HomeSort by relevance Sort by last modified time
    Searched refs:tpm (Results 1 - 25 of 51) sorted by null

1 2 3

  /external/epid-sdk/epid/member/tpm2/unittests/
nv-test.cc 16 /// TPM non volatile memory API unit tests.
42 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
61 if (kEpidNoErr != Tpm2NvRead(tpm, nv_index, sizeof(data), 0, &data)) {
63 Tpm2NvDefineSpace(tpm, nv_index, sizeof(MembershipCredential)));
67 Tpm2NvWrite(tpm, nv_index, sizeof(credential), 0, &credential));
70 EXPECT_EQ(kEpidNoErr, Tpm2NvRead(tpm, nv_index, sizeof(data), 0, &data));
72 THROW_ON_EPIDERR(Tpm2NvUndefineSpace(tpm, nv_index));
78 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
87 Tpm2NvDefineSpace(tpm, nv_index, data1_src.size() + data2_src.size()));
90 Tpm2NvWrite(tpm, nv_index, data1_src.size(), 0, data1_src.data()))
    [all...]
getrandom-test.cc 16 /// TPM GetRandom unit tests.
39 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
41 EXPECT_EQ(kEpidBadArgErr, Tpm2GetRandom(tpm, 48 * 8, nullptr));
47 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
51 EXPECT_EQ(kEpidNoErr, Tpm2GetRandom(tpm, length * CHAR_BIT, buf1.data()));
52 EXPECT_EQ(kEpidNoErr, Tpm2GetRandom(tpm, length * CHAR_BIT, buf2.data()));
59 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
63 EXPECT_EQ(kEpidNoErr, Tpm2GetRandom(tpm, length * CHAR_BIT, buf.data()));
sign-test.cc 16 /// TPM Sign unit tests.
39 // Verify signature computed by TPM ECDAA scheme:
81 // create TPM context
85 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &f, epid2params);
86 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256));
88 EXPECT_EQ(kEpidNoErr, Tpm2LoadExternal(tpm, &f));
98 Tpm2Commit(tpm, p2, this->kS2Sha256.data(), this->kS2Sha256.size(),
105 Tpm2Sign(tpm, this->kDigestSha256, sizeof(this->kDigestSha256),
115 // create TPM context
119 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &f, epid2params)
    [all...]
commit-test.cc 48 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params);
49 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256));
50 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue));
55 EXPECT_EQ(kEpidBadArgErr, Tpm2Commit(tpm, p1, nullptr, this->kS2Sha256.size(),
59 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(),
63 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(),
66 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(),
69 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(),
72 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(),
85 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params)
    [all...]
sign-simulator-test.cc 16 /// TPM Sign unit tests.
45 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params);
46 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256));
47 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue));
49 Tpm2Commit(tpm, nullptr, nullptr, 0, nullptr, k, l, e, &counter));
52 Tpm2Sign(tpm, this->kDigestSha256, sizeof(this->kDigestSha256),
commit-simulator-test.cc 50 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params);
51 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256));
52 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue));
55 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(),
57 THROW_ON_EPIDERR(Tpm2ReleaseCounter(tpm, counter));
94 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params);
95 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha384));
96 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue));
99 Tpm2Commit(tpm, p1, this->kS2Sha384.data(), this->kS2Sha384.size(),
101 THROW_ON_EPIDERR(Tpm2ReleaseCounter(tpm, counter))
    [all...]
  /external/epid-sdk/epid/member/unittests/
storage-test.cc 42 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
53 tpm, nullptr, &credential, nv_index));
55 EpidNvWriteMembershipCredential(tpm, &pub_key, nullptr, nv_index));
57 Tpm2NvUndefineSpace(tpm, nv_index);
63 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
72 tpm, nv_index, &pub_key, &credential));
78 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params);
87 EXPECT_EQ(kEpidNoErr, EpidNvWriteMembershipCredential(tpm, &pub_key,
93 tpm, nv_index, nullptr, &credential));
95 EpidNvReadMembershipCredential(tpm, nv_index, &pub_key, nullptr))
    [all...]
