw_commands.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization
1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
1035 session. The authorization sessions associated with handles will occur in the session area in the
1037 audit will follow the handles used for authorization.
1060 USER and the handle is an Object, the type of authorization is determined by the setting of
1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
Draw_commands_fixed.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization
1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
1035 session. The authorization sessions associated with handles will occur in the session area in the
1037 audit will follow the handles used for authorization.
1060 USER and the handle is an Object, the type of authorization is determined by the setting of
1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
Draw_structures.txt3330 Any command with an authorization value may cause an NV write
3331 on an authorization failure but the command does not complete
4321 authorization-session nonce associated with the command.
4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4346 command and will not close the authorization sessions used by the command. Audit digests will not be
4349 failure due to an authorization failure may update the dictionary-attack protection values.
4755 authorization handle is not correct for command
4761 command requires an authorization session for
4879 use of an authorization session with a context
4904 NV access authorization fails in command actions
[all …]
Draw_structures_fixed.txt3324 Any command with an authorization value may cause an NV write
3325 on an authorization failure but the command does not complete
4315 authorization-session nonce associated with the command.
4339 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4340 command and will not close the authorization sessions used by the command. Audit digests will not be
4343 failure due to an authorization failure may update the dictionary-attack protection values.
4749 authorization handle is not correct for command
4755 command requires an authorization session for
4873 use of an authorization session with a context
4898 NV access authorization fails in command actions
[all …]
/system/tpm/attestation/common/
Ddatabase.proto55 // The authorization secret.
/system/core/
DNOTICE324 authorization of the copyright holder.