/system/tpm/trunks/ |
D | hmac_authorization_delegate_test.cc | 129 std::string authorization; in TEST_F() local 132 &authorization)); in TEST_F() 133 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND(&authorization, in TEST_F() 156 &authorization)); in TEST_F() 157 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND(&authorization, in TEST_F() 172 std::string authorization; in TEST_F() local 174 &authorization)); in TEST_F() 177 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND(&authorization, in TEST_F() 200 std::string authorization; in TEST_F() local 202 &authorization)); in TEST_F() [all …]
|
D | tpm_generated_test.cc | 107 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local 108 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST() 111 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST() 128 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local 129 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST() 132 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST() 194 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local 195 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST() 197 EXPECT_CALL(authorization, CheckResponseAuthorization(_, auth_out)) in TEST() 199 EXPECT_CALL(authorization, EncryptCommandParameter(_)) in TEST() [all …]
|
D | password_authorization_delegate.cc | 38 std::string* authorization) { in GetCommandAuthorization() argument 45 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization() 55 const std::string& authorization) { in CheckResponseAuthorization() argument 57 std::string mutable_auth_string(authorization); in CheckResponseAuthorization() 62 if (authorization.size() != auth_bytes.size()) { in CheckResponseAuthorization()
|
D | password_authorization_delegate_test.cc | 43 std::string authorization; in TEST() local 47 &authorization); in TEST() 49 EXPECT_EQ(authorization.length(), expected_auth.length()); in TEST() 50 EXPECT_EQ(expected_auth.compare(authorization), 0); in TEST()
|
D | authorization_delegate.h | 44 std::string* authorization) = 0; 51 const std::string& authorization) = 0;
|
D | password_authorization_delegate.h | 44 std::string* authorization) override; 46 const std::string& authorization) override;
|
D | hmac_authorization_delegate.cc | 58 std::string* authorization) { in GetCommandAuthorization() argument 60 authorization->clear(); in GetCommandAuthorization() 101 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization() 111 const std::string& authorization) { in CheckResponseAuthorization() argument 116 std::string mutable_auth_string(authorization); in CheckResponseAuthorization()
|
D | hmac_authorization_delegate.h | 70 std::string* authorization) override; 72 const std::string& authorization) override;
|
D | resource_manager_test.cc | 83 const std::string& authorization, in CreateCommand() argument 86 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateCommand() 87 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateCommand() 88 parameters.size() + (authorization.empty() ? 0 : 4); in CreateCommand() 95 if (!authorization.empty()) { in CreateCommand() 96 Serialize_UINT32(authorization.size(), &buffer); in CreateCommand() 98 return buffer + authorization + parameters; in CreateCommand() 104 const std::string& authorization, in CreateResponse() argument 107 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateResponse() 108 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateResponse() [all …]
|
D | tpm_utility_impl.h | 172 AuthorizationDelegate* authorization); 176 TPM_RC DisablePlatformHierarchy(AuthorizationDelegate* authorization);
|
D | trunks_factory_for_test.cc | 363 std::string* authorization) override { in GetCommandAuthorization() argument 368 authorization); in GetCommandAuthorization() 372 const std::string& authorization) override { in CheckResponseAuthorization() argument 373 return target_->CheckResponseAuthorization(response_hash, authorization); in CheckResponseAuthorization()
|
D | tpm_utility_impl.cc | 109 scoped_ptr<AuthorizationDelegate> authorization( in Clear() local 113 authorization.get()); in Clear() 171 scoped_ptr<AuthorizationDelegate> authorization( in InitializeTpm() local 173 result = DisablePlatformHierarchy(authorization.get()); in InitializeTpm() 1217 TPM2B_AUTH authorization = Make_TPM2B_DIGEST(""); in DefineNVSpace() local 1222 authorization, in DefineNVSpace() 1732 AuthorizationDelegate* authorization) { in SetHierarchyAuthorization() argument 1742 authorization); in SetHierarchyAuthorization() 1746 AuthorizationDelegate* authorization) { in DisablePlatformHierarchy() argument 1752 authorization); in DisablePlatformHierarchy()
|
D | resource_manager.cc | 564 TPM2B_DIGEST authorization; in ParseCommand() local 565 result = Parse_TPM2B_DIGEST(&buffer, &authorization, nullptr); in ParseCommand()
|
D | mock_tpm.h | 1299 void(const TPMI_RH_PLATFORM& authorization, 1308 TPM_RC(const TPMI_RH_PLATFORM& authorization,
|
D | tpm_generated.h | 6038 const TPMI_RH_PLATFORM& authorization, 6050 const TPMI_RH_PLATFORM& authorization, 6059 const TPMI_RH_PLATFORM& authorization,
|
D | tpm_generated.cc | 33892 const TPMI_RH_PLATFORM& authorization, in SerializeCommand_FieldUpgradeStart() argument 33918 authorization, in SerializeCommand_FieldUpgradeStart() 34132 const TPMI_RH_PLATFORM& authorization, in FieldUpgradeStart() argument 34149 authorization, in FieldUpgradeStart() 34165 const TPMI_RH_PLATFORM& authorization, in FieldUpgradeStartSync() argument 34175 authorization, in FieldUpgradeStartSync()
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization 1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 1035 session. The authorization sessions associated with handles will occur in the session area in the 1037 audit will follow the handles used for authorization. 1060 USER and the handle is an Object, the type of authorization is determined by the setting of 1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
D | raw_commands_fixed.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization 1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 1035 session. The authorization sessions associated with handles will occur in the session area in the 1037 audit will follow the handles used for authorization. 1060 USER and the handle is an Object, the type of authorization is determined by the setting of 1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
D | raw_structures.txt | 3330 Any command with an authorization value may cause an NV write 3331 on an authorization failure but the command does not complete 4321 authorization-session nonce associated with the command. 4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the 4346 command and will not close the authorization sessions used by the command. Audit digests will not be 4349 failure due to an authorization failure may update the dictionary-attack protection values. 4755 authorization handle is not correct for command 4761 command requires an authorization session for 4879 use of an authorization session with a context 4904 NV access authorization fails in command actions [all …]
|
D | raw_structures_fixed.txt | 3324 Any command with an authorization value may cause an NV write 3325 on an authorization failure but the command does not complete 4315 authorization-session nonce associated with the command. 4339 When a command fails, the TPM shall not update the authorization-session nonces associated with the 4340 command and will not close the authorization sessions used by the command. Audit digests will not be 4343 failure due to an authorization failure may update the dictionary-attack protection values. 4749 authorization handle is not correct for command 4755 command requires an authorization session for 4873 use of an authorization session with a context 4898 NV access authorization fails in command actions [all …]
|
/system/tpm/attestation/common/ |
D | database.proto | 55 // The authorization secret.
|
/system/core/ |
D | NOTICE | 324 authorization of the copyright holder.
|