/external/epid-sdk/epid/member/tpm2/unittests/ |
nv-test.cc | 16 /// TPM non volatile memory API unit tests. 42 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 61 if (kEpidNoErr != Tpm2NvRead(tpm, nv_index, sizeof(data), 0, &data)) { 63 Tpm2NvDefineSpace(tpm, nv_index, sizeof(MembershipCredential))); 67 Tpm2NvWrite(tpm, nv_index, sizeof(credential), 0, &credential)); 70 EXPECT_EQ(kEpidNoErr, Tpm2NvRead(tpm, nv_index, sizeof(data), 0, &data)); 72 THROW_ON_EPIDERR(Tpm2NvUndefineSpace(tpm, nv_index)); 78 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 87 Tpm2NvDefineSpace(tpm, nv_index, data1_src.size() + data2_src.size())); 90 Tpm2NvWrite(tpm, nv_index, data1_src.size(), 0, data1_src.data())) [all...] |
getrandom-test.cc | 16 /// TPM GetRandom unit tests. 39 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 41 EXPECT_EQ(kEpidBadArgErr, Tpm2GetRandom(tpm, 48 * 8, nullptr)); 47 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 51 EXPECT_EQ(kEpidNoErr, Tpm2GetRandom(tpm, length * CHAR_BIT, buf1.data())); 52 EXPECT_EQ(kEpidNoErr, Tpm2GetRandom(tpm, length * CHAR_BIT, buf2.data())); 59 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 63 EXPECT_EQ(kEpidNoErr, Tpm2GetRandom(tpm, length * CHAR_BIT, buf.data()));
|
sign-test.cc | 16 /// TPM Sign unit tests. 39 // Verify signature computed by TPM ECDAA scheme: 81 // create TPM context 85 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &f, epid2params); 86 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256)); 88 EXPECT_EQ(kEpidNoErr, Tpm2LoadExternal(tpm, &f)); 98 Tpm2Commit(tpm, p2, this->kS2Sha256.data(), this->kS2Sha256.size(), 105 Tpm2Sign(tpm, this->kDigestSha256, sizeof(this->kDigestSha256), 115 // create TPM context 119 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &f, epid2params) [all...] |
commit-test.cc | 48 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params); 49 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256)); 50 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue)); 55 EXPECT_EQ(kEpidBadArgErr, Tpm2Commit(tpm, p1, nullptr, this->kS2Sha256.size(), 59 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(), 63 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(), 66 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(), 69 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(), 72 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(), 85 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params) [all...] |
sign-simulator-test.cc | 16 /// TPM Sign unit tests. 45 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params); 46 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256)); 47 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue)); 49 Tpm2Commit(tpm, nullptr, nullptr, 0, nullptr, k, l, e, &counter)); 52 Tpm2Sign(tpm, this->kDigestSha256, sizeof(this->kDigestSha256),
|
commit-simulator-test.cc | 50 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params); 51 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha256)); 52 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue)); 55 Tpm2Commit(tpm, p1, this->kS2Sha256.data(), this->kS2Sha256.size(), 57 THROW_ON_EPIDERR(Tpm2ReleaseCounter(tpm, counter)); 94 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, &this->kMemberFValue, epid2params); 95 THROW_ON_EPIDERR(Tpm2SetHashAlg(tpm, kSha384)); 96 THROW_ON_EPIDERR(Tpm2LoadExternal(tpm, &this->kMemberFValue)); 99 Tpm2Commit(tpm, p1, this->kS2Sha384.data(), this->kS2Sha384.size(), 101 THROW_ON_EPIDERR(Tpm2ReleaseCounter(tpm, counter)) [all...] |
/external/epid-sdk/epid/member/unittests/ |
