/system/tpm/tpm_manager/server/ |
H A D | tpm2_initializer_impl.cc | 31 using trunks::TPM_RC_SUCCESS; 110 if (result != TPM_RC_SUCCESS) { 156 if (result != TPM_RC_SUCCESS) { 166 if (result != TPM_RC_SUCCESS) { 181 if (result != TPM_RC_SUCCESS) { 191 if (result != TPM_RC_SUCCESS) {
|
H A D | tpm2_initializer_test.cc | 112 DoAll(SetArgPointee<2>(password), Return(trunks::TPM_RC_SUCCESS))); 114 .WillOnce(Return(trunks::TPM_RC_SUCCESS)); 134 .WillOnce(Return(trunks::TPM_RC_SUCCESS)); 146 Return(trunks::TPM_RC_SUCCESS))); 150 .WillRepeatedly(Return(trunks::TPM_RC_SUCCESS)); 163 Return(trunks::TPM_RC_SUCCESS))); 172 .WillRepeatedly(Return(trunks::TPM_RC_SUCCESS));
|
H A D | tpm2_nvram_impl.cc | 32 using trunks::TPM_RC_SUCCESS; 103 case trunks::TPM_RC_SUCCESS: 169 if (result != TPM_RC_SUCCESS) { 189 if (result != TPM_RC_SUCCESS) { 205 if (result != TPM_RC_SUCCESS) { 250 if (result != TPM_RC_SUCCESS) { 265 if (result != TPM_RC_SUCCESS) { 312 if (result != TPM_RC_SUCCESS) { 328 if (result != TPM_RC_SUCCESS) { 379 if (result != TPM_RC_SUCCESS) { [all...] |
H A D | tpm2_nvram_test.cc | 53 using trunks::TPM_RC_SUCCESS; 73 DoAll(SetArgPointee<0>(kFakePolicyDigest), Return(TPM_RC_SUCCESS))); 76 DoAll(SetArgPointee<0>(kFakePolicyDigest), Return(TPM_RC_SUCCESS))); 112 DoAll(SetArgPointee<1>(public_data), Return(TPM_RC_SUCCESS))); 142 DoAll(SetArgPointee<1>(kFakePCRValue), Return(TPM_RC_SUCCESS))); 192 .WillOnce(Return(TPM_RC_SUCCESS)); 218 .WillOnce(Return(TPM_RC_SUCCESS)) 238 DoAll(SetArgPointee<1>(kFakePCRValue), Return(TPM_RC_SUCCESS))); 249 .WillOnce(Return(TPM_RC_SUCCESS)); 294 .WillOnce(Return(TPM_RC_SUCCESS)); [all...] |
H A D | tpm2_status_impl.cc | 25 using trunks::TPM_RC_SUCCESS; 73 if (result != TPM_RC_SUCCESS) {
|
H A D | tpm2_status_test.cc | 29 using trunks::TPM_RC_SUCCESS; 51 .WillRepeatedly(Return(TPM_RC_SUCCESS)); 62 EXPECT_CALL(mock_tpm_state_, Initialize()).WillOnce(Return(TPM_RC_SUCCESS)); 69 .WillRepeatedly(Return(TPM_RC_SUCCESS)); 82 .WillRepeatedly(Return(TPM_RC_SUCCESS)); 90 EXPECT_CALL(mock_tpm_state_, Initialize()).WillOnce(Return(TPM_RC_SUCCESS)); 133 .WillRepeatedly(Return(TPM_RC_SUCCESS));
|
/system/tpm/trunks/ |
H A D | blob_parser.cc | 35 if (result != TPM_RC_SUCCESS) { 40 if (result != TPM_RC_SUCCESS) { 59 if (result != TPM_RC_SUCCESS) { 64 if (result != TPM_RC_SUCCESS) { 78 if (result != TPM_RC_SUCCESS) { 83 if (result != TPM_RC_SUCCESS) { 88 if (result != TPM_RC_SUCCESS) { 109 if (result != TPM_RC_SUCCESS) { 114 if (result != TPM_RC_SUCCESS) { 120 if (result != TPM_RC_SUCCESS) { [all...] |
H A D | error_codes.cc | 35 case trunks::TPM_RC_SUCCESS: 36 return "TPM_RC_SUCCESS"; 356 CHECK_EQ(Serialize_TPM_ST(TPM_ST_NO_SESSIONS, &response), TPM_RC_SUCCESS); local 357 CHECK_EQ(Serialize_UINT32(kErrorResponseSize, &response), TPM_RC_SUCCESS); local 358 CHECK_EQ(Serialize_TPM_RC(error_code, &response), TPM_RC_SUCCESS); local
