/external/vboot_reference/utility/ |
chromeos-tpm-recovery-test | 6 # Test the chromeos TPM recovery script by faking the entire execution 9 rm -rf tpm-recovery-test-workdir 10 mkdir tpm-recovery-test-workdir 11 cd tpm-recovery-test-workdir 20 echo "With fake as the argument, use a simulated TPM instead of the real one" 30 ctr=../chromeos-tpm-recovery 33 ctr=chromeos-tpm-recovery 38 # fake test, even if we're running the test on a real TPM. 58 if [ -e space.$index.data -a -e tpm-owned ]; then 83 rm -f tpm-owne [all...] |
chromeos-tpm-recovery | 6 # Run TPM diagnostics in recovery mode, and attempt to fix problems. This is 9 # Usage: chromeos-tpm-recovery <log file> 11 # Most of the diagnostics examine the TPM state and try to fix it. This may 12 # require clearing TPM ownership. 15 nvtool=${USR_LOCAL_BIN:=/usr/local/bin}/tpm-nvtool 24 # - TPM may be owned, but not with the well-known password 79 # We want the TPM owned with the well-known password. 106 # Makes some room by removing a TPM space it doesn't recognize. It would be 117 /# NV Index 0x0000f.../ { next } # reserved for TPM use 321 # this indicates either TPM malfunction or firmware malfunction [all...] |
/external/autotest/client/site_tests/network_VPNConnect/ |
network_VPNConnect.py | 103 def get_vpn_client_properties(self, tpm): 106 @param tpm object TPM store instance to add credentials if necessary. 132 tpm.install_certificate(site_eap_certs.client_cert_1, 134 tpm.install_private_key(site_eap_certs.client_private_key_1, 139 'L2TPIPsec.ClientCertSlot': tpm.SLOT_ID, 142 'L2TPIPsec.PIN': tpm.PIN, 150 tpm.install_certificate(site_eap_certs.client_cert_1, 152 tpm.install_private_key(site_eap_certs.client_private_key_1, 162 'OpenVPN.Pkcs11.PIN': tpm.PIN [all...] |
/system/tpm/trunks/ |
tpm_generated_test.cc | 110 Tpm tpm(&transceiver); 111 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); 131 Tpm tpm(&transceiver); 132 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); 231 Tpm tpm(&transceiver); 232 TPM_RC rc = tpm.CreatePrimarySync(trunks::TPM_RH_NULL, 341 Tpm tpm(&transceiver) [all...] |
trunks_factory_for_test.h | 44 class Tpm; 64 Tpm* GetTpm() const override; 76 void set_tpm(Tpm* tpm) { 77 tpm_ = tpm; 110 Tpm* tpm_;
|
session_manager_impl.cc | 67 LOG(WARNING) << "Error closing tpm session: " << GetErrorString(result); 99 // Then we use TPM2_StartAuthSession to start a HMAC session with the TPM. 100 // The tpm returns the tpm_nonce and the session_handle referencing the 116 Tpm* tpm = factory_.GetTpm(); local 120 TPM_RC tpm_result = tpm->StartAuthSessionSync(kSaltingKey,
|
tpm_utility_impl.cc | 45 // The below maximum is defined in TPM 2.0 Library Spec Part 2 Section 13.1 50 // handles use this name formula see Table 3 in the TPM 2.0 Library Spec Part 1 84 Tpm* tpm = factory_.GetTpm(); local 85 result = tpm->StartupSync(TPM_SU_CLEAR, nullptr); 91 result = tpm->SelfTestSync(YES /* Full test. */, nullptr); 117 << "that the TPM was already initialized."; 121 LOG(ERROR) << "Failed to clear the TPM: " << GetErrorString(result); 144 LOG(WARNING) << "WARNING: The last TPM shutdown was not orderly."; 147 LOG(WARNING) << "WARNING: The TPM is currently in lockout." 1493 Tpm* tpm = factory_.GetTpm(); local [all...] |
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
platform_EncryptedStateful.py | 10 # - mock out TPM and check all error conditions 278 # Relocate the TPM device during mount. 279 tpm = "/dev/tpm0" 280 off = "%s.off" % (tpm) 282 if os.path.exists(tpm): 283 utils.system("mv %s %s" % (tpm, off)) 284 # Mount without a TPM. 288 utils.system("mv %s %s" % (off, tpm)) 297 # Do a no-write, no-TPM test with sanity checks. 300 # There is no interactively controllable TPM mock yet fo [all...] |
/system/tpm/attestation/common/ |
tpm_utility_v1.cc | 33 LOG(severity) << "TPM error 0x" << std::hex << result \ 47 const char* kTpmTpmEnabledFile = "/sys/class/tpm/tpm0/device/enabled"; 49 const char* kTpmTpmOwnedFile = "/sys/class/tpm/tpm0/device/owned"; 82 LOG(ERROR) << __func__ << ": Failed to connect to the TPM."; 86 LOG(WARNING) << __func__ << ": TPM is not owned; attestation services will " 117 // Connect to the TPM as the owner delegate. 122 LOG(ERROR) << __func__ << ": Could not connect to the TPM."; 185 LOG(ERROR) << "Only RSA supported on TPM v1.2."; 510 bool TpmUtilityV1::ConnectContext(ScopedTssContext* context, TSS_HTPM* tpm) { 511 *tpm = 0 [all...] |
tpm_utility_v1.h | 30 // A TpmUtility implementation for TPM v1.2 modules. 69 // its matching TPM object iff the context can be created and a TPM object 75 // its matching TPM object authorized by the given |delegate_blob| and 80 TSS_HTPM* tpm); 89 // Loads a key in the TPM given a |key_blob| and a |parent_key_handle|. The
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/ |
firmware_UpdateFirmwareVersion.py | 28 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version() 86 logging.info("Check firmware and TPM version, then recovery.")
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/ |
firmware_UpdateFirmwareDataKeyVersion.py | 41 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version() 102 logging.info("Check firmware and TPM version, then recovery.")
|
/external/autotest/server/hosts/ |
cros_host.py | [all...] |
/external/vboot_reference/ |
Makefile | 257 # TPM commands and various external functions that are provided by the BIOS. 342 # Support real TPM unless BIOS sets MOCK_TPM 570 utility/tpm-nvsize \ 571 utility/chromeos-tpm-recovery 793 # TPM-specific flags. These depend on the particular TPM we're targeting for. 835 # Disable rollback TPM when compiling locally, since otherwise 836 # load_kernel_test attempts to talk to the TPM. [all...] |