Searched refs:sensitive (Results 1 – 25 of 30) sorted by relevance
12
/system/tpm/trunks/ |
D | tpm_generated_test.cc | 144 std::string sensitive( in TEST() local 201 sensitive + public_data + outside + pcr_select; in TEST() 220 in_sensitive.sensitive.user_auth.size = 1; in TEST() 221 in_sensitive.sensitive.user_auth.buffer[0] = 'a'; in TEST() 222 in_sensitive.sensitive.data.size = 0; in TEST()
|
D | tpm_utility_impl.cc | 800 in_sensitive.sensitive.rsa = Make_TPM2B_PRIVATE_KEY_RSA(prime_factor); in ImportRSAKey() 890 TPMS_SENSITIVE_CREATE sensitive; in CreateRSAKeyPair() local 891 sensitive.user_auth = Make_TPM2B_DIGEST(password); in CreateRSAKeyPair() 892 sensitive.data = Make_TPM2B_SENSITIVE_DATA(""); in CreateRSAKeyPair() 894 Make_TPM2B_SENSITIVE_CREATE(sensitive); in CreateRSAKeyPair() 1026 TPMS_SENSITIVE_CREATE sensitive; in SealData() local 1027 sensitive.user_auth = Make_TPM2B_DIGEST(""); in SealData() 1028 sensitive.data = Make_TPM2B_SENSITIVE_DATA(data_to_seal); in SealData() 1030 Make_TPM2B_SENSITIVE_CREATE(sensitive); in SealData() 1512 TPMS_SENSITIVE_CREATE sensitive; in CreateStorageRootKeys() local [all …]
|
D | tpm_utility_test.cc | 1175 EXPECT_EQ(sensitive_data.sensitive_area.sensitive.rsa.size, in TEST_F() 1177 EXPECT_EQ(0, memcmp(sensitive_data.sensitive_area.sensitive.rsa.buffer, in TEST_F() 1306 EXPECT_EQ(sensitive_create.sensitive.user_auth.size, key_auth.size()); in TEST_F() 1307 EXPECT_EQ(0, memcmp(sensitive_create.sensitive.user_auth.buffer, in TEST_F() 1407 EXPECT_EQ(sensitive_create.sensitive.data.size, data_to_seal.size()); in TEST_F() 1408 EXPECT_EQ(0, memcmp(sensitive_create.sensitive.data.buffer, in TEST_F()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | domain.te | 6 # Limit ability to ptrace or read sensitive /proc/pid files of processes
|
D | blkid_untrusted.te | 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
D | system_server.te | 737 # CAP_SYS_RESOURCE was traditionally needed for sensitive /proc/PID
|
/system/sepolicy/private/ |
D | domain.te | 6 # Limit ability to ptrace or read sensitive /proc/pid files of processes
|
D | blkid_untrusted.te | 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
D | system_server.te | 768 # CAP_SYS_RESOURCE was traditionally needed for sensitive /proc/PID
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | fsck_untrusted.te | 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | hal_neverallows.te | 28 # 1) Security sensitive components should only be accessed by specific HALs.
|
D | dumpstate.te | 207 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
D | shell.te | 174 # limit shell access to sensitive char drivers to
|
D | file.te | 7 # Security-sensitive proc nodes that should not be writable to most.
|
D | domain.te | 315 # security-sensitive proc settings.
|
/system/sepolicy/public/ |
D | fsck_untrusted.te | 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | hal_neverallows.te | 27 # 1) Security sensitive components should only be accessed by specific HALs.
|
D | shell.te | 175 # limit shell access to sensitive char drivers to
|
D | dumpstate.te | 242 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
D | file.te | 7 # Security-sensitive proc nodes that should not be writable to most.
|
D | domain.te | 318 # security-sensitive proc settings.
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 1375 a) The public and sensitive portions 4186 data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate). Pr… 4193 sensitive area loaded. 4198 The sensitive parameter may be encrypted using parameter encryption. 4205 The TPM will create new data for the sensitive area and compute a TPMT_PUBLIC.unique from the 4206 sensitive area based on the object type: 4209 TPMT_SENSITIVE.sensitive.sym. The size of the key will be determined by 4213 inSensitive.data to TPMT_SENSITIVE.sensitive.sym of the new object. 4214 3) A TPM-generated obfuscation value is placed in TPMT_SENSITIVE.sensitive.seedValue. The 4216 value prevents the public unique value from leaking information about the sensitive area. [all …]
|
D | raw_commands.txt | 1375 a) The public and sensitive portions 4184 data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate). Pr… 4191 sensitive area loaded. 4196 The sensitive parameter may be encrypted using parameter encryption. 4203 The TPM will create new data for the sensitive area and compute a TPMT_PUBLIC.unique from the 4204 sensitive area based on the object type: 4207 TPMT_SENSITIVE.sensitive.sym. The size of the key will be determined by 4211 inSensitive.data to TPMT_SENSITIVE.sensitive.sym of the new object. 4212 3) A TPM-generated obfuscation value is placed in TPMT_SENSITIVE.sensitive.seedValue. The 4214 value prevents the public unique value from leaking information about the sensitive area. [all …]
|
D | raw_structures.txt | 2698 …orithm ID is often used like a tag to determine the type of a structure in a context-sensitive way. 4963 the sensitive area did not unmarshal correctly after 5200 public and sensitive portions of an object are not 5823 Table 18 defines the structure tags values. The definition of many structures is context-sensitive … 7996 TPM2_CreatePrimary(), the TPM generated all of the sensitive data other than 7998 CLEAR (0): A portion of the sensitive data, other than the authValue, was 8135 public and sensitive portions of the object are loaded 8182 shall be CLEAR if both the public and sensitive portions are loaded or if fixedParent is 8254 shall be CLEAR if both the public and sensitive portions are loaded; otherwise it may be 8262 TPM2_CreatePrimary(). If CLEAR, it indicates that the sensitive part of the object (other than the [all …]
|
D | raw_structures_fixed.txt | 2700 …orithm ID is often used like a tag to determine the type of a structure in a context-sensitive way. 4959 the sensitive area did not unmarshal correctly after 5194 public and sensitive portions of an object are not 5817 Table 18 defines the structure tags values. The definition of many structures is context-sensitive … 8024 TPM2_CreatePrimary(), the TPM generated all of the sensitive data other than 8026 CLEAR (0): A portion of the sensitive data, other than the authValue, was 8163 public and sensitive portions of the object are loaded 8210 shall be CLEAR if both the public and sensitive portions are loaded or if fixedParent is 8282 shall be CLEAR if both the public and sensitive portions are loaded; otherwise it may be 8290 TPM2_CreatePrimary(). If CLEAR, it indicates that the sensitive part of the object (other than the [all …]
|
12