/system/tpm/trunks/ |
D | policy_session_test.cc | 47 HmacAuthorizationDelegate* GetHmacDelegate(PolicySessionImpl* session) { in GetHmacDelegate() argument 48 return &(session->hmac_delegate_); in GetHmacDelegate() 58 PolicySessionImpl session(factory_); in TEST_F() local 61 EXPECT_EQ(nullptr, session.GetDelegate()); in TEST_F() 65 PolicySessionImpl session(factory_); in TEST_F() local 66 EXPECT_EQ(GetHmacDelegate(&session), session.GetDelegate()); in TEST_F() 70 PolicySessionImpl session(factory_); in TEST_F() local 72 session.StartBoundSession(TPM_RH_FIRST, "auth", true)); in TEST_F() 76 PolicySessionImpl session(factory_); in TEST_F() local 81 EXPECT_EQ(TPM_RC_FAILURE, session.StartBoundSession(handle, "auth", true)); in TEST_F() [all …]
|
D | hmac_session_test.cc | 47 HmacAuthorizationDelegate* GetHmacDelegate(HmacSessionImpl* session) { in GetHmacDelegate() argument 48 return &(session->hmac_delegate_); in GetHmacDelegate() 58 HmacSessionImpl session(factory_); in TEST_F() local 61 EXPECT_EQ(nullptr, session.GetDelegate()); in TEST_F() 65 HmacSessionImpl session(factory_); in TEST_F() local 66 EXPECT_EQ(GetHmacDelegate(&session), session.GetDelegate()); in TEST_F() 70 HmacSessionImpl session(factory_); in TEST_F() local 75 EXPECT_EQ(TPM_RC_SUCCESS, session.StartBoundSession(bind_entity, "", true)); in TEST_F() 79 HmacSessionImpl session(factory_); in TEST_F() local 84 EXPECT_EQ(TPM_RC_FAILURE, session.StartBoundSession(bind_entity, "", true)); in TEST_F() [all …]
|
D | trunks_client_test.cc | 72 scoped_ptr<HmacSession> session = factory_->GetHmacSession(); in RNGTest() local 73 if (utility->StartSession(session.get()) != TPM_RC_SUCCESS) { in RNGTest() 80 TPM_RC result = utility->StirRandom(entropy_data, session->GetDelegate()); in RNGTest() 85 result = utility->GenerateRandom(num_bytes, session->GetDelegate(), in RNGTest() 101 scoped_ptr<HmacSession> session = factory_->GetHmacSession(); in SignTest() local 102 if (utility->StartSession(session.get()) != TPM_RC_SUCCESS) { in SignTest() 111 kNoCreationPCR, session->GetDelegate(), &key_blob, nullptr); in SignTest() 117 result = utility->LoadKey(key_blob, session->GetDelegate(), &signing_key); in SignTest() 122 session->SetEntityAuthorizationValue(key_authorization); in SignTest() 125 std::string(32, 'a'), session->GetDelegate(), in SignTest() [all …]
|
D | tpm_utility_impl.cc | 272 scoped_ptr<HmacSession> session = factory_.GetHmacSession(); in TakeOwnership() local 273 result = session->StartUnboundSession(true); in TakeOwnership() 281 session->SetEntityAuthorizationValue(""); in TakeOwnership() 282 session->SetFutureAuthorizationValue(endorsement_password); in TakeOwnership() 286 session->GetDelegate()); in TakeOwnership() 292 session->SetFutureAuthorizationValue(lockout_password); in TakeOwnership() 296 session->GetDelegate()); in TakeOwnership() 303 session->SetEntityAuthorizationValue(kWellKnownPassword); in TakeOwnership() 304 session->SetFutureAuthorizationValue(owner_password); in TakeOwnership() 307 session->GetDelegate()); in TakeOwnership() [all …]
|
D | trunks_client_test.h | 112 HmacSession* session);
|
D | tpm_utility.h | 243 virtual TPM_RC StartSession(HmacSession* session) = 0;
|
D | tpm_utility_impl.h | 120 TPM_RC StartSession(HmacSession* session) override;
|
D | trunks_factory_for_test.cc | 298 TPM_RC StartSession(HmacSession* session) override { in StartSession() argument 299 return target_->StartSession(session); in StartSession()
|
/system/tpm/attestation/server/ |
D | pkcs11_key_store.cc | 106 ScopedSession session(slot); in Read() local 107 if (!session.IsValid()) { in Read() 111 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); in Read() 118 if (C_GetAttributeValue(session.handle(), in Read() 126 if (C_GetAttributeValue(session.handle(), in Read() 148 ScopedSession session(slot); in Write() local 149 if (!session.IsValid()) { in Write() 182 if (C_CreateObject(session.handle(), in Write() 199 ScopedSession session(slot); in Delete() local 200 if (!session.IsValid()) { in Delete() [all …]
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/ |
D | header.h | 105 int perf_session__read_header(struct perf_session *session); 106 int perf_session__write_header(struct perf_session *session, 133 struct perf_session *session, 143 struct perf_session *session); 151 struct perf_session *session);
|
/system/bt/osi/src/protos/ |
D | bluetooth.proto | 17 repeated BluetoothSession session = 1; field 66 // Duration of the session. 78 // The information about the RFComm session. 81 // The information about the A2DP session. 94 // Session information that gets logged for every A2DP session.
