/system/tpm/trunks/ |
D | hmac_authorization_delegate_test.cc | 129 std::string authorization; in TEST_F() local 132 &authorization)); in TEST_F() 134 Parse_TPMS_AUTH_COMMAND(&authorization, &auth_command, nullptr)); in TEST_F() 152 &authorization)); in TEST_F() 154 Parse_TPMS_AUTH_COMMAND(&authorization, &auth_command, nullptr)); in TEST_F() 165 std::string authorization; in TEST_F() local 167 &authorization)); in TEST_F() 171 &authorization, &auth_command, &auth_bytes)); in TEST_F() 191 std::string authorization; in TEST_F() local 193 Serialize_TPMS_AUTH_RESPONSE(auth_response, &authorization)); in TEST_F() [all …]
|
D | tpm_generated_test.cc | 108 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local 109 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST() 112 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST() 131 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local 132 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST() 135 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); in TEST() 209 StrictMock<MockAuthorizationDelegate> authorization; in TEST() local 210 EXPECT_CALL(authorization, GetCommandAuthorization(_, _, _, _)) in TEST() 212 EXPECT_CALL(authorization, CheckResponseAuthorization(_, auth_out)) in TEST() 214 EXPECT_CALL(authorization, EncryptCommandParameter(_)).WillOnce(Return(true)); in TEST() [all …]
|
D | password_authorization_delegate.cc | 38 std::string* authorization) { in GetCommandAuthorization() argument 45 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization() 55 const std::string& authorization) { in CheckResponseAuthorization() argument 57 std::string mutable_auth_string(authorization); in CheckResponseAuthorization() 62 if (authorization.size() != auth_bytes.size()) { in CheckResponseAuthorization()
|
D | password_authorization_delegate_test.cc | 44 std::string authorization; in TEST() local 47 command_hash, false, false, &authorization); in TEST() 49 EXPECT_EQ(authorization.length(), expected_auth.length()); in TEST() 50 EXPECT_EQ(expected_auth.compare(authorization), 0); in TEST()
|
D | authorization_delegate.h | 44 std::string* authorization) = 0; 51 const std::string& authorization) = 0;
|
D | password_authorization_delegate.h | 44 std::string* authorization) override; 46 const std::string& authorization) override;
|
D | hmac_authorization_delegate.cc | 57 std::string* authorization) { in GetCommandAuthorization() argument 59 authorization->clear(); in GetCommandAuthorization() 101 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization() 111 const std::string& authorization) { in CheckResponseAuthorization() argument 116 std::string mutable_auth_string(authorization); in CheckResponseAuthorization()
|
D | hmac_authorization_delegate.h | 70 std::string* authorization) override; 72 const std::string& authorization) override;
|
D | resource_manager_test.cc | 79 const std::string& authorization, in CreateCommand() argument 82 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateCommand() 83 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateCommand() 84 parameters.size() + (authorization.empty() ? 0 : 4); in CreateCommand() 91 if (!authorization.empty()) { in CreateCommand() 92 Serialize_UINT32(authorization.size(), &buffer); in CreateCommand() 94 return buffer + authorization + parameters; in CreateCommand() 100 const std::string& authorization, in CreateResponse() argument 103 TPM_ST tag = authorization.empty() ? TPM_ST_NO_SESSIONS : TPM_ST_SESSIONS; in CreateResponse() 104 UINT32 size = 10 + (handles.size() * 4) + authorization.size() + in CreateResponse() [all …]
|
D | tpm_utility_impl.h | 188 AuthorizationDelegate* authorization); 192 TPM_RC DisablePlatformHierarchy(AuthorizationDelegate* authorization);
|
D | trunks_factory_for_test.cc | 366 std::string* authorization) override { in GetCommandAuthorization() argument 369 is_response_parameter_encryption_possible, authorization); in GetCommandAuthorization() 373 const std::string& authorization) override { in CheckResponseAuthorization() argument 374 return target_->CheckResponseAuthorization(response_hash, authorization); in CheckResponseAuthorization()
|
D | tpm_utility_impl.cc | 109 std::unique_ptr<AuthorizationDelegate> authorization( in Clear() local 112 TPM_RH_PLATFORM, NameFromHandle(TPM_RH_PLATFORM), authorization.get()); in Clear() 173 std::unique_ptr<AuthorizationDelegate> authorization( in InitializeTpm() local 175 result = DisablePlatformHierarchy(authorization.get()); in InitializeTpm() 1179 TPM2B_AUTH authorization = Make_TPM2B_DIGEST(authorization_value); in DefineNVSpace() local 1182 TPM_RH_OWNER, NameFromHandle(TPM_RH_OWNER), authorization, public_area, in DefineNVSpace() 1717 AuthorizationDelegate* authorization) { in SetHierarchyAuthorization() argument 1726 authorization); in SetHierarchyAuthorization() 1730 AuthorizationDelegate* authorization) { in DisablePlatformHierarchy() argument 1736 authorization); in DisablePlatformHierarchy()
