Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 25) sorted by relevance

/system/tpm/trunks/
Dpolicy_session_test.cc47 HmacAuthorizationDelegate* GetHmacDelegate(PolicySessionImpl* session) { in GetHmacDelegate() argument
48 return &(session->hmac_delegate_); in GetHmacDelegate()
58 PolicySessionImpl session(factory_); in TEST_F() local
61 EXPECT_EQ(nullptr, session.GetDelegate()); in TEST_F()
65 PolicySessionImpl session(factory_); in TEST_F() local
66 EXPECT_EQ(GetHmacDelegate(&session), session.GetDelegate()); in TEST_F()
70 PolicySessionImpl session(factory_); in TEST_F() local
72 session.StartBoundSession(TPM_RH_FIRST, "auth", true)); in TEST_F()
76 PolicySessionImpl session(factory_); in TEST_F() local
81 EXPECT_EQ(TPM_RC_FAILURE, session.StartBoundSession(handle, "auth", true)); in TEST_F()
[all …]
Dhmac_session_test.cc47 HmacAuthorizationDelegate* GetHmacDelegate(HmacSessionImpl* session) { in GetHmacDelegate() argument
48 return &(session->hmac_delegate_); in GetHmacDelegate()
58 HmacSessionImpl session(factory_); in TEST_F() local
61 EXPECT_EQ(nullptr, session.GetDelegate()); in TEST_F()
65 HmacSessionImpl session(factory_); in TEST_F() local
66 EXPECT_EQ(GetHmacDelegate(&session), session.GetDelegate()); in TEST_F()
70 HmacSessionImpl session(factory_); in TEST_F() local
75 EXPECT_EQ(TPM_RC_SUCCESS, session.StartBoundSession(bind_entity, "", true)); in TEST_F()
79 HmacSessionImpl session(factory_); in TEST_F() local
84 EXPECT_EQ(TPM_RC_FAILURE, session.StartBoundSession(bind_entity, "", true)); in TEST_F()
[all …]
Dtrunks_client_test.cc72 scoped_ptr<HmacSession> session = factory_->GetHmacSession(); in RNGTest() local
73 if (utility->StartSession(session.get()) != TPM_RC_SUCCESS) { in RNGTest()
80 TPM_RC result = utility->StirRandom(entropy_data, session->GetDelegate()); in RNGTest()
85 result = utility->GenerateRandom(num_bytes, session->GetDelegate(), in RNGTest()
101 scoped_ptr<HmacSession> session = factory_->GetHmacSession(); in SignTest() local
102 if (utility->StartSession(session.get()) != TPM_RC_SUCCESS) { in SignTest()
111 kNoCreationPCR, session->GetDelegate(), &key_blob, nullptr); in SignTest()
117 result = utility->LoadKey(key_blob, session->GetDelegate(), &signing_key); in SignTest()
122 session->SetEntityAuthorizationValue(key_authorization); in SignTest()
125 std::string(32, 'a'), session->GetDelegate(), in SignTest()
[all …]
Dtpm_utility_impl.cc272 scoped_ptr<HmacSession> session = factory_.GetHmacSession(); in TakeOwnership() local
273 result = session->StartUnboundSession(true); in TakeOwnership()
281 session->SetEntityAuthorizationValue(""); in TakeOwnership()
282 session->SetFutureAuthorizationValue(endorsement_password); in TakeOwnership()
286 session->GetDelegate()); in TakeOwnership()
292 session->SetFutureAuthorizationValue(lockout_password); in TakeOwnership()
296 session->GetDelegate()); in TakeOwnership()
303 session->SetEntityAuthorizationValue(kWellKnownPassword); in TakeOwnership()
304 session->SetFutureAuthorizationValue(owner_password); in TakeOwnership()
307 session->GetDelegate()); in TakeOwnership()
[all …]
Dtrunks_client_test.h112 HmacSession* session);
Dtpm_utility.h243 virtual TPM_RC StartSession(HmacSession* session) = 0;
Dtpm_utility_impl.h120 TPM_RC StartSession(HmacSession* session) override;
Dtrunks_factory_for_test.cc298 TPM_RC StartSession(HmacSession* session) override { in StartSession() argument
299 return target_->StartSession(session); in StartSession()
/system/tpm/attestation/server/
Dpkcs11_key_store.cc106 ScopedSession session(slot); in Read() local
107 if (!session.IsValid()) { in Read()
111 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); in Read()
118 if (C_GetAttributeValue(session.handle(), in Read()
126 if (C_GetAttributeValue(session.handle(), in Read()
148 ScopedSession session(slot); in Write() local
149 if (!session.IsValid()) { in Write()
182 if (C_CreateObject(session.handle(), in Write()
199 ScopedSession session(slot); in Delete() local
200 if (!session.IsValid()) { in Delete()
[all …]
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/
Dheader.h105 int perf_session__read_header(struct perf_session *session);
106 int perf_session__write_header(struct perf_session *session,
133 struct perf_session *session,
143 struct perf_session *session);
151 struct perf_session *session);
/system/bt/osi/src/protos/
Dbluetooth.proto17 repeated BluetoothSession session = 1; field
66 // Duration of the session.
