Home
last modified time | relevance | path

Searched refs:TPM (Results 1 – 25 of 40) sorted by relevance

12

/external/autotest/client/site_tests/hardware_TPMLoadKey/
Dcontrol7 PURPOSE = "Detect that the TPM can execute the LoadKey function"
8 CRITERIA = "The TPM must be able to execute the TPM LoadKey function to pass"
15 This test determines that the TPM can execute a TPM LoadKey function.
/external/autotest/client/site_tests/kernel_TPMPing/
Dcontrol7 PURPOSE = "Ping the TPM"
8 CRITERIA = "Fails if user-level cannot communicate with the TPM."
18 Checks that there is a TPM, that the driver can talk to it, and that the
20 the TPM, but makes no other assumptions on the TPM state (activated or not,
/external/autotest/client/site_tests/hardware_TPMttci/
Dcontrol7 PURPOSE = "Exercise TPM TTCI board modules with TPM"
8 CRITERIA = "Check TTCI module functionality and TPM sanity check"
16 check of the TPM (Trusted Platform Module) module (version & self-test).
/external/tpm2/generator/
Draw_commands.txt907 This part 3 of the Trusted Module Library specification contains the definitions of the TPM command…
912 of a TPM. The combination of this part 3 and part 4: Supporting Routines is sufficient to fully des…
913 required behavior of a TPM.
914 The code in parts 3 and 4 is written to define the behavior of a compliant TPM. In some cases (e.g.,
919 specification require that a TPM meet any particular level of conformance.
994 throttling by the TPM. If the command code does not have this notation, then a write to NV
997 failure. A TPM may use the occasion of command execution to update the NV
1005 TPM when the command completes. This may be combined with the {NV} modifier but not with the
1136 normative and different TPM may give different responses when a command has multiple errors.
1144 Before a TPM may begin the actions associated with a command, a set of command format and
[all …]
Draw_commands_fixed.txt907 This part 3 of the Trusted Module Library specification contains the definitions of the TPM command…
912 of a TPM. The combination of this part 3 and part 4: Supporting Routines is sufficient to fully des…
913 required behavior of a TPM.
914 The code in parts 3 and 4 is written to define the behavior of a compliant TPM. In some cases (e.g.,
919 specification require that a TPM meet any particular level of conformance.
994 throttling by the TPM. If the command code does not have this notation, then a write to NV
997 failure. A TPM may use the occasion of command execution to update the NV
1005 TPM when the command completes. This may be combined with the {NV} modifier but not with the
1136 normative and different TPM may give different responses when a command has multiple errors.
1144 Before a TPM may begin the actions associated with a command, a set of command format and
[all …]
Draw_structures.txt472 10.11 TPM Attestation Structures ..................................................................…
816 Table 9 — TPM Command Format Fields Description ...................................................…
1115 Figure 4 — TPM 1.2 TPM_NV_INDEX ...................................................................…
1116 Figure 5 — TPM 2.0 TPM_NV_INDEX ...................................................................…
1138 flags, structure, and union definitions used to communicate with the TPM. Values defined in this
1139 document are used by the TPM commands defined in part 3: Commands and by the functions in part 4:
1146 are "packed" with no octets of padding between structure elements. The TPM-internal form of the
1147 structures is dependent on the processor and compiler for the TPM implementation.
1698 be communicated on the TPM interface and used by the TPM:
2036 Parameter limits expressed using braces apply only to inputs to the TPM. Any value returned by the
[all …]
Draw_structures_fixed.txt472 10.11 TPM Attestation Structures ..................................................................…
816 Table 9 — TPM Command Format Fields Description ...................................................…
1115 Figure 4 — TPM 1.2 TPM_NV_INDEX ...................................................................…
1116 Figure 5 — TPM 2.0 TPM_NV_INDEX ...................................................................…
1138 flags, structure, and union definitions used to communicate with the TPM. Values defined in this
1139 document are used by the TPM commands defined in part 3: Commands and by the functions in part 4:
1146 are "packed" with no octets of padding between structure elements. The TPM-internal form of the
1147 structures is dependent on the processor and compiler for the TPM implementation.
1698 be communicated on the TPM interface and used by the TPM:
2033 Parameter limits expressed using braces apply only to inputs to the TPM. Any value returned by the
[all …]
/external/tpm2/
Dpart3.txt547 This TPM 2.0 Part 3 of the Trusted Platform Module Library specification contains the definitions o…
548 TPM commands. These commands make use of the constants, flags, structures, and union definitions
549 defined in TPM 2.0 Part 2.
551 comments. The behavior of the C code in this TPM 2.0 Part 3 is normative but does not fully describ…
