Home
last modified time | relevance | path

Searched refs:TPM_RH_OWNER (Results 1 – 7 of 7) sorted by relevance

/system/tpm/trunks/
Dtpm_utility_impl.cc305 result = SetHierarchyAuthorization(TPM_RH_OWNER, in TakeOwnership()
1220 TPM_RH_OWNER, in DefineNVSpace()
1221 NameFromHandle(TPM_RH_OWNER), in DefineNVSpace()
1256 TPM_RH_OWNER, in DestroyNVSpace()
1257 NameFromHandle(TPM_RH_OWNER), in DestroyNVSpace()
1291 result = factory_.GetTpm()->NV_WriteLockSync(TPM_RH_OWNER, in LockNVSpace()
1292 NameFromHandle(TPM_RH_OWNER), in LockNVSpace()
1337 result = factory_.GetTpm()->NV_WriteSync(TPM_RH_OWNER, in WriteNVSpace()
1338 NameFromHandle(TPM_RH_OWNER), in WriteNVSpace()
1473 result = SetHierarchyAuthorization(TPM_RH_OWNER, in SetKnownOwnerPassword()
[all …]
Dtpm_utility_test.cc315 EXPECT_CALL(mock_tpm_, HierarchyChangeAuthSync(TPM_RH_OWNER, _, _, _)) in TEST_F()
1735 EXPECT_CALL(mock_tpm_, NV_DefineSpaceSync(TPM_RH_OWNER, _, _, _, _)) in TEST_F()
1767 EXPECT_CALL(mock_tpm_, NV_DefineSpaceSync(TPM_RH_OWNER, _, _, _, _)) in TEST_F()
1777 NV_UndefineSpaceSync(TPM_RH_OWNER, _, nvram_index, _, _)); in TEST_F()
1796 NV_UndefineSpaceSync(TPM_RH_OWNER, _, nvram_index, _, _)) in TEST_F()
1805 EXPECT_CALL(mock_tpm_, NV_WriteLockSync(TPM_RH_OWNER, _, nvram_index, _, _)) in TEST_F()
1827 EXPECT_CALL(mock_tpm_, NV_WriteLockSync(TPM_RH_OWNER, _, nvram_index, _, _)) in TEST_F()
1838 NV_WriteSync(TPM_RH_OWNER, _, nvram_index, _, _, offset, _)) in TEST_F()
1870 NV_WriteSync(TPM_RH_OWNER, _, nvram_index, _, _, offset, _)) in TEST_F()
1968 EXPECT_CALL(mock_tpm_, HierarchyChangeAuthSync(TPM_RH_OWNER, _, _, _)) in TEST_F()
[all …]
Dtpm_generated.h904 const TPM_RH TPM_RH_OWNER = 0x40000001; variable
/system/tpm/trunks/generator/
Draw_commands.txt1288 TPM_RH_OWNER, or TPM_RH_PLATFORM) then the enable for the hierarchy is SET
25043 TPM_RH_ENDORSEMENT, TPM_RH_OWNER,
25430 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or
25440 TPM_RH_ENDORSEMENT, TPM_RH_OWNER,
25581 case TPM_RH_OWNER:
25584 && in->authHandle != TPM_RH_OWNER)
25688 case TPM_RH_OWNER:
25795 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or
25946 case TPM_RH_OWNER:
26677 ObjectFlushHierarchy(TPM_RH_OWNER);
[all …]
Draw_commands_fixed.txt1288 TPM_RH_OWNER, or TPM_RH_PLATFORM) then the enable for the hierarchy is SET
25054 TPM_RH_ENDORSEMENT, TPM_RH_OWNER,
25441 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or
25451 TPM_RH_ENDORSEMENT, TPM_RH_OWNER,
25592 case TPM_RH_OWNER:
25595 && in->authHandle != TPM_RH_OWNER)
25699 case TPM_RH_OWNER:
25806 TPM_RH_ENDORSEMENT, TPM_RH_OWNER or
25957 case TPM_RH_OWNER:
26688 ObjectFlushHierarchy(TPM_RH_OWNER);
[all …]
Draw_structures.txt7447 TPM_RH_OWNER
9296 (TPM_RH_PLATFORM, TPM_RH_OWNER, or TPM_RH_ENDORSEMENT), all loaded objects in the
9470 TPM_RH_OWNER
9622 TPM_RH_OWNER
9650 TPM_RH_OWNER
9695 TPM_RH_OWNER
9733 TPM_RH_OWNER indicating that ownerAuth is required.
9739 TPM_RH_OWNER
9786 allowed handles are either TPM_RH_OWNER or TPM_RH_PLATFORM indicating that either
9795 TPM_RH_OWNER
[all …]
Draw_structures_fixed.txt7474 TPM_RH_OWNER
9324 (TPM_RH_PLATFORM, TPM_RH_OWNER, or TPM_RH_ENDORSEMENT), all loaded objects in the
9498 TPM_RH_OWNER
9650 TPM_RH_OWNER
9678 TPM_RH_OWNER
9723 TPM_RH_OWNER
9761 TPM_RH_OWNER indicating that ownerAuth is required.
9767 TPM_RH_OWNER
9814 allowed handles are either TPM_RH_OWNER or TPM_RH_PLATFORM indicating that either
9823 TPM_RH_OWNER
[all …]