/system/tpm/tpm_manager/server/ |
tpm_initializer_impl.h | 72 // to the password provided in the |owner_password| argument. 76 const std::string& owner_password); 78 // This method return true iff the provided |owner_password| is the current 81 bool TestTpmAuth(const std::string& owner_password);
|
tpm2_initializer_impl.cc | 73 std::string owner_password; local 78 owner_password.assign(local_data.owner_password()); 82 if (!GetTpmRandomData(kDefaultPasswordSize, &owner_password)) { 101 local_data.set_owner_password(owner_password); 109 owner_password, endorsement_password, lockout_password);
|
tpm_initializer_impl.cc | 62 std::string owner_password; local 63 if (!openssl_util_.GetRandomBytes(kDefaultPasswordSize, &owner_password)) { 71 local_data.set_owner_password(owner_password); 76 if (!ChangeOwnerPassword(&connection, owner_password)) { 216 const std::string& owner_password) { 225 std::string mutable_owner_password(owner_password); 227 policy_handle, TSS_SECRET_MODE_PLAIN, owner_password.size(), 243 bool TpmInitializerImpl::TestTpmAuth(const std::string& owner_password) { 244 TpmConnection connection(owner_password); 249 // Call Tspi_TPM_GetStatus to test the |owner_password| provided [all...] |
tpm2_initializer_test.cc | 117 EXPECT_EQ(password, fake_local_data_.owner_password()); 124 std::string owner_password("owner"); 128 fake_local_data_.set_owner_password(owner_password); 133 TakeOwnership(owner_password, endorsement_password, lockout_password)) 137 EXPECT_EQ(owner_password, fake_local_data_.owner_password());
|
tpm_nvram_impl.cc | 145 std::string owner_password; local 146 if (!GetOwnerPassword(&owner_password)) { 149 TpmConnection owner_connection(owner_password); 191 std::string owner_password; local 192 if (!GetOwnerPassword(&owner_password)) { 195 TpmConnection owner_connection(owner_password); 467 std::string owner_password; local 468 if (!GetOwnerPassword(&owner_password)) { 471 return SetUsagePolicy(owner_password, nv_handle, &tpm_connection_); 534 bool TpmNvramImpl::GetOwnerPassword(std::string* owner_password) { [all...] |
tpm_nvram_impl.h | 89 // out argument |owner_password|. Returns true if we were able to read a 90 // non empty owner_password off disk, else false. 91 bool GetOwnerPassword(std::string* owner_password);
|
tpm2_nvram_impl.cc | 484 return local_data.owner_password(); 491 std::string owner_password = GetOwnerPassword(); local 492 if (owner_password.empty()) { 496 trunks_session_->SetEntityAuthorizationValue(owner_password);
|
tpm_manager_service_test.cc | 159 EXPECT_EQ(kOwnerPassword, reply.local_data().owner_password()); 283 EXPECT_EQ(kOwnerPassword, local_data->owner_password()); 331 EXPECT_EQ(kOwnerPassword, local_data.owner_password());
|
tpm_manager_service.cc | 309 return local_data.owner_password();
|
/system/tpm/trunks/ |
trunks_client_test.h | 94 // NOTE: This test needs the |owner_password| to work. 95 bool NvramTest(const std::string& owner_password);
|
trunks_client.cc | 52 puts(" --owner_password - used to provide an owner password"); 54 puts(" owner_password is supplied, it runs tests that"); 91 int TakeOwnership(const std::string& owner_password, 94 rc = factory.GetTpmUtility()->TakeOwnership(owner_password, owner_password, 95 owner_password); 193 return TakeOwnership(cl->GetSwitchValueASCII("owner_password"), factory); 246 if (cl->HasSwitch("owner_password")) { 247 std::string owner_password = cl->GetSwitchValueASCII("owner_password"); local [all...] |
tpm_utility_impl.h | 48 TPM_RC TakeOwnership(const std::string& owner_password, 169 // keys in the TPM. This operation must be authorized by the |owner_password| 172 TPM_RC CreateStorageRootKeys(const std::string& owner_password); 177 TPM_RC CreateSaltingKey(const std::string& owner_password);
|
trunks_client_test.cc | 815 bool TrunksClientTest::NvramTest(const std::string& owner_password) { 824 session->SetEntityAuthorizationValue(owner_password); 835 auto cleanup = [](HmacSession* session, const std::string& owner_password, 837 session->SetEntityAuthorizationValue(owner_password) [all...] |
tpm_utility.h | 75 virtual TPM_RC TakeOwnership(const std::string& owner_password,
|
trunks_factory_for_test.cc | 133 TPM_RC TakeOwnership(const std::string& owner_password, 136 return target_->TakeOwnership(owner_password, endorsement_password,
|
tpm_utility_impl.cc | 248 TPM_RC TpmUtilityImpl::TakeOwnership(const std::string& owner_password, 304 session->SetFutureAuthorizationValue(owner_password); 305 result = SetHierarchyAuthorization(TPM_RH_OWNER, owner_password, [all...] |
tpm_utility_test.cc | 75 TPM_RC SetKnownOwnerPassword(const std::string& owner_password) { 76 return utility_.SetKnownOwnerPassword(owner_password); 79 TPM_RC CreateStorageRootKeys(const std::string& owner_password) { 80 return utility_.CreateStorageRootKeys(owner_password); 83 TPM_RC CreateSaltingKey(const std::string& owner_password) { 84 return utility_.CreateSaltingKey(owner_password); [all...] |
/external/vboot_reference/utility/ |
chromeos-tpm-recovery-test | 175 "$4" != "--owner_password" ]; then 262 tpm-nvtool --release --index 0x1007 --owner_password "" 263 tpm-nvtool --release --index 0x1008 --owner_password ""
|
chromeos-tpm-recovery | 102 $nvtool --release --index "$index" --owner_password "" >> $RECOVERY_LOG 2>&1
|
/system/tpm/tpm_manager/common/ |
print_tpm_manager_proto.cc | 183 output += indent + " owner_password: "; 185 base::HexEncode(value.owner_password().data(), 186 value.owner_password().size())
|