storage-test.cc | 42 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 53 tpm, nullptr, &credential, nv_index)); 55 EpidNvWriteMembershipCredential(tpm, &pub_key, nullptr, nv_index)); 57 Tpm2NvUndefineSpace(tpm, nv_index); 63 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 72 tpm, nv_index, &pub_key, &credential)); 78 Tpm2CtxObj tpm(&Prng::Generate, &my_prng, nullptr, epid2params); 87 EXPECT_EQ(kEpidNoErr, EpidNvWriteMembershipCredential(tpm, &pub_key, 93 tpm, nv_index, nullptr, &credential)); 95 EpidNvReadMembershipCredential(tpm, nv_index, &pub_key, nullptr)) [all...] |
/external/ltp/testcases/commands/ |
Makefile | 27 FILTER_OUT_SUBDIRS := tpm-tools
|
/external/u-boot/drivers/tpm/ |
tpm2_tis_sandbox.c | 9 #include <tpm-v2.h> 48 /* TPM internal states */ 52 /* TPM password per hierarchy */ 55 /* TPM properties */ 57 /* TPM PCRs */ 59 /* TPM PCR extensions */ 72 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local 165 if (!pw_sz && !tpm->pw_sz[*hierarchy]) 179 if (pw_sz != tpm->pw_sz[*hierarchy] || 180 strncmp(pw, tpm->pw[*hierarchy], tpm->pw_sz[*hierarchy])) 190 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local 243 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local 262 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local 578 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local 590 struct sandbox_tpm2 *tpm = dev_get_priv(dev); local [all...] |
Makefile | 4 obj-$(CONFIG_TPM) += tpm-uclass.o
|
Kconfig | 2 # TPM subsystem configuration 5 menu "TPM support" 7 comment "Please select only one TPM revision" 12 depends on TPM 15 Major TPM versions are not compatible at all, choose either 21 bool "Enable sandbox TPM driver" 25 such as reading and writing TPM private data. This is enough to 30 bool "Enable Atmel TWI TPM device driver" 33 This driver supports an Atmel TPM device connected on the I2C bus. 34 The usual tpm operations and the 'tpm' command can be used to tal [all...] |
tpm_tis_sandbox.c | 8 #include <tpm-v1.h> 13 /* TPM NVRAM location indices. */ 19 /* Kernel TPM space - KERNEL_NV_INDEX, locked with physical presence */ 38 * the TPM commands manual. 55 * Information about our TPM emulation. This is preserved in the sandbox 66 * not this function sets up an empty TPM. 121 SANDBOX_STATE_IO(sandbox_tpm, "google,sandbox-tpm", sandbox_tpm_read_state, 143 struct tpm_state *tpm = dev_get_priv(dev); local 150 printf("tpm: %zd bytes, recv_len %zd, cmd = %x\n", send_size, 194 printf("tpm: nvwrite index=%#02x, len=%#02x\n", index, length) 256 struct tpm_state *tpm = dev_get_priv(dev); local [all...] |
tpm-uclass.c | 11 #include <tpm-v1.h> 13 #include <tpm-v2.h> 131 UCLASS_DRIVER(tpm) = { variable 133 .name = "tpm",
|
tpm_atmel_twi.c | 10 #include <tpm-v1.h> 35 * terminate the currect session with the TPM by releasing the locked 60 * Send the requested data to the TPM and then try to get its response 79 printf("send to TPM (%d bytes, recv_len=%d):\n", send_size, *recv_len); 102 puts("tpm timed out\n"); 111 puts("tpm response header too small\n"); 114 puts("tpm response length is bigger than receive buffer\n"); 135 printf("read from TPM (%d bytes):\n", *recv_len);
|
/external/vboot_reference/utility/ |
chromeos-tpm-recovery-test | 6 # Test the chromeos TPM recovery script by faking the entire execution 9 rm -rf tpm-recovery-test-workdir 10 mkdir tpm-recovery-test-workdir 11 cd tpm-recovery-test-workdir 20 echo "With fake as the argument, use a simulated TPM instead of the real one" 30 ctr=../chromeos-tpm-recovery 33 ctr=chromeos-tpm-recovery 38 # fake test, even if we're running the test on a real TPM. 58 if [ -e space.$index.data -a -e tpm-owned ]; then 83 rm -f tpm-owne [all...] |
/external/autotest/client/site_tests/network_VPNConnect/ |
network_VPNConnect.py | 105 def get_vpn_client_properties(self, tpm): 108 @param tpm object TPM store instance to add credentials if necessary. 134 tpm.install_certificate(site_eap_certs.client_cert_1, 136 tpm.install_private_key(site_eap_certs.client_private_key_1, 141 'L2TPIPsec.ClientCertSlot': tpm.SLOT_ID, 144 'L2TPIPsec.PIN': tpm.PIN, 152 tpm.install_certificate(site_eap_certs.client_cert_1, 154 tpm.install_private_key(site_eap_certs.client_private_key_1, 164 'OpenVPN.Pkcs11.PIN': tpm.PIN [all...] |
