/external/autotest/client/site_tests/hardware_TPMLoadKey/ |
D | control | 7 PURPOSE = "Detect that the TPM can execute the LoadKey function" 8 CRITERIA = "The TPM must be able to execute the TPM LoadKey function to pass" 15 This test determines that the TPM can execute a TPM LoadKey function.
|
/external/autotest/client/site_tests/kernel_TPMPing/ |
D | control | 7 PURPOSE = "Ping the TPM" 8 CRITERIA = "Fails if user-level cannot communicate with the TPM." 18 Checks that there is a TPM, that the driver can talk to it, and that the 20 the TPM, but makes no other assumptions on the TPM state (activated or not,
|
/external/autotest/client/site_tests/hardware_TPMttci/ |
D | control | 7 PURPOSE = "Exercise TPM TTCI board modules with TPM" 8 CRITERIA = "Check TTCI module functionality and TPM sanity check" 16 check of the TPM (Trusted Platform Module) module (version & self-test).
|
/external/tpm2/generator/ |
D | raw_commands.txt | 907 This part 3 of the Trusted Module Library specification contains the definitions of the TPM command… 912 of a TPM. The combination of this part 3 and part 4: Supporting Routines is sufficient to fully des… 913 required behavior of a TPM. 914 The code in parts 3 and 4 is written to define the behavior of a compliant TPM. In some cases (e.g., 919 specification require that a TPM meet any particular level of conformance. 994 throttling by the TPM. If the command code does not have this notation, then a write to NV 997 failure. A TPM may use the occasion of command execution to update the NV 1005 TPM when the command completes. This may be combined with the {NV} modifier but not with the 1136 normative and different TPM may give different responses when a command has multiple errors. 1144 Before a TPM may begin the actions associated with a command, a set of command format and [all …]
|
D | raw_commands_fixed.txt | 907 This part 3 of the Trusted Module Library specification contains the definitions of the TPM command… 912 of a TPM. The combination of this part 3 and part 4: Supporting Routines is sufficient to fully des… 913 required behavior of a TPM. 914 The code in parts 3 and 4 is written to define the behavior of a compliant TPM. In some cases (e.g., 919 specification require that a TPM meet any particular level of conformance. 994 throttling by the TPM. If the command code does not have this notation, then a write to NV 997 failure. A TPM may use the occasion of command execution to update the NV 1005 TPM when the command completes. This may be combined with the {NV} modifier but not with the 1136 normative and different TPM may give different responses when a command has multiple errors. 1144 Before a TPM may begin the actions associated with a command, a set of command format and [all …]
|
D | raw_structures.txt | 472 10.11 TPM Attestation Structures ..................................................................… 816 Table 9 — TPM Command Format Fields Description ...................................................… 1115 Figure 4 — TPM 1.2 TPM_NV_INDEX ...................................................................… 1116 Figure 5 — TPM 2.0 TPM_NV_INDEX ...................................................................… 1138 flags, structure, and union definitions used to communicate with the TPM. Values defined in this 1139 document are used by the TPM commands defined in part 3: Commands and by the functions in part 4: 1146 are "packed" with no octets of padding between structure elements. The TPM-internal form of the 1147 structures is dependent on the processor and compiler for the TPM implementation. 1698 be communicated on the TPM interface and used by the TPM: 2036 Parameter limits expressed using braces apply only to inputs to the TPM. Any value returned by the [all …]
|
D | raw_structures_fixed.txt | 472 10.11 TPM Attestation Structures ..................................................................… 816 Table 9 — TPM Command Format Fields Description ...................................................… 1115 Figure 4 — TPM 1.2 TPM_NV_INDEX ...................................................................… 1116 Figure 5 — TPM 2.0 TPM_NV_INDEX ...................................................................… 1138 flags, structure, and union definitions used to communicate with the TPM. Values defined in this 1139 document are used by the TPM commands defined in part 3: Commands and by the functions in part 4: 1146 are "packed" with no octets of padding between structure elements. The TPM-internal form of the 1147 structures is dependent on the processor and compiler for the TPM implementation. 1698 be communicated on the TPM interface and used by the TPM: 2033 Parameter limits expressed using braces apply only to inputs to the TPM. Any value returned by the [all …]
|
/external/tpm2/ |
