/system/tpm/tpm_manager/server/ |
tpm_initializer_impl.h | 56 // if not. Returns true on success, else false. |tpm_handle| is a handle to 58 bool InitializeEndorsementKey(TSS_HTPM tpm_handle); 61 // Returns true on success, else false. |tpm_handle| is a handle to the Tpm 63 bool TakeOwnership(TSS_HTPM tpm_handle); 67 // |tpm_handle| is a handle to the Tpm with the owner_password injected. 68 bool InitializeSrk(TSS_HTPM tpm_handle); 72 // Returns true on success, else false. |tpm_handle| is a handle to the Tpm 74 bool ChangeOwnerPassword(TSS_HTPM tpm_handle,
|
tpm_connection.cc | 49 TSS_HTPM tpm_handle; local 51 &tpm_handle))) { 55 return tpm_handle; 59 TSS_HTPM tpm_handle = GetTpm(); local 60 if (tpm_handle == 0) { 65 if (TPM_ERROR(result = Tspi_GetPolicyObject(tpm_handle, 79 return tpm_handle;
|
tpm_initializer_impl.cc | 53 TSS_HTPM tpm_handle = tpm_connection_.GetTpm(); local 54 if (tpm_handle == 0) { 57 if (!InitializeEndorsementKey(tpm_handle) || 58 !TakeOwnership(tpm_handle) || 59 !InitializeSrk(tpm_handle)) { 76 if (!ChangeOwnerPassword(tpm_handle, owner_password)) { 82 bool TpmInitializerImpl::InitializeEndorsementKey(TSS_HTPM tpm_handle) { 84 TSS_RESULT result = Tspi_TPM_GetPubEndorsementKey(tpm_handle, 101 if (TPM_ERROR(result = Tspi_TPM_CreateEndorsementKey(tpm_handle, 110 bool TpmInitializerImpl::TakeOwnership(TSS_HTPM tpm_handle) { 246 TSS_HTPM tpm_handle = tpm_connection_.GetTpmWithAuth(owner_password); local [all...] |
tpm_status_impl.cc | 95 TSS_HTPM tpm_handle = tpm_connection_.GetTpm(); local 96 if (tpm_handle == 0) { 102 tpm_handle, capability, sizeof(uint32_t),
|
/system/tpm/trunks/ |
resource_manager.cc | 34 const trunks::TPM_HANDLE kMaxVirtualHandle = 125 std::vector<TPM_HANDLE> updated_handles; 127 TPM_HANDLE tpm_handle; local 128 result = ProcessInputHandle(command_info, handle, &tpm_handle); 132 updated_handles.push_back(tpm_handle); 194 std::vector<TPM_HANDLE> virtual_handles; 204 const std::vector<TPM_HANDLE>& sessions_to_retain, 205 TPM_HANDLE* session_to_evict) { 207 std::vector<TPM_HANDLE> candidates [all...] |
resource_manager_test.cc | 43 const trunks::TPM_HANDLE kArbitraryObjectHandle = trunks::TRANSIENT_FIRST + 25; 44 const trunks::TPM_HANDLE kArbitrarySessionHandle = trunks::HMAC_SESSION_FIRST; 69 const std::vector<TPM_HANDLE> kNoHandles; 82 const std::vector<TPM_HANDLE>& handles, 103 const std::vector<TPM_HANDLE>& handles, 123 std::string CreateCommandAuthorization(TPM_HANDLE handle, 152 TPM_HANDLE LoadHandle(TPM_HANDLE handle) { 153 std::vector<TPM_HANDLE> input_handles = {PERSISTENT_FIRST}; 158 std::vector<TPM_HANDLE> output_handles = {handle} 311 TPM_HANDLE tpm_handle = kArbitraryObjectHandle; local 336 TPM_HANDLE tpm_handle = kArbitraryObjectHandle; local 382 TPM_HANDLE tpm_handle = kArbitraryObjectHandle; local 576 TPM_HANDLE tpm_handle = kArbitraryObjectHandle; local [all...] |
resource_manager.h | 74 std::vector<TPM_HANDLE> handles; 75 std::vector<TPM_HANDLE> session_handles; 83 void Init(TPM_HANDLE handle); 87 TPM_HANDLE tpm_handle; member in struct:trunks::ResourceManager::HandleInfo 99 bool ChooseSessionToEvict(const std::vector<TPM_HANDLE>& sessions_to_retain, 100 TPM_HANDLE* session_to_evict); 103 void CleanupFlushedHandle(TPM_HANDLE flushed_handle); 107 TPM_HANDLE CreateVirtualHandle(); 111 TPM_HANDLE session_handle) [all...] |
Android.mk | 115 tpm_handle.cc \
|
/system/tpm/attestation/common/ |
tpm_utility_v1.h | 68 // Populates |context_handle| with a valid TSS_HCONTEXT and |tpm_handle| with 72 TSS_HTPM* tpm_handle); 74 // Populates |context_handle| with a valid TSS_HCONTEXT and |tpm_handle| with
|
tpm_utility_v1.cc | 119 TSS_HTPM tpm_handle; local 121 &context_handle, &tpm_handle)) { 154 result = Tspi_TPM_ActivateIdentity(tpm_handle, identity_key,
|