|
H A D | hmac_authorization_delegate.cc | 82 TPM_RC_SUCCESS) local 102 if (serialize_error != TPM_RC_SUCCESS) { 120 if (parse_error != TPM_RC_SUCCESS) { 137 TPM_RC_SUCCESS) local 250 if (Serialize_uint32_t(1, &counter) != TPM_RC_SUCCESS || 251 Serialize_uint32_t(kDigestBits, &digest_size_bits) != TPM_RC_SUCCESS) {
|
H A D | hmac_authorization_delegate_test.cc | 133 EXPECT_EQ(TPM_RC_SUCCESS, 153 EXPECT_EQ(TPM_RC_SUCCESS, 170 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND( 192 EXPECT_EQ(TPM_RC_SUCCESS, 208 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND( 215 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND( 228 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND( 235 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND( 243 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAND( 251 EXPECT_EQ(TPM_RC_SUCCESS, Parse_TPMS_AUTH_COMMAN [all...] |
H A D | hmac_session_test.cc | 74 .WillOnce(Return(TPM_RC_SUCCESS)); 75 EXPECT_EQ(TPM_RC_SUCCESS, session.StartBoundSession(bind_entity, "", true));
|
H A D | mock_tpm.cc | 30 .WillByDefault(DoAll(SetArgPointee<3>(YES), Return(TPM_RC_SUCCESS)));
|
H A D | password_authorization_delegate.cc | 46 if (serialize_error != TPM_RC_SUCCESS) { 66 if (parse_error != TPM_RC_SUCCESS) {
|
H A D | policy_session_impl.cc | 82 if (result != TPM_RC_SUCCESS) { 87 return TPM_RC_SUCCESS; 104 if (result != TPM_RC_SUCCESS) { 109 return TPM_RC_SUCCESS; 139 if (result != TPM_RC_SUCCESS) { 143 return TPM_RC_SUCCESS; 151 if (result != TPM_RC_SUCCESS) { 156 return TPM_RC_SUCCESS; 164 if (result != TPM_RC_SUCCESS) { 170 return TPM_RC_SUCCESS; [all...] |
H A D | policy_session_test.cc | 71 EXPECT_EQ(TPM_RC_SUCCESS, 92 EXPECT_EQ(TPM_RC_SUCCESS, session.StartUnboundSession(true)); 109 .WillOnce(DoAll(SetArgPointee<2>(policy_digest), Return(TPM_RC_SUCCESS))); 110 EXPECT_EQ(TPM_RC_SUCCESS, session.GetDigest(&digest)); 130 .WillOnce(DoAll(SaveArg<2>(&tpm_digests), Return(TPM_RC_SUCCESS))); 131 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyOR(digests)); 163 Return(TPM_RC_SUCCESS))); 164 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyPCR(pcr_index, pcr_digest)); 192 .WillOnce(Return(TPM_RC_SUCCESS)); 193 EXPECT_EQ(TPM_RC_SUCCESS, sessio [all...] |
H A D | resource_manager.cc | 67 CHECK_EQ(tpm_utility->Startup(), TPM_RC_SUCCESS); 68 CHECK_EQ(tpm_utility->InitializeTpm(), TPM_RC_SUCCESS); 80 if (result != TPM_RC_SUCCESS) { 108 if (result != TPM_RC_SUCCESS) { 121 if (result != TPM_RC_SUCCESS) { 130 if (result != TPM_RC_SUCCESS) { 159 if (result != TPM_RC_SUCCESS) { 167 if (response_info.code == TPM_RC_SUCCESS) { 268 return TPM_RC_SUCCESS; 277 if (result != TPM_RC_SUCCESS) { 792 CHECK_EQ(Serialize_TPM_HANDLE(handle, &handles_blob), TPM_RC_SUCCESS); local [all...] |
