HomeSort by relevance Sort by last modified time
    Searched refs:tpm (Results 1 - 14 of 14) sorted by null

  /external/vboot_reference/utility/
chromeos-tpm-recovery-test 6 # Test the chromeos TPM recovery script by faking the entire execution
9 rm -rf tpm-recovery-test-workdir
10 mkdir tpm-recovery-test-workdir
11 cd tpm-recovery-test-workdir
20 echo "With fake as the argument, use a simulated TPM instead of the real one"
30 ctr=../chromeos-tpm-recovery
33 ctr=chromeos-tpm-recovery
38 # fake test, even if we're running the test on a real TPM.
58 if [ -e space.$index.data -a -e tpm-owned ]; then
83 rm -f tpm-owne
    [all...]
chromeos-tpm-recovery 6 # Run TPM diagnostics in recovery mode, and attempt to fix problems. This is
9 # Usage: chromeos-tpm-recovery <log file>
11 # Most of the diagnostics examine the TPM state and try to fix it. This may
12 # require clearing TPM ownership.
15 nvtool=${USR_LOCAL_BIN:=/usr/local/bin}/tpm-nvtool
24 # - TPM may be owned, but not with the well-known password
79 # We want the TPM owned with the well-known password.
106 # Makes some room by removing a TPM space it doesn't recognize. It would be
117 /# NV Index 0x0000f.../ { next } # reserved for TPM use
321 # this indicates either TPM malfunction or firmware malfunction
    [all...]
  /external/autotest/client/site_tests/network_VPNConnect/
network_VPNConnect.py 103 def get_vpn_client_properties(self, tpm):
106 @param tpm object TPM store instance to add credentials if necessary.
132 tpm.install_certificate(site_eap_certs.client_cert_1,
134 tpm.install_private_key(site_eap_certs.client_private_key_1,
139 'L2TPIPsec.ClientCertSlot': tpm.SLOT_ID,
142 'L2TPIPsec.PIN': tpm.PIN,
150 tpm.install_certificate(site_eap_certs.client_cert_1,
152 tpm.install_private_key(site_eap_certs.client_private_key_1,
162 'OpenVPN.Pkcs11.PIN': tpm.PIN
    [all...]
  /system/tpm/trunks/
tpm_generated_test.cc 110 Tpm tpm(&transceiver);
111 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization));
131 Tpm tpm(&transceiver);
132 EXPECT_EQ(TPM_RC_FAILURE, tpm.StartupSync(TPM_SU_CLEAR, &authorization));
231 Tpm tpm(&transceiver);
232 TPM_RC rc = tpm.CreatePrimarySync(trunks::TPM_RH_NULL,
341 Tpm tpm(&transceiver)
    [all...]
trunks_factory_for_test.h 44 class Tpm;
64 Tpm* GetTpm() const override;
76 void set_tpm(Tpm* tpm) {
77 tpm_ = tpm;
110 Tpm* tpm_;
session_manager_impl.cc 67 LOG(WARNING) << "Error closing tpm session: " << GetErrorString(result);
99 // Then we use TPM2_StartAuthSession to start a HMAC session with the TPM.
100 // The tpm returns the tpm_nonce and the session_handle referencing the
116 Tpm* tpm = factory_.GetTpm(); local
120 TPM_RC tpm_result = tpm->StartAuthSessionSync(kSaltingKey,
tpm_utility_impl.cc 45 // The below maximum is defined in TPM 2.0 Library Spec Part 2 Section 13.1
50 // handles use this name formula see Table 3 in the TPM 2.0 Library Spec Part 1
84 Tpm* tpm = factory_.GetTpm(); local
85 result = tpm->StartupSync(TPM_SU_CLEAR, nullptr);
91 result = tpm->SelfTestSync(YES /* Full test. */, nullptr);
117 << "that the TPM was already initialized.";
121 LOG(ERROR) << "Failed to clear the TPM: " << GetErrorString(result);
144 LOG(WARNING) << "WARNING: The last TPM shutdown was not orderly.";
147 LOG(WARNING) << "WARNING: The TPM is currently in lockout."
1493 Tpm* tpm = factory_.GetTpm(); local
    [all...]
  /external/autotest/client/site_tests/platform_EncryptedStateful/
platform_EncryptedStateful.py 10 # - mock out TPM and check all error conditions
278 # Relocate the TPM device during mount.
279 tpm = "/dev/tpm0"
280 off = "%s.off" % (tpm)
282 if os.path.exists(tpm):
283 utils.system("mv %s %s" % (tpm, off))
284 # Mount without a TPM.
288 utils.system("mv %s %s" % (off, tpm))
297 # Do a no-write, no-TPM test with sanity checks.
300 # There is no interactively controllable TPM mock yet fo
    [all...]
  /system/tpm/attestation/common/
tpm_utility_v1.cc 33 LOG(severity) << "TPM error 0x" << std::hex << result \
47 const char* kTpmTpmEnabledFile = "/sys/class/tpm/tpm0/device/enabled";
49 const char* kTpmTpmOwnedFile = "/sys/class/tpm/tpm0/device/owned";
82 LOG(ERROR) << __func__ << ": Failed to connect to the TPM.";
86 LOG(WARNING) << __func__ << ": TPM is not owned; attestation services will "
117 // Connect to the TPM as the owner delegate.
122 LOG(ERROR) << __func__ << ": Could not connect to the TPM.";
185 LOG(ERROR) << "Only RSA supported on TPM v1.2.";
510 bool TpmUtilityV1::ConnectContext(ScopedTssContext* context, TSS_HTPM* tpm) {
511 *tpm = 0
    [all...]
tpm_utility_v1.h 30 // A TpmUtility implementation for TPM v1.2 modules.
69 // its matching TPM object iff the context can be created and a TPM object
75 // its matching TPM object authorized by the given |delegate_blob| and
80 TSS_HTPM* tpm);
89 // Loads a key in the TPM given a |key_blob| and a |parent_key_handle|. The
  /external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/
firmware_UpdateFirmwareVersion.py 28 actual_tpm_fwver = self.faft_client.tpm.get_firmware_version()
86 logging.info("Check firmware and TPM version, then recovery.")
  /external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/
firmware_UpdateFirmwareDataKeyVersion.py 41 actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version()
102 logging.info("Check firmware and TPM version, then recovery.")
  /external/autotest/server/hosts/
cros_host.py     [all...]
  /external/vboot_reference/
Makefile 257 # TPM commands and various external functions that are provided by the BIOS.
342 # Support real TPM unless BIOS sets MOCK_TPM
570 utility/tpm-nvsize \
571 utility/chromeos-tpm-recovery
793 # TPM-specific flags. These depend on the particular TPM we're targeting for.
835 # Disable rollback TPM when compiling locally, since otherwise
836 # load_kernel_test attempts to talk to the TPM.
    [all...]

Completed in 354 milliseconds