|
D | resource_manager.cc | 552 TPM2B_DIGEST authorization; in ParseCommand() local 553 result = Parse_TPM2B_DIGEST(&buffer, &authorization, nullptr); in ParseCommand()
|
D | mock_tpm.h | 1298 void(const TPMI_RH_PLATFORM& authorization, 1307 TPM_RC(const TPMI_RH_PLATFORM& authorization,
|
D | tpm_generated.h | 5516 const TPMI_RH_PLATFORM& authorization, 5527 virtual void FieldUpgradeStart(const TPMI_RH_PLATFORM& authorization, 5536 const TPMI_RH_PLATFORM& authorization,
|
/system/tpm/tpm_manager/server/ |
D | tpm2_nvram_impl.cc | 213 trunks::AuthorizationDelegate* authorization = nullptr; in WriteSpace() local 232 authorization = policy_session->GetDelegate(); in WriteSpace() 235 authorization = trunks_session_->GetDelegate(); in WriteSpace() 242 authorization = trunks_session_->GetDelegate(); in WriteSpace() 249 authorization); in WriteSpace() 278 trunks::AuthorizationDelegate* authorization = nullptr; in ReadSpace() local 294 authorization = policy_session->GetDelegate(); in ReadSpace() 297 authorization = trunks_session_->GetDelegate(); in ReadSpace() 304 authorization = trunks_session_->GetDelegate(); in ReadSpace() 311 data, authorization); in ReadSpace() [all …]
|
/system/tpm/tpm_manager/common/ |
D | tpm_manager.proto | 37 // be due to a bad authorization value or to system state. 63 // The space requires an authorization value for writing. 65 // The space requires an authorization value for reading. 91 // enforcing any authorization value.
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization 1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 1035 session. The authorization sessions associated with handles will occur in the session area in the 1037 audit will follow the handles used for authorization. 1060 USER and the handle is an Object, the type of authorization is determined by the setting of 1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
D | raw_commands.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization 1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 1035 session. The authorization sessions associated with handles will occur in the session area in the 1037 audit will follow the handles used for authorization. 1060 USER and the handle is an Object, the type of authorization is determined by the setting of 1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
D | raw_structures.txt | 3330 Any command with an authorization value may cause an NV write 3331 on an authorization failure but the command does not complete 4321 authorization-session nonce associated with the command. 4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the 4346 command and will not close the authorization sessions used by the command. Audit digests will not be 4349 failure due to an authorization failure may update the dictionary-attack protection values. 4755 authorization handle is not correct for command 4761 command requires an authorization session for 4879 use of an authorization session with a context 4904 NV access authorization fails in command actions [all …]
|
D | raw_structures_fixed.txt | 3324 Any command with an authorization value may cause an NV write 3325 on an authorization failure but the command does not complete 4315 authorization-session nonce associated with the command. 4339 When a command fails, the TPM shall not update the authorization-session nonces associated with the 4340 command and will not close the authorization sessions used by the command. Audit digests will not be 4343 failure due to an authorization failure may update the dictionary-attack protection values. 4749 authorization handle is not correct for command 4755 command requires an authorization session for 4873 use of an authorization session with a context 4898 NV access authorization fails in command actions [all …]
|
/system/tpm/attestation/common/ |
D | database.proto | 55 // The authorization secret.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | app_neverallows.te | 128 # or must not rely on app identity for authorization. Thus, to be safe, the
|
/system/sepolicy/private/ |
D | app_neverallows.te | 133 # or must not rely on app identity for authorization. Thus, to be safe, the
|
/system/core/ |
D | NOTICE | 324 authorization of the copyright holder.
|