Home
last modified time | relevance | path

Searched refs:authorization (Results 1 – 25 of 26) sorted by relevance

12

/system/tpm/trunks/
Dhmac_authorization_delegate_test.cc129 std::string authorization; in TEST_F() local
132 &authorization)); in TEST_F()
134 Parse_TPMS_AUTH_COMMAND(&authorization, &auth_command, nullptr)); in TEST_F()
152 &authorization)); in TEST_F()
154 Parse_TPMS_AUTH_COMMAND(&authorization, &auth_command, nullptr)); in TEST_F()
165 std::string authorization; in TEST_F() local
167 &authorization)); in TEST_F()
171 &authorization, &auth_command, &auth_bytes)); in TEST_F()
191 std::string authorization; in TEST_F() local
193 Serialize_TPMS_AUTH_RESPONSE(auth_response, &authorization)); in TEST_F()
[all …]
Dtpm_generated_test.cc108 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local
109 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST()
112 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST()
131 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local
132 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST()
135 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST()
209 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local
210 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST()
212 EXPECT_CALL(authorization, CheckResponseAuthorization(_, auth_out)) in TEST()
214 EXPECT_CALL(authorization, EncryptCommandParameter(_)).WillOnce(Return(true)); in TEST()
[all …]
Dpassword_authorization_delegate.cc38 std::string* authorization) { in GetCommandAuthorization() argument
45 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
55 const std::string& authorization) { in CheckResponseAuthorization() argument
57 std::string mutable_auth_string(authorization); in CheckResponseAuthorization()
62 if (authorization.size() != auth_bytes.size()) { in CheckResponseAuthorization()
Dpassword_authorization_delegate_test.cc44 std::string authorization; in TEST() local
47 command_hash, false, false, &authorization); in TEST()
49 EXPECT_EQ(authorization.length(), expected_auth.length()); in TEST()
50 EXPECT_EQ(expected_auth.compare(authorization), 0); in TEST()
Dauthorization_delegate.h44 std::string* authorization) = 0;
51 const std::string& authorization) = 0;
Dpassword_authorization_delegate.h44 std::string* authorization) override;
46 const std::string& authorization) override;
Dhmac_authorization_delegate.cc57 std::string* authorization) { in GetCommandAuthorization() argument
59 authorization->clear(); in GetCommandAuthorization()
101 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
111 const std::string& authorization) { in CheckResponseAuthorization() argument
116 std::string mutable_auth_string(authorization); in CheckResponseAuthorization()
Dhmac_authorization_delegate.h70 std::string* authorization) override;
72 const std::string& authorization) override;
Dresource_manager_test.cc79 const std::string& authorization, in CreateCommand() argument
82 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateCommand()
83 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateCommand()
84 parameters.size() + (authorization.empty() ? 0 : 4); in CreateCommand()
91 if (!authorization.empty()) { in CreateCommand()
92 Serialize_UINT32(authorization.size(), &buffer); in CreateCommand()
94 return buffer + authorization + parameters; in CreateCommand()
100 const std::string& authorization, in CreateResponse() argument
103 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateResponse()
104 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateResponse()
[all …]
Dtpm_utility_impl.h188 AuthorizationDelegate* authorization);
192 TPM_RC DisablePlatformHierarchy(AuthorizationDelegate* authorization);
Dtrunks_factory_for_test.cc366 std::string* authorization) override { in GetCommandAuthorization() argument
369 is_response_parameter_encryption_possible, authorization); in GetCommandAuthorization()
373 const std::string& authorization) override { in CheckResponseAuthorization() argument
374 return target_->CheckResponseAuthorization(response_hash, authorization); in CheckResponseAuthorization()
Dtpm_utility_impl.cc109 std::unique_ptr<AuthorizationDelegate> authorization( in Clear() local
112 TPM_RH_PLATFORM, NameFromHandle(TPM_RH_PLATFORM), authorization.get()); in Clear()
173 std::unique_ptr<AuthorizationDelegate> authorization( in InitializeTpm() local
175 result = DisablePlatformHierarchy(authorization.get()); in InitializeTpm()
1179 TPM2B_AUTH authorization = Make_TPM2B_DIGEST(authorization_value); in DefineNVSpace() local