|
/system/core/metricsd/uploader/proto/ |
D | chrome_user_metrics_extension.proto | 58 // The session id for this user. 59 // Values such as tab ids are only meaningful within a particular session. 60 // The client keeps track of the session id and sends it with each event. 61 // The session id is simply an integer that is incremented each time the user
|
D | system_profile.proto | 18 // The system configuration fields are recorded once per client session. 438 // on the first user account launched during the current session. 495 // client session. 724 // Number of users currently signed into a multiprofile session.
|
/system/connectivity/shill/init/ |
D | shill-start-user-session.conf | 22 start on start-user-session
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 1035 session. The authorization sessions associated with handles will occur in the session area in the 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1285 4) If the handle references a session, then the session context shall be present in TPM memory 1315 authorization session area. 1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or, 1320 2) If the session is not loaded, the TPM will return the warning TPM_RC_REFERENCE_S0 + N 1321 where N is the number of the session. The first session is session zero, N = 0. 1324 If the HMAC and policy session contexts use the same memory, the type of the context must [all …]
|
D | raw_commands_fixed.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 1035 session. The authorization sessions associated with handles will occur in the session area in the 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1285 4) If the handle references a session, then the session context shall be present in TPM memory 1315 authorization session area. 1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or, 1320 2) If the session is not loaded, the TPM will return the warning TPM_RC_REFERENCE_S0 + N 1321 where N is the number of the session. The first session is session zero, N = 0. 1324 If the HMAC and policy session contexts use the same memory, the type of the context must [all …]
|
D | raw_structures.txt | 4321 authorization-session nonce associated with the command. 4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the 4373 handle, or session. 4552 … are 64 errors with this format. The errors can be associated with a parameter, handle, or session. 4556 associated with a session, a value of 8 plus the session number (1 to 7) is added to the N field. I… 4558 will indicate a session error. 4561 If an implementation is not able to designate the handle, session, or parameter in error, then P an… 4595 CLEAR (0): The error is associated with a handle or a session. 4608 the number of the handle, session, or parameter in error 4610 handle or session in error. Handles use values of N between 0000 2 and 01112. Sessions use [all …]
|
D | raw_structures_fixed.txt | 4315 authorization-session nonce associated with the command. 4339 When a command fails, the TPM shall not update the authorization-session nonces associated with the 4367 handle, or session. 4546 … are 64 errors with this format. The errors can be associated with a parameter, handle, or session. 4550 associated with a session, a value of 8 plus the session number (1 to 7) is added to the N field. I… 4552 will indicate a session error. 4555 If an implementation is not able to designate the handle, session, or parameter in error, then P an… 4589 CLEAR (0): The error is associated with a handle or a session. 4602 the number of the handle, session, or parameter in error 4604 handle or session in error. Handles use values of N between 0000 2 and 01112. Sessions use [all …]
|
/system/media/audio/include/system/ |
D | audio.h | 1016 audio_session_t session; /* audio session */ member 1043 struct audio_port_config_session_ext session; /* session specific info */ member 1080 audio_session_t session; /* audio session */ member 1100 struct audio_port_session_ext session; member
|
/system/bt/service/doc/ |
D | IBluetoothLowEnergyCallback.txt | 42 * Called to report BLE device scan results once a scan session is started for
|
D | IBluetoothLowEnergy.txt | 70 * Stops a previously initiated scan session for the client with ID
|
/system/connectivity/shill/ |
D | icmp_session_unittest.cc | 189 IcmpSession session(&dispatcher_); in TEST_F() local 190 EXPECT_EQ(saved_echo_id, session.echo_id_); in TEST_F()
|
/system/core/fastboot/ |
D | fastboot_protocol.txt | 273 fastboot session. This message is meant to allow recovery if a 274 previous session failed, e.g. due to network error or user Ctrl+C.
|
/system/core/adb/ |
D | SERVICES.TXT | 165 Start an interactive shell session on the device. Redirect
|
/system/connectivity/shill/mobile_operator_db/ |
D | serviceproviders.prototxt | 5621 apn : "web.session"
|