Searched refs:TPM_RH_OWNER (Results 1 – 7 of 7) sorted by relevance
/system/tpm/trunks/ |
D | tpm_utility_impl.cc | 305 result = SetHierarchyAuthorization(TPM_RH_OWNER, in TakeOwnership() 1220 TPM_RH_OWNER, in DefineNVSpace() 1221 NameFromHandle(TPM_RH_OWNER), in DefineNVSpace() 1256 TPM_RH_OWNER, in DestroyNVSpace() 1257 NameFromHandle(TPM_RH_OWNER), in DestroyNVSpace() 1291 result = factory_.GetTpm()->NV_WriteLockSync(TPM_RH_OWNER, in LockNVSpace() 1292 NameFromHandle(TPM_RH_OWNER), in LockNVSpace() 1337 result = factory_.GetTpm()->NV_WriteSync(TPM_RH_OWNER, in WriteNVSpace() 1338 NameFromHandle(TPM_RH_OWNER), in WriteNVSpace() 1473 result = SetHierarchyAuthorization(TPM_RH_OWNER, in SetKnownOwnerPassword() [all …]
|
D | tpm_utility_test.cc | 315 EXPECT_CALL(mock_tpm_, HierarchyChangeAuthSync(TPM_RH_OWNER, _, _, _)) in TEST_F() 1735 EXPECT_CALL(mock_tpm_, NV_DefineSpaceSync(TPM_RH_OWNER, _, _, _, _)) in TEST_F() 1767 EXPECT_CALL(mock_tpm_, NV_DefineSpaceSync(TPM_RH_OWNER, _, _, _, _)) in TEST_F() 1777 NV_UndefineSpaceSync(TPM_RH_OWNER, _, nvram_index, _, _)); in TEST_F() 1796 NV_UndefineSpaceSync(TPM_RH_OWNER, _, nvram_index, _, _)) in TEST_F() 1805 EXPECT_CALL(mock_tpm_, NV_WriteLockSync(TPM_RH_OWNER, _, nvram_index, _, _)) in TEST_F() 1827 EXPECT_CALL(mock_tpm_, NV_WriteLockSync(TPM_RH_OWNER, _, nvram_index, _, _)) in TEST_F() 1838 NV_WriteSync(TPM_RH_OWNER, _, nvram_index, _, _, offset, _)) in TEST_F() 1870 NV_WriteSync(TPM_RH_OWNER, _, nvram_index, _, _, offset, _)) in TEST_F() 1968 EXPECT_CALL(mock_tpm_, HierarchyChangeAuthSync(TPM_RH_OWNER, _, _, _)) in TEST_F() [all …]
|
D | tpm_generated.h | 904 const TPM_RH TPM_RH_OWNER = 0x40000001; variable
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 1288 TPM_RH_OWNER, or TPM_RH_PLATFORM) then the enable for the hierarchy is SET 25043 TPM_RH_ENDORSEMENT, TPM_RH_OWNER, 25430 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or 25440 TPM_RH_ENDORSEMENT, TPM_RH_OWNER, 25581 case TPM_RH_OWNER: 25584 && in->authHandle != TPM_RH_OWNER) 25688 case TPM_RH_OWNER: 25795 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or 25946 case TPM_RH_OWNER: 26677 ObjectFlushHierarchy(TPM_RH_OWNER); [all …]
|
D | raw_commands_fixed.txt | 1288 TPM_RH_OWNER, or TPM_RH_PLATFORM) then the enable for the hierarchy is SET 25054 TPM_RH_ENDORSEMENT, TPM_RH_OWNER, 25441 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or 25451 TPM_RH_ENDORSEMENT, TPM_RH_OWNER, 25592 case TPM_RH_OWNER: 25595 && in->authHandle != TPM_RH_OWNER) 25699 case TPM_RH_OWNER: 25806 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or 25957 case TPM_RH_OWNER: 26688 ObjectFlushHierarchy(TPM_RH_OWNER); [all …]
|
D | raw_structures.txt | 7447 TPM_RH_OWNER 9296 (TPM_RH_PLATFORM, TPM_RH_OWNER, or TPM_RH_ENDORSEMENT), all loaded objects in the 9470 TPM_RH_OWNER 9622 TPM_RH_OWNER 9650 TPM_RH_OWNER 9695 TPM_RH_OWNER 9733 TPM_RH_OWNER indicating that ownerAuth is required. 9739 TPM_RH_OWNER 9786 allowed handles are either TPM_RH_OWNER or TPM_RH_PLATFORM indicating that either 9795 TPM_RH_OWNER [all …]
|
D | raw_structures_fixed.txt | 7474 TPM_RH_OWNER 9324 (TPM_RH_PLATFORM, TPM_RH_OWNER, or TPM_RH_ENDORSEMENT), all loaded objects in the 9498 TPM_RH_OWNER 9650 TPM_RH_OWNER 9678 TPM_RH_OWNER 9723 TPM_RH_OWNER 9761 TPM_RH_OWNER indicating that ownerAuth is required. 9767 TPM_RH_OWNER 9814 allowed handles are either TPM_RH_OWNER or TPM_RH_PLATFORM indicating that either 9823 TPM_RH_OWNER [all …]
|