1182 TPM_RH_OWNER, NameFromHandle(TPM_RH_OWNER), authorization, public_area, in DefineNVSpace()
1717 AuthorizationDelegate* authorization) { in SetHierarchyAuthorization() argument
1726 authorization); in SetHierarchyAuthorization()
1730 AuthorizationDelegate* authorization) { in DisablePlatformHierarchy() argument
1736 authorization); in DisablePlatformHierarchy()
Dresource_manager.cc552 TPM2B_DIGEST authorization; in ParseCommand() local
553 result = Parse_TPM2B_DIGEST(&buffer, &authorization, nullptr); in ParseCommand()
Dmock_tpm.h1298 void(const TPMI_RH_PLATFORM& authorization,
1307 TPM_RC(const TPMI_RH_PLATFORM& authorization,
Dtpm_generated.h5516 const TPMI_RH_PLATFORM& authorization,
5527 virtual void FieldUpgradeStart(const TPMI_RH_PLATFORM& authorization,
5536 const TPMI_RH_PLATFORM& authorization,
/system/tpm/tpm_manager/server/
Dtpm2_nvram_impl.cc213 trunks::AuthorizationDelegate* authorization = nullptr; in WriteSpace() local
232 authorization = policy_session->GetDelegate(); in WriteSpace()
235 authorization = trunks_session_->GetDelegate(); in WriteSpace()
242 authorization = trunks_session_->GetDelegate(); in WriteSpace()
249 authorization); in WriteSpace()
278 trunks::AuthorizationDelegate* authorization = nullptr; in ReadSpace() local
294 authorization = policy_session->GetDelegate(); in ReadSpace()
297 authorization = trunks_session_->GetDelegate(); in ReadSpace()
304 authorization = trunks_session_->GetDelegate(); in ReadSpace()
311 data, authorization); in ReadSpace()
[all …]
/system/tpm/tpm_manager/common/
Dtpm_manager.proto37 // be due to a bad authorization value or to system state.
63 // The space requires an authorization value for writing.
65 // The space requires an authorization value for reading.
91 // enforcing any authorization value.
/system/tpm/trunks/generator/
Draw_commands_fixed.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization
1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
1035 session. The authorization sessions associated with handles will occur in the session area in the
1037 audit will follow the handles used for authorization.
1060 USER and the handle is an Object, the type of authorization is determined by the setting of
1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
Draw_commands.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization
1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
1035 session. The authorization sessions associated with handles will occur in the session area in the
1037 audit will follow the handles used for authorization.
1060 USER and the handle is an Object, the type of authorization is determined by the setting of
1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
Draw_structures.txt3330 Any command with an authorization value may cause an NV write
3331 on an authorization failure but the command does not complete
4321 authorization-session nonce associated with the command.
4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4346 command and will not close the authorization sessions used by the command. Audit digests will not be
4349 failure due to an authorization failure may update the dictionary-attack protection values.
4755 authorization handle is not correct for command
4761 command requires an authorization session for
4879 use of an authorization session with a context
4904 NV access authorization fails in command actions
[all …]
Draw_structures_fixed.txt3324 Any command with an authorization value may cause an NV write
3325 on an authorization failure but the command does not complete
4315 authorization-session nonce associated with the command.
4339 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4340 command and will not close the authorization sessions used by the command. Audit digests will not be
4343 failure due to an authorization failure may update the dictionary-attack protection values.
4749 authorization handle is not correct for command
4755 command requires an authorization session for
4873 use of an authorization session with a context
4898 NV access authorization fails in command actions
[all …]
/system/tpm/attestation/common/
Ddatabase.proto55 // The authorization secret.
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te128 # or must not rely on app identity for authorization. Thus, to be safe, the
/system/sepolicy/private/
Dapp_neverallows.te133 # or must not rely on app identity for authorization. Thus, to be safe, the
/system/core/
DNOTICE324 authorization of the copyright holder.

12