/external/autotest/server/site_tests/firmware_TPMKernelVersion/ |
firmware_TPMKernelVersion.py | 11 """Dev mode will not corrupt kernel and firmware version stored in the TPM. 13 Automate 1.2.4 Check Kernel version in TPM is not corrupted. 51 version = self.faft_client.tpm.get_kernel_version() 53 version = self.faft_client.tpm.get_kernel_datakey_version()
|
/external/ltp/testscripts/ |
tpm_tools.sh | 20 # test_tpm_tools.sh - Run the tpm-tools test suite. 114 # Additionally, delete the user's TPM token data store. 143 echo "The TPM PKCS#11 token is not active. Be sure openCryptoki has been installed properly" 146 if [ -d $P11DIR/var/lib/opencryptoki/tpm/$USER ] 148 rm -rf $P11DIR/var/lib/opencryptoki/tpm/$USER 169 echo "Running the tpm-tools testsuite..." 170 $LTPROOT/bin/ltp-pan -d 5 -S -a $LTPROOT/results/tpm_tools -n ltp-tpm-tools -l $LTPROOT/results/tpm_tools.logfile -o $LTPROOT/results/tpm_tools.outfile -p -f $LTPROOT/runtest/tpm_tools
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/ |
firmware_UpdateFirmwareDataKeyVersion.py | 41 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version() 70 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_datakey_version() 84 if (self.faft_client.tpm.get_firmware_datakey_version() != 108 logging.info("Check firmware and TPM version, then recovery.")
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/ |
firmware_UpdateFirmwareVersion.py | 28 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version() 58 self.fw_ver_tpm = self.faft_client.tpm.get_firmware_version() 70 if self.faft_client.tpm.get_firmware_version() != self.fw_ver_tpm: 92 logging.info("Check firmware and TPM version, then recovery.")
|
/external/autotest/server/site_tests/firmware_TPMNotCorruptedDevMode/ |
firmware_TPMNotCorruptedDevMode.py | 14 Checks the kernel anti-rollback info stored in the TPM NVRAM, and then boots 29 # stored in the TPM's NVRAM is corrupted during a transition from normal 78 Then stops the TPM daemon, reads the anti-rollback kernel version data 82 logging.info('Reading kernel anti-rollback data from the TPM.') 83 self.faft_client.tpm.stop_daemon() 89 self.faft_client.tpm.restart_daemon() 110 'Invalid kernel and firmware versions stored in the TPM.')
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
platform_EncryptedStateful.py | 10 # - mock out TPM and check all error conditions 288 # Relocate the TPM device during mount. 289 tpm = "/dev/tpm0" 290 off = "%s.off" % (tpm) 292 if os.path.exists(tpm): 293 utils.system("mv %s %s" % (tpm, off)) 294 # Mount without a TPM. 298 utils.system("mv %s %s" % (off, tpm)) 307 # Do a no-write, no-TPM test with sanity checks. 310 # There is no interactively controllable TPM mock yet fo [all...] |
/external/u-boot/lib/ |
Makefile | 43 obj-$(CONFIG_TPM) += tpm-common.o 44 obj-$(CONFIG_TPM_V1) += tpm-v1.o 45 obj-$(CONFIG_TPM_V2) += tpm-v2.o
|
/external/epid-sdk/epid/member/src/ |
presig.c | 122 Tpm2Ctx* tpm = ctx->tpm2_ctx; local 167 sts = Tpm2GetRandom(tpm, sizeof(p2x.bsn) * 8, &p2x.bsn); 183 sts = Tpm2Commit(tpm, ctx->h1, &p2x, sizeof(p2x), p2y, k, t, e,
|
/external/u-boot/cmd/ |
tpm-v2.c | 11 #include <tpm-common.h> 12 #include <tpm-v2.h> 13 #include "tpm-user-utils.h" 167 printf("Capabilities read from TPM:\n"); 329 U_BOOT_CMD(tpm, CONFIG_SYS_MAXARGS, 1, do_tpm, "Issue a TPMv2.x command", 333 " Show information about the TPM.\n" 342 " Test the TPM capabilities.\n" 367 " If the TPM is not in a LOCKOUT state, reset the internal error counter.\n" 370 " If the TPM is not in a LOCKOUT state, set the DAM parameters\n"
|