/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/src/tpm_mgmt/ |
H A D | tpm_nvinfo.c | 76 logMsg("PCR %sselection:\n", type); 81 logMsg(" PCRs : "); 83 logMsg(", "); 90 logMsg("\n"); 94 logMsg(" Localities : ALL\n"); 96 logMsg(" Localities : 0x%01x\n", tpis->localityAtRelease); 101 logMsg(" Hash : "); 103 logMsg("%02x", tpis->digestAtRelease.digest[i]); 104 logMsg("\n"); 115 logMsg("NVRA [all...] |
H A D | tpm_version.c | 72 logMsg(_(" TPM 1.2 Version Info:\n")); 73 logMsg(_(" Chip Version: %hhu.%hhu.%hhu.%hhu\n"), 76 logMsg(_(" Spec Level: %hu\n"), versionInfo.specLevel); 77 logMsg(_(" Errata Revision: %hhu\n"), versionInfo.errataRev); 78 logMsg(_(" TPM Vendor ID: %c%c%c%c\