552 behavior of a TPM. The combination of this TPM 2.0 Part 3 and TPM 2.0 Part 4 is sufficient to fully
553 describe the required behavior of a TPM.
554 The code in parts 3 and 4 is written to define the behavior of a compliant TPM. In some cases (e.g.,
556 …mentation provided by the vendor that meets the general description of the function provided in TPM
559 specification require that a TPM meet any particular level of conformance.
564 For the purposes of this document, the terms and definitions given in TPM 2.0 Part 1 apply.
[all …]
DREADME1 This repository contains source code derived from the TCG TPM 2.0 library
12 pdftotext -eol unix -layout 'TPM/2.0/TPM Rev 2.0 Part 3 - Commands 01.16-code.pdf' part3.txt
13 pdftotext -eol unix -layout 'TPM Rev 2.0 Part 4 - Supporting Routines 01.16-code.pdf' part4.txt
/external/llvm/lib/IR/
DLegacyPassManager.cpp836 const PassInfo *PInf = TPM->findAnalysisPassInfo(PI); in recordAvailableAnalysis()
846 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis()
870 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis()
886 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis()
940 if (!TPM) in removeDeadPasses()
943 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses()
969 if (const PassInfo *PInf = TPM->findAnalysisPassInfo(PI)) { in freePass()
1034 TPM->setLastUser(LastUses, P); in add()
1038 TPM->setLastUser(TransferLastUses, My_PM); in add()
1044 const PassInfo *PI = TPM->findAnalysisPassInfo(ID); in add()
[all …]
/external/autotest/client/site_tests/hardware_TPMtspi/
Dcontrol7 PURPOSE = "Exercise TPM modules using TSPI library API"
8 CRITERIA = "Check TPM functionality"
15 This test exercises the basic functionalities of the TPM
/external/autotest/client/site_tests/hardware_TPMCheck/
Dcontrol9 PURPOSE = "Basic check of the TPM state"
10 CRITERIA = "Check that the TPM is in the expected state for use in Chrome OS."
17 A basic sanity check of the state of the TPM (Trusted Platform Module)
/external/autotest/client/site_tests/platform_CryptohomeTPMReOwn/
Dcontrol7 PURPOSE = "Verify that cryptohome re-creates the user's vault directory when the TPM is re-owned."
8 CRITERIA = "This will run a test of re-owning the TPM."
16 when the TPM is re-owned.
/external/autotest/server/site_tests/enterprise_RemoraRequisitionServer/
Dcontrol15 This test clears the TPM if necessary, kicks off a client side test that enrolls
16 a device as a remora device and clears the TPM again. Every time the TPM is
/external/autotest/client/site_tests/kernel_TPMStress/
Dcontrol7 PURPOSE = "Stress test of communication with the TPM"
8 CRITERIA = "Fails if there are communication errors with the TPM"
17 Sends commands to the TPM in a tight loop for some length of time, in
Dcontrol.stress57 PURPOSE = "Stress test of communication with the TPM"
8 CRITERIA = "Fails if there are communication errors with the TPM"
17 Sends commands to the TPM in a tight loop for some length of time, in
Dcontrol.stress27 PURPOSE = "Stress test of communication with the TPM"
8 CRITERIA = "Fails if there are communication errors with the TPM"
17 Sends commands to the TPM in a tight loop for some length of time, in
Dcontrol.stress47 PURPOSE = "Stress test of communication with the TPM"
8 CRITERIA = "Fails if there are communication errors with the TPM"
17 Sends commands to the TPM in a tight loop for some length of time, in
Dcontrol.stress37 PURPOSE = "Stress test of communication with the TPM"
8 CRITERIA = "Fails if there are communication errors with the TPM"
17 Sends commands to the TPM in a tight loop for some length of time, in
/external/autotest/client/site_tests/platform_TPMEvict/
Dcontrol7 PURPOSE = "Tests the TPM under low-resource conditions."
17 This test verifies that PKCS #11 services remain functional when the TPM is
19 are able to fit in TPM memory which requires that previously loaded keys be
/external/autotest/client/site_tests/power_CheckAfterSuspend/
Dcontrol.TPMCheckStress9 PURPOSE = "Check of the TPM state after S3"
10 CRITERIA = "Check that the TPM is in the expected state after many S3 Resumes."
17 A check of the state of the TPM (Trusted Platform Module) after S3 Resume
/external/autotest/client/site_tests/suite_TPM/
Dcontrol7 PURPOSE = "Execute automated TPM functionality checks."
14 This test suite runs automated TPM Smogcheck tests. The purpose of
15 the suite is to sanity test basic TPM functionality in less than 10 minutes.
/external/autotest/server/site_tests/firmware_TPMKernelVersion/
Dcontrol9 PURPOSE = "Check kernel version in TPM is not corrupted."
10 CRITERIA = "This test will fail if kernel version in TPM is corrupted."
21 in the TPM.
/external/autotest/server/site_tests/firmware_TPMExtend/
Dcontrol9 PURPOSE = "Ensure TPM PCRs have been correctly extended with boot mode and HWID"
10 CRITERIA = "This test will fail if TPM PCR 0 or 1 has an incorrect value"
20 This test ensures that the TPM PCRs 0 and 1 have been extended with a hash that
/external/llvm/lib/Analysis/
DRegionPass.cpp59 populateInheritedAnalysis(TPM->activeStack); in runOnFunction()
264 PMTopLevelManager *TPM = PMD->getTopLevelManager(); in assignPassManager() local
265 TPM->addIndirectPassManager(RGPM); in assignPassManager()
269 TPM->schedulePass(RGPM); in assignPassManager()

12