H A D | resource_manager_test.cc | 153 std::string response = CreateResponse(TPM_RC_SUCCESS, output_handles, 160 CHECK_EQ(TPM_RC_SUCCESS, 171 TPM_RC_SUCCESS, kNoHandles, kNoAuthorization, kNoParameters); 176 .WillRepeatedly(Return(TPM_RC_SUCCESS)); 178 .WillRepeatedly(Return(TPM_RC_SUCCESS)); 188 std::string response = CreateResponse(TPM_RC_SUCCESS, output_handles, 202 TPM_RC_SUCCESS, kNoHandles, kNoAuthorization, kNoParameters); 207 .WillOnce(Return(TPM_RC_SUCCESS)); 236 std::string response = CreateResponse(TPM_RC_SUCCESS, kNoHandles, 247 std::string response = CreateResponse(TPM_RC_SUCCESS, kNoHandle [all...] |
H A D | scoped_key_handle.cc | 71 TPM_RC result = TPM_RC_SUCCESS;
|
H A D | scoped_key_handle_test.cc | 53 .WillOnce(Return(TPM_RC_SUCCESS)); 75 .WillOnce(Return(TPM_RC_SUCCESS)); 79 .WillOnce(Return(TPM_RC_SUCCESS)); 87 .WillOnce(Return(TPM_RC_SUCCESS));
|
H A D | session_manager_impl.cc | 68 if (result != TPM_RC_SUCCESS) { 94 if (salt_result != TPM_RC_SUCCESS) { 142 return TPM_RC_SUCCESS; 154 if (result != TPM_RC_SUCCESS) { 214 return TPM_RC_SUCCESS;
|
H A D | session_manager_test.cc | 83 .WillOnce(Return(TPM_RC_SUCCESS)); 107 .WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS))); 113 .WillOnce(DoAll(SetArgPointee<8>(nonce), Return(TPM_RC_SUCCESS))); 114 EXPECT_EQ(TPM_RC_SUCCESS, session_manager_.StartSession( 123 .WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS))); 130 .WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS))); 141 .WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS))); 156 .WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS))); 162 .WillOnce(DoAll(SetArgPointee<8>(nonce), Return(TPM_RC_SUCCESS)));
|
H A D | tpm_generated.cc | 505 return TPM_RC_SUCCESS; 533 return TPM_RC_SUCCESS; 554 return TPM_RC_SUCCESS; 582 return TPM_RC_SUCCESS; 603 return TPM_RC_SUCCESS; 629 return TPM_RC_SUCCESS; 650 return TPM_RC_SUCCESS; 678 return TPM_RC_SUCCESS; 699 return TPM_RC_SUCCESS; 727 return TPM_RC_SUCCESS; [all...] |
H A D | tpm_generated.h | 648 constexpr TPM_RC TPM_RC_SUCCESS = 0x000; member in namespace:trunks
|
H A D | tpm_generated_test.cc | 56 ASSERT_EQ(TPM_RC_SUCCESS, rc); 63 ASSERT_EQ(TPM_RC_SUCCESS, rc); 103 "\x00\x00\x00\x00", // code=TPM_RC_SUCCESS 112 EXPECT_EQ(TPM_RC_SUCCESS, tpm.StartupSync(TPM_SU_CLEAR, &authorization)); 197 "\x00\x00\x00\x00", // rc = TPM_RC_SUCCESS 250 ASSERT_EQ(rc, TPM_RC_SUCCESS); 268 CommandFlowTest() : response_code_(TPM_RC_SUCCESS) {} 337 "\x00\x00\x00\x00", // code=TPM_RC_SUCCESS 351 EXPECT_EQ(TPM_RC_SUCCESS, response_code_); 418 "\x00\x00\x00\x00" // code=TPM_RC_SUCCESS [all...] |
H A D | tpm_handle.cc | 68 if (result != TPM_RC_SUCCESS) { 94 return TPM_RC_SUCCESS;
|