  /external/ltp/testcases/commands/
Makefile 27 FILTER_OUT_SUBDIRS := tpm-tools
  /external/u-boot/drivers/tpm/
tpm2_tis_sandbox.c 9 #include <tpm-v2.h>
48 /* TPM internal states */
52 /* TPM password per hierarchy */
55 /* TPM properties */
57 /* TPM PCRs */
59 /* TPM PCR extensions */
72 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local
165 if (!pw_sz && !tpm->pw_sz[*hierarchy])
179 if (pw_sz != tpm->pw_sz[*hierarchy] ||
180 strncmp(pw, tpm->pw[*hierarchy], tpm->pw_sz[*hierarchy]))
190 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local
243 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local
262 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local
578 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local
590 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local
    [all...]
Makefile 4 obj-$(CONFIG_TPM) += tpm-uclass.o
Kconfig 2 # TPM subsystem configuration
5 menu "TPM support"
7 comment "Please select only one TPM revision"
12 depends on TPM
15 Major TPM versions are not compatible at all, choose either
21 bool "Enable sandbox TPM driver"
25 such as reading and writing TPM private data. This is enough to
30 bool "Enable Atmel TWI TPM device driver"
33 This driver supports an Atmel TPM device connected on the I2C bus.
34 The usual tpm operations and the 'tpm' command can be used to tal
    [all...]
tpm_tis_sandbox.c 8 #include <tpm-v1.h>
13 /* TPM NVRAM location indices. */
19 /* Kernel TPM space - KERNEL_NV_INDEX, locked with physical presence */
38 * the TPM commands manual.
55 * Information about our TPM emulation. This is preserved in the sandbox
66 * not this function sets up an empty TPM.
121 SANDBOX_STATE_IO(sandbox_tpm, "google,sandbox-tpm", sandbox_tpm_read_state,
143 struct tpm_state *tpm = dev_get_priv(dev); local
150 printf("tpm: %zd bytes, recv_len %zd, cmd = %x\n", send_size,
194 printf("tpm: nvwrite index=%#02x, len=%#02x\n", index, length)
256 struct tpm_state *tpm = dev_get_priv(dev); local
    [all...]
tpm-uclass.c 11 #include <tpm-v1.h>
13 #include <tpm-v2.h>
131 UCLASS_DRIVER(tpm) = { variable
133 .name = "tpm",
tpm_atmel_twi.c 10 #include <tpm-v1.h>
35 * terminate the currect session with the TPM by releasing the locked
60 * Send the requested data to the TPM and then try to get its response
79 printf("send to TPM (%d bytes, recv_len=%d):\n", send_size, *recv_len);
102 puts("tpm timed out\n");
111 puts("tpm response header too small\n");
114 puts("tpm response length is bigger than receive buffer\n");
135 printf("read from TPM (%d bytes):\n", *recv_len);
  /external/vboot_reference/utility/
chromeos-tpm-recovery-test 6 # Test the chromeos TPM recovery script by faking the entire execution
9 rm -rf tpm-recovery-test-workdir
10 mkdir tpm-recovery-test-workdir
11 cd tpm-recovery-test-workdir
20 echo "With fake as the argument, use a simulated TPM instead of the real one"
30 ctr=../chromeos-tpm-recovery
33 ctr=chromeos-tpm-recovery
38 # fake test, even if we're running the test on a real TPM.
58 if [ -e space.$index.data -a -e tpm-owned ]; then
83 rm -f tpm-owne
    [all...]
  /external/autotest/client/site_tests/network_VPNConnect/
network_VPNConnect.py 105 def get_vpn_client_properties(self, tpm):
108 @param tpm object TPM store instance to add credentials if necessary.
134 tpm.install_certificate(site_eap_certs.client_cert_1,
136 tpm.install_private_key(site_eap_certs.client_private_key_1,
141 'L2TPIPsec.ClientCertSlot': tpm.SLOT_ID,
144 'L2TPIPsec.PIN': tpm.PIN,
152 tpm.install_certificate(site_eap_certs.client_cert_1,
154 tpm.install_private_key(site_eap_certs.client_private_key_1,
164 'OpenVPN.Pkcs11.PIN': tpm.PIN
    [all...]
