/external/tpm2/ |
Context_spt_fp.h | 10 TPM2B_DIGEST *integrity // OUT: integrity
|
ContextLoad.c | 19 // TPM_RC_INTEGRITY context integrity check fail 34 TPM2B_DIGEST integrity; local 49 // Check integrity 54 // Get integrity from context blob 57 result = TPM2B_DIGEST_Unmarshal(&integrity, &buffer, &size); 60 if(integrity.t.size != integritySize) 63 integritySize += sizeof(integrity.t.size); 66 // Compute context integrity 69 // Compare integrity 70 if(!Memory2BEqual(&integrity.b, &integrityToCompare.b) [all...] |
Context_spt.c | 66 // Generate the integrity hash for a context It is used by TPM2_ContextSave() to create an integrity hash 67 // and by TPM2_ContextLoad() to compare an integrity hash 72 TPM2B_DIGEST *integrity // OUT: integrity 81 integrity->t.size = CryptStartHMAC2B(CONTEXT_INTEGRITY_HASH_ALG, 83 // Compute integrity size at the beginning of context blob 84 integritySize = sizeof(integrity->t.size) + integrity->t.size; 100 // Adding sensitive contextData, skip the leading integrity are [all...] |
ContextSave.c | 31 TPM2B_DIGEST integrity; local 59 // Compute the integrity size at the beginning of context blob 60 integritySize = sizeof(integrity.t.size) 74 // defined. In this implementation, the size is size of integrity 124 // fingerprint plus the size of integrity 166 // Reserve the integrity space 181 // Compute integrity hash for the object 184 ComputeContextIntegrity(&out->context, &integrity); 186 // add integrity at the beginning of context blob 189 TPM2B_DIGEST_Marshal(&integrity, &buffer, &bufferSize) [all...] |
Object_spt.c | 145 // The sensitive area parameter is a buffer that holds a space for the integrity value and the marshaled 146 // sensitive area. The caller should skip over the area set aside for the integrity value and compute the hash 158 TPMI_ALG_HASH hashAlg, // IN: algorithm to use for integrity 164 TPM2B_DIGEST *integrity // OUT: integrity 175 KDFa(hashAlg, (TPM2B *)seed, "INTEGRITY", NULL, NULL, 177 // Start HMAC and get the size of the digest which will become the integrity 178 integrity->t.size = CryptStartHMAC2B(hashAlg, &hmacKey.b, &hmacState); 179 // Adding the marshaled sensitive area to the integrity value 184 CryptCompleteHMAC2B(&hmacState, &integrity->b) 234 TPM2B_DIGEST integrity; local 270 TPM2B_DIGEST integrity; local 724 TPM2B_DIGEST integrity; local 809 TPM2B_DIGEST integrity; local [all...] |
tpm_types.h | 1616 TPM2B_DIGEST integrity; member in struct:__anon35647 [all...] |
/compatibility/cdd/9_security-model/ |
9_10_device-integrity.md | 1 ## 9.10\. Device Integrity 4 device integrity. Device implementations: 12 Verified boot is a feature that guarantees the integrity of the device 20 * [C-4-1] MUST implement each stage of verification to check the integrity 56 * [C-8-1] MUST support verified boot for device integrity.
|
9_7_kernel-security-features.md | 30 Kernel integrity and self-protection features are integral to Android
|
/external/autotest/client/site_tests/hardware_StorageFio/ |
hardware_StorageFio.py | 110 integrity=False, wait=60 * 60 * 72): 117 @param integrity: test to check data integrity 129 elif integrity:
|
/external/autotest/server/site_tests/hardware_StorageStress/ |
hardware_StorageStress.py | 13 Integrity stress test for storage device 27 power_command='reboot', storage_test_command='integrity', 41 - integrity: Check data integrity 73 if storage_test_command == 'integrity': 184 tag='%s_%d' % ('integrity', self._loop_count), 185 wait=0, integrity=True)
|
/external/mesa3d/src/gallium/docs/ |
make.bat | 25 echo. linkcheck to check all external links for integrity
|
/external/bart/docs/api_reference/ |
Makefile | 47 @echo " linkcheck to check all external links for integrity"
|
/external/devlib/doc/ |
Makefile | 47 @echo " linkcheck to check all external links for integrity"
|
make.bat | 38 echo. linkcheck to check all external links for integrity
|
/external/trappy/doc/api_reference/ |
Makefile | 47 @echo " linkcheck to check all external links for integrity"
|
/external/boringssl/src/util/fipstools/ |
break-hash.go | 16 // first byte of the module. This should cause the integrity check to fail.
|
delocate.go | 207 // break the integrity check. ASAN can generate these 472 // the integrity-checked area. [all...] |
/external/clang/docs/analyzer/ |
make.bat | 36 echo. linkcheck to check all external links for integrity
|
/external/clang/docs/ |
make.bat | 36 echo. linkcheck to check all external links for integrity
|
/external/llvm/docs/ |
make.bat | 36 echo. linkcheck to check all external links for integrity
|
/external/openssh/regress/ |
Makefile | 72 integrity \
|
/external/fio/doc/ |
make.bat | 39 echo. linkcheck to check all external links for integrity
|
/compatibility/cdd/7_hardware-compatibility/ |
7_3_sensors.md | 429 of sensor?s noise integrity. 446 of sensor?s noise integrity. 463 of sensor?s noise integrity.
|
/external/dnsmasq/contrib/dnslist/ |
dnslist.pl | 486 integrity of the free software distribution system, which is
|
/external/ipsec-tools/src/racoon/ |
cftoken.l | 317 <S_RMTS>integrity { YYD; yylval.num = IPSECDOI_SIT_INTEGRITY; return(SITUATIONTYPE); }
|