78 // The information about the RFComm session.
81 // The information about the A2DP session.
94 // Session information that gets logged for every A2DP session.
/system/core/metricsd/uploader/proto/
Dchrome_user_metrics_extension.proto58 // The session id for this user.
59 // Values such as tab ids are only meaningful within a particular session.
60 // The client keeps track of the session id and sends it with each event.
61 // The session id is simply an integer that is incremented each time the user
Dsystem_profile.proto18 // The system configuration fields are recorded once per client session.
438 // on the first user account launched during the current session.
495 // client session.
724 // Number of users currently signed into a multiprofile session.
/system/connectivity/shill/init/
Dshill-start-user-session.conf22 start on start-user-session
/system/tpm/trunks/generator/
Draw_commands.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
1035 session. The authorization sessions associated with handles will occur in the session area in the
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1285 4) If the handle references a session, then the session context shall be present in TPM memory
1315 authorization session area.
1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or,
1320 2) If the session is not loaded, the TPM will return the warning TPM_RC_REFERENCE_S0 + N
1321 where N is the number of the session. The first session is session zero, N = 0.
1324 If the HMAC and policy session contexts use the same memory, the type of the context must
[all …]
Draw_commands_fixed.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
1035 session. The authorization sessions associated with handles will occur in the session area in the
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1285 4) If the handle references a session, then the session context shall be present in TPM memory
1315 authorization session area.
1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or,
1320 2) If the session is not loaded, the TPM will return the warning TPM_RC_REFERENCE_S0 + N
1321 where N is the number of the session. The first session is session zero, N = 0.
1324 If the HMAC and policy session contexts use the same memory, the type of the context must
[all …]
Draw_structures.txt4321 authorization-session nonce associated with the command.
4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4373 handle, or session.
4552 … are 64 errors with this format. The errors can be associated with a parameter, handle, or session.
4556 associated with a session, a value of 8 plus the session number (1 to 7) is added to the N field. I…
4558 will indicate a session error.
4561 If an implementation is not able to designate the handle, session, or parameter in error, then P an…
4595 CLEAR (0): The error is associated with a handle or a session.
4608 the number of the handle, session, or parameter in error
4610 handle or session in error. Handles use values of N between 0000 2 and 01112. Sessions use
[all …]
Draw_structures_fixed.txt4315 authorization-session nonce associated with the command.
4339 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4367 handle, or session.
4546 … are 64 errors with this format. The errors can be associated with a parameter, handle, or session.
4550 associated with a session, a value of 8 plus the session number (1 to 7) is added to the N field. I…
4552 will indicate a session error.
4555 If an implementation is not able to designate the handle, session, or parameter in error, then P an…
4589 CLEAR (0): The error is associated with a handle or a session.
4602 the number of the handle, session, or parameter in error
4604 handle or session in error. Handles use values of N between 0000 2 and 01112. Sessions use
[all …]
/system/media/audio/include/system/
Daudio.h1016 audio_session_t session; /* audio session */ member
1043 struct audio_port_config_session_ext session; /* session specific info */ member
1080 audio_session_t session; /* audio session */ member
1100 struct audio_port_session_ext session; member
/system/bt/service/doc/
DIBluetoothLowEnergyCallback.txt42 * Called to report BLE device scan results once a scan session is started for
DIBluetoothLowEnergy.txt70 * Stops a previously initiated scan session for the client with ID
/system/connectivity/shill/
Dicmp_session_unittest.cc189 IcmpSession session(&dispatcher_); in TEST_F() local
190 EXPECT_EQ(saved_echo_id, session.echo_id_); in TEST_F()
/system/core/fastboot/
Dfastboot_protocol.txt273 fastboot session. This message is meant to allow recovery if a
274 previous session failed, e.g. due to network error or user Ctrl+C.
/system/core/adb/
DSERVICES.TXT165 Start an interactive shell session on the device. Redirect
/system/connectivity/shill/mobile_operator_db/
Dserviceproviders.prototxt5621 apn : "web.session"