  /external/autotest/server/site_tests/firmware_TPMKernelVersion/
firmware_TPMKernelVersion.py 11 """Dev mode will not corrupt kernel and firmware version stored in the TPM.
13 Automate 1.2.4 Check Kernel version in TPM is not corrupted.
51 version = self.faft_client.tpm.get_kernel_version()
53 version = self.faft_client.tpm.get_kernel_datakey_version()
  /external/ltp/testscripts/
tpm_tools.sh 20 # test_tpm_tools.sh - Run the tpm-tools test suite.
114 # Additionally, delete the user's TPM token data store.
143 echo "The TPM PKCS#11 token is not active. Be sure openCryptoki has been installed properly"
146 if [ -d $P11DIR/var/lib/opencryptoki/tpm/$USER ]
148 rm -rf $P11DIR/var/lib/opencryptoki/tpm/$USER
169 echo "Running the tpm-tools testsuite..."
170 $LTPROOT/bin/ltp-pan -d 5 -S -a $LTPROOT/results/tpm_tools -n ltp-tpm-tools -l $LTPROOT/results/tpm_tools.logfile -o $LTPROOT/results/tpm_tools.outfile -p -f $LTPROOT/runtest/tpm_tools
  /external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/
firmware_UpdateFirmwareDataKeyVersion.py 41 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version()
70 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_datakey_version()
84 if (self.faft_client.tpm.get_firmware_datakey_version() !=
108 logging.info("Check firmware and TPM version, then recovery.")
  /external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/
firmware_UpdateFirmwareVersion.py 28 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version()
58 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_version()
70 if self.faft_client.tpm.get_firmware_version() != self.fw_ver_tpm:
92 logging.info("Check firmware and TPM version, then recovery.")
  /external/autotest/server/site_tests/firmware_TPMNotCorruptedDevMode/
firmware_TPMNotCorruptedDevMode.py 14 Checks the kernel anti-rollback info stored in the TPM NVRAM, and then boots
29 # stored in the TPM's NVRAM is corrupted during a transition from normal
78 Then stops the TPM daemon, reads the anti-rollback kernel version data
82 logging.info('Reading kernel anti-rollback data from the TPM.')
83 self.faft_client.tpm.stop_daemon()
89 self.faft_client.tpm.restart_daemon()
110 'Invalid kernel and firmware versions stored in the TPM.')
  /external/autotest/client/site_tests/platform_EncryptedStateful/
platform_EncryptedStateful.py 10 # - mock out TPM and check all error conditions
288 # Relocate the TPM device during mount.
289 tpm = "/dev/tpm0"
290 off = "%s.off" % (tpm)
292 if os.path.exists(tpm):
293 utils.system("mv %s %s" % (tpm, off))
294 # Mount without a TPM.
298 utils.system("mv %s %s" % (off, tpm))
307 # Do a no-write, no-TPM test with sanity checks.
310 # There is no interactively controllable TPM mock yet fo
    [all...]
  /external/u-boot/lib/
Makefile 43 obj-$(CONFIG_TPM) += tpm-common.o
44 obj-$(CONFIG_TPM_V1) += tpm-v1.o
45 obj-$(CONFIG_TPM_V2) += tpm-v2.o
  /external/epid-sdk/epid/member/src/
presig.c 122 Tpm2Ctx* tpm = ctx->tpm2_ctx; local
167 sts = Tpm2GetRandom(tpm, sizeof(p2x.bsn) * 8, &p2x.bsn);
183 sts = Tpm2Commit(tpm, ctx->h1, &p2x, sizeof(p2x), p2y, k, t, e,
  /external/u-boot/cmd/
tpm-v2.c 11 #include <tpm-common.h>
12 #include <tpm-v2.h>
13 #include "tpm-user-utils.h"
167 printf("Capabilities read from TPM:\n");
329 U_BOOT_CMD(tpm, CONFIG_SYS_MAXARGS, 1, do_tpm, "Issue a TPMv2.x command",
333 " Show information about the TPM.\n"
342 " Test the TPM capabilities.\n"
367 " If the TPM is not in a LOCKOUT state, reset the internal error counter.\n"
370 " If the TPM is not in a LOCKOUT state, set the DAM parameters\n"

Completed in 2000 milliseconds

1 2 3