Home
last modified time | relevance | path

Searched refs:sensitive (Results 1 – 25 of 30) sorted by relevance

12

/system/tpm/trunks/
Dtpm_generated_test.cc144 std::string sensitive( in TEST() local
201 sensitive + public_data + outside + pcr_select; in TEST()
220 in_sensitive.sensitive.user_auth.size = 1; in TEST()
221 in_sensitive.sensitive.user_auth.buffer[0] = 'a'; in TEST()
222 in_sensitive.sensitive.data.size = 0; in TEST()
Dtpm_utility_impl.cc800 in_sensitive.sensitive.rsa = Make_TPM2B_PRIVATE_KEY_RSA(prime_factor); in ImportRSAKey()
890 TPMS_SENSITIVE_CREATE sensitive; in CreateRSAKeyPair() local
891 sensitive.user_auth = Make_TPM2B_DIGEST(password); in CreateRSAKeyPair()
892 sensitive.data = Make_TPM2B_SENSITIVE_DATA(""); in CreateRSAKeyPair()
894 Make_TPM2B_SENSITIVE_CREATE(sensitive); in CreateRSAKeyPair()
1026 TPMS_SENSITIVE_CREATE sensitive; in SealData() local
1027 sensitive.user_auth = Make_TPM2B_DIGEST(""); in SealData()
1028 sensitive.data = Make_TPM2B_SENSITIVE_DATA(data_to_seal); in SealData()
1030 Make_TPM2B_SENSITIVE_CREATE(sensitive); in SealData()
1512 TPMS_SENSITIVE_CREATE sensitive; in CreateStorageRootKeys() local
[all …]
Dtpm_utility_test.cc1175 EXPECT_EQ(sensitive_data.sensitive_area.sensitive.rsa.size, in TEST_F()
1177 EXPECT_EQ(0, memcmp(sensitive_data.sensitive_area.sensitive.rsa.buffer, in TEST_F()
1306 EXPECT_EQ(sensitive_create.sensitive.user_auth.size, key_auth.size()); in TEST_F()
1307 EXPECT_EQ(0, memcmp(sensitive_create.sensitive.user_auth.buffer, in TEST_F()
1407 EXPECT_EQ(sensitive_create.sensitive.data.size, data_to_seal.size()); in TEST_F()
1408 EXPECT_EQ(0, memcmp(sensitive_create.sensitive.data.buffer, in TEST_F()
/system/sepolicy/prebuilts/api/26.0/private/
Ddomain.te6 # Limit ability to ptrace or read sensitive /proc/pid files of processes
Dblkid_untrusted.te20 # Untrusted blkid should never be run on block devices holding sensitive data
Dsystem_server.te737 # CAP_SYS_RESOURCE was traditionally needed for sensitive /proc/PID
/system/sepolicy/private/
Ddomain.te6 # Limit ability to ptrace or read sensitive /proc/pid files of processes
Dblkid_untrusted.te20 # Untrusted blkid should never be run on block devices holding sensitive data
Dsystem_server.te768 # CAP_SYS_RESOURCE was traditionally needed for sensitive /proc/PID
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te32 # Untrusted fsck should never be run on block devices holding sensitive data
Dhal_neverallows.te28 # 1) Security sensitive components should only be accessed by specific HALs.
Ddumpstate.te207 # accessing sensitive /proc/PID files, never for using ptrace attach.
Dshell.te174 # limit shell access to sensitive char drivers to
Dfile.te7 # Security-sensitive proc nodes that should not be writable to most.
Ddomain.te315 # security-sensitive proc settings.
/system/sepolicy/public/
Dfsck_untrusted.te32 # Untrusted fsck should never be run on block devices holding sensitive data
Dhal_neverallows.te27 # 1) Security sensitive components should only be accessed by specific HALs.
Dshell.te175 # limit shell access to sensitive char drivers to
Ddumpstate.te242 # accessing sensitive /proc/PID files, never for using ptrace attach.
Dfile.te7 # Security-sensitive proc nodes that should not be writable to most.
Ddomain.te318 # security-sensitive proc settings.
/system/tpm/trunks/generator/
Draw_commands_fixed.txt1375 a) The public and sensitive portions
4186 data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate). Pr…
4193 sensitive area loaded.
4198 The sensitive parameter may be encrypted using parameter encryption.
4205 The TPM will create new data for the sensitive area and compute a TPMT_PUBLIC.unique from the
4206 sensitive area based on the object type:
4209 TPMT_SENSITIVE.sensitive.sym. The size of the key will be determined by
4213 inSensitive.data to TPMT_SENSITIVE.sensitive.sym of the new object.
4214 3) A TPM-generated obfuscation value is placed in TPMT_SENSITIVE.sensitive.seedValue. The
4216 value prevents the public unique value from leaking information about the sensitive area.
[all …]
Draw_commands.txt1375 a) The public and sensitive portions
4184 data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate). Pr…
4191 sensitive area loaded.
4196 The sensitive parameter may be encrypted using parameter encryption.
4203 The TPM will create new data for the sensitive area and compute a TPMT_PUBLIC.unique from the
4204 sensitive area based on the object type:
4207 TPMT_SENSITIVE.sensitive.sym. The size of the key will be determined by
4211 inSensitive.data to TPMT_SENSITIVE.sensitive.sym of the new object.
4212 3) A TPM-generated obfuscation value is placed in TPMT_SENSITIVE.sensitive.seedValue. The
4214 value prevents the public unique value from leaking information about the sensitive area.
[all …]
Draw_structures.txt2698 …orithm ID is often used like a tag to determine the type of a structure in a context-sensitive way.
4963 the sensitive area did not unmarshal correctly after
5200 public and sensitive portions of an object are not
5823 Table 18 defines the structure tags values. The definition of many structures is context-sensitive
7996 TPM2_CreatePrimary(), the TPM generated all of the sensitive data other than
7998 CLEAR (0): A portion of the sensitive data, other than the authValue, was
8135 public and sensitive portions of the object are loaded
8182 shall be CLEAR if both the public and sensitive portions are loaded or if fixedParent is
8254 shall be CLEAR if both the public and sensitive portions are loaded; otherwise it may be
8262 TPM2_CreatePrimary(). If CLEAR, it indicates that the sensitive part of the object (other than the
[all …]
Draw_structures_fixed.txt2700 …orithm ID is often used like a tag to determine the type of a structure in a context-sensitive way.
4959 the sensitive area did not unmarshal correctly after
5194 public and sensitive portions of an object are not
5817 Table 18 defines the structure tags values. The definition of many structures is context-sensitive
8024 TPM2_CreatePrimary(), the TPM generated all of the sensitive data other than
8026 CLEAR (0): A portion of the sensitive data, other than the authValue, was
8163 public and sensitive portions of the object are loaded
8210 shall be CLEAR if both the public and sensitive portions are loaded or if fixedParent is
8282 shall be CLEAR if both the public and sensitive portions are loaded; otherwise it may be
8290 TPM2_CreatePrimary(). If CLEAR, it indicates that the sensitive part of the object (other than the
[all …]

12