D | part3.txt | 547 This TPM 2.0 Part 3 of the Trusted Platform Module Library specification contains the definitions o… 548 TPM commands. These commands make use of the constants, flags, structures, and union definitions 549 defined in TPM 2.0 Part 2. 551 comments. The behavior of the C code in this TPM 2.0 Part 3 is normative but does not fully describ… 552 behavior of a TPM. The combination of this TPM 2.0 Part 3 and TPM 2.0 Part 4 is sufficient to fully 553 describe the required behavior of a TPM. 554 The code in parts 3 and 4 is written to define the behavior of a compliant TPM. In some cases (e.g., 556 …mentation provided by the vendor that meets the general description of the function provided in TPM 559 specification require that a TPM meet any particular level of conformance. 564 For the purposes of this document, the terms and definitions given in TPM 2.0 Part 1 apply. [all …]
|
D | README | 1 This repository contains source code derived from the TCG TPM 2.0 library 12 pdftotext -eol unix -layout 'TPM/2.0/TPM Rev 2.0 Part 3 - Commands 01.16-code.pdf' part3.txt 13 pdftotext -eol unix -layout 'TPM Rev 2.0 Part 4 - Supporting Routines 01.16-code.pdf' part4.txt
|
/external/llvm/lib/IR/ |
D | LegacyPassManager.cpp | 836 const PassInfo *PInf = TPM->findAnalysisPassInfo(PI); in recordAvailableAnalysis() 846 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis() 870 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis() 886 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis() 940 if (!TPM) in removeDeadPasses() 943 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses() 969 if (const PassInfo *PInf = TPM->findAnalysisPassInfo(PI)) { in freePass() 1034 TPM->setLastUser(LastUses, P); in add() 1038 TPM->setLastUser(TransferLastUses, My_PM); in add() 1044 const PassInfo *PI = TPM->findAnalysisPassInfo(ID); in add() [all …]
|
/external/autotest/client/site_tests/hardware_TPMtspi/ |
D | control | 7 PURPOSE = "Exercise TPM modules using TSPI library API" 8 CRITERIA = "Check TPM functionality" 15 This test exercises the basic functionalities of the TPM
|
/external/autotest/client/site_tests/hardware_TPMCheck/ |
D | control | 9 PURPOSE = "Basic check of the TPM state" 10 CRITERIA = "Check that the TPM is in the expected state for use in Chrome OS." 17 A basic sanity check of the state of the TPM (Trusted Platform Module)
|
/external/autotest/client/site_tests/platform_CryptohomeTPMReOwn/ |
D | control | 7 PURPOSE = "Verify that cryptohome re-creates the user's vault directory when the TPM is re-owned." 8 CRITERIA = "This will run a test of re-owning the TPM." 16 when the TPM is re-owned.
|
/external/autotest/server/site_tests/enterprise_RemoraRequisitionServer/ |
D | control | 15 This test clears the TPM if necessary, kicks off a client side test that enrolls 16 a device as a remora device and clears the TPM again. Every time the TPM is
|
/external/autotest/client/site_tests/kernel_TPMStress/ |
D | control | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 17 Sends commands to the TPM in a tight loop for some length of time, in
|
D | control.stress5 | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 17 Sends commands to the TPM in a tight loop for some length of time, in
|
D | control.stress2 | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 17 Sends commands to the TPM in a tight loop for some length of time, in
|
D | control.stress4 | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 17 Sends commands to the TPM in a tight loop for some length of time, in
|
D | control.stress3 | 7 PURPOSE = "Stress test of communication with the TPM" 8 CRITERIA = "Fails if there are communication errors with the TPM" 17 Sends commands to the TPM in a tight loop for some length of time, in
|
/external/autotest/client/site_tests/platform_TPMEvict/ |
D | control | 7 PURPOSE = "Tests the TPM under low-resource conditions." 17 This test verifies that PKCS #11 services remain functional when the TPM is 19 are able to fit in TPM memory which requires that previously loaded keys be
|
/external/autotest/client/site_tests/power_CheckAfterSuspend/ |
D | control.TPMCheckStress | 9 PURPOSE = "Check of the TPM state after S3" 10 CRITERIA = "Check that the TPM is in the expected state after many S3 Resumes." 17 A check of the state of the TPM (Trusted Platform Module) after S3 Resume
|
/external/autotest/client/site_tests/suite_TPM/ |
D | control | 7 PURPOSE = "Execute automated TPM functionality checks." 14 This test suite runs automated TPM Smogcheck tests. The purpose of 15 the suite is to sanity test basic TPM functionality in less than 10 minutes.
|
/external/autotest/server/site_tests/firmware_TPMKernelVersion/ |
D | control | 9 PURPOSE = "Check kernel version in TPM is not corrupted." 10 CRITERIA = "This test will fail if kernel version in TPM is corrupted." 21 in the TPM.
|
/external/autotest/server/site_tests/firmware_TPMExtend/ |
D | control | 9 PURPOSE = "Ensure TPM PCRs have been correctly extended with boot mode and HWID" 10 CRITERIA = "This test will fail if TPM PCR 0 or 1 has an incorrect value" 20 This test ensures that the TPM PCRs 0 and 1 have been extended with a hash that
|
/external/llvm/lib/Analysis/ |
D | RegionPass.cpp | 59 populateInheritedAnalysis(TPM->activeStack); in runOnFunction() 264 PMTopLevelManager *TPM = PMD->getTopLevelManager(); in assignPassManager() local 265 TPM->addIndirectPassManager(RGPM); in assignPassManager() 269 TPM->schedulePass(RGPM); in assignPassManager()
|