/system/tpm/tpm_manager/server/ |
H A D | tpm_connection.h | 42 TSS_HTPM GetTpmWithAuth(const std::string& owner_password);
|
H A D | tpm2_initializer_impl.cc | 68 std::string owner_password; local 73 owner_password.assign(local_data.owner_password()); 77 if (!GetTpmRandomData(kDefaultPasswordSize, &owner_password)) { 96 local_data.set_owner_password(owner_password); 104 owner_password, endorsement_password, lockout_password);
|
H A D | tpm_initializer_impl.h | 57 // the Tpm with the owner_password injected. 62 // with the owner_password injected. 67 // |tpm_handle| is a handle to the Tpm with the owner_password injected. 71 // to the password provided in the |owner_password| argument. 73 // with the old owner_password injected. 75 const std::string& owner_password); 77 // This method return true iff the provided |owner_password| is the current 80 bool TestTpmAuth(const std::string& owner_password);
|
H A D | tpm_connection.cc | 58 TSS_HTPM TpmConnection::GetTpmWithAuth(const std::string& owner_password) { argument 74 owner_password.size(), 75 reinterpret_cast<BYTE *>(const_cast<char*>(owner_password.data()))))) {
|
H A D | tpm2_initializer_test.cc | 107 std::string owner_password; local 125 std::string owner_password("owner"); 130 local_data.set_owner_password(owner_password); 141 EXPECT_EQ(owner_password, local_data.owner_password()); 144 EXPECT_CALL(mock_tpm_utility_, TakeOwnership(owner_password,
|
H A D | tpm_initializer_impl.cc | 62 std::string owner_password; local 63 if (!openssl_util_.GetRandomBytes(kDefaultPasswordSize, &owner_password)) { 71 local_data.set_owner_password(owner_password); 76 if (!ChangeOwnerPassword(tpm_handle, owner_password)) { 218 TSS_HTPM tpm_handle, const std::string& owner_password) { 228 std::string mutable_owner_password(owner_password); 231 owner_password.size(), 245 bool TpmInitializerImpl::TestTpmAuth(const std::string& owner_password) { argument 246 TSS_HTPM tpm_handle = tpm_connection_.GetTpmWithAuth(owner_password); 250 // Call Tspi_TPM_GetStatus to test the |owner_password| provide 217 ChangeOwnerPassword( TSS_HTPM tpm_handle, const std::string& owner_password) argument [all...] |
H A D | tpm_nvram_impl.cc | 277 std::string owner_password; local 278 if (!GetOwnerPassword(&owner_password)) { 284 owner_password.size(), 285 reinterpret_cast<BYTE *>(const_cast<char*>(owner_password.data()))); 309 std::string owner_password; local 310 if (!GetOwnerPassword(&owner_password)) { 314 result = Tspi_TPM_PcrRead(tpm_connection_.GetTpmWithAuth(owner_password), 339 bool TpmNvramImpl::GetOwnerPassword(std::string* owner_password) { argument 345 if (local_data.owner_password().empty()) { 349 owner_password [all...] |
H A D | tpm_nvram_impl.h | 65 // out argument |owner_password|. Returns true if we were able to read a 66 // non empty owner_password off disk, else false. 67 bool GetOwnerPassword(std::string* owner_password);
|
H A D | tpm2_nvram_impl.cc | 64 if (!local_data.owner_password().empty()) { 65 owner_password_.assign(local_data.owner_password());
|
H A D | tpm2_nvram_test.cc | 57 void InitializeNvram(const std::string& owner_password) { argument 59 local_data.set_owner_password(owner_password);
|
H A D | tpm_manager_service_test.cc | 165 EXPECT_EQ(kOwnerPassword, reply.local_data().owner_password()); 293 EXPECT_EQ(kOwnerPassword, local_data.owner_password()); 339 EXPECT_EQ(kOwnerPassword, local_data.owner_password());
|
/system/tpm/trunks/ |
H A D | trunks_client.cc | 49 puts(" --owner_password - used to provide an owner password"); 51 puts(" owner_password is supplied, it runs tests that"); 82 int TakeOwnership(const std::string& owner_password, TrunksFactory* factory) { argument 84 rc = factory->GetTpmUtility()->TakeOwnership(owner_password, 85 owner_password, 86 owner_password); 165 return TakeOwnership(cl->GetSwitchValueASCII("owner_password"), 219 if (cl->HasSwitch("owner_password")) { 220 std::string owner_password = cl->GetSwitchValueASCII("owner_password"); local [all...] |
H A D | trunks_client_test.h | 96 // NOTE: This test needs the |owner_password| to work. 97 bool NvramTest(const std::string& owner_password);
|
H A D | tpm_utility_impl.h | 48 TPM_RC TakeOwnership(const std::string& owner_password, 153 // keys in the TPM. This operation must be authorized by the |owner_password| 156 TPM_RC CreateStorageRootKeys(const std::string& owner_password); 161 TPM_RC CreateSaltingKey(const std::string& owner_password);
|
H A D | trunks_client_test.cc | 821 bool TrunksClientTest::NvramTest(const std::string& owner_password) { argument 830 session->SetEntityAuthorizationValue(owner_password); 838 session->SetEntityAuthorizationValue(owner_password); 856 session->SetEntityAuthorizationValue(owner_password); 873 session->SetEntityAuthorizationValue(owner_password); 879 session->SetEntityAuthorizationValue(owner_password);
|
H A D | tpm_utility.h | 78 virtual TPM_RC TakeOwnership(const std::string& owner_password,
|
H A D | tpm_utility_impl.cc | 248 TPM_RC TpmUtilityImpl::TakeOwnership(const std::string& owner_password, argument 304 session->SetFutureAuthorizationValue(owner_password); 306 owner_password, 1485 const std::string& owner_password) { 1506 factory_.GetPasswordAuthorization(owner_password); 1614 TPM_RC TpmUtilityImpl::CreateSaltingKey(const std::string& owner_password) { argument 1688 factory_.GetPasswordAuthorization(owner_password); 1484 CreateStorageRootKeys( const std::string& owner_password) argument
|
H A D | trunks_factory_for_test.cc | 145 TPM_RC TakeOwnership(const std::string& owner_password, 148 return target_->TakeOwnership(owner_password,
|
H A D | tpm_utility_test.cc | 77 TPM_RC SetKnownOwnerPassword(const std::string& owner_password) { argument 78 return utility_.SetKnownOwnerPassword(owner_password); 81 TPM_RC CreateStorageRootKeys(const std::string& owner_password) { argument 82 return utility_.CreateStorageRootKeys(owner_password); 85 TPM_RC CreateSaltingKey(const std::string& owner_password) { argument 86 return utility_.CreateSaltingKey(owner_password);
|
/system/tpm/tpm_manager/common/ |
H A D | print_local_data_proto.cc | 38 output += indent + " owner_password: "; 40 base::HexEncode(value.owner_password().data(), 41 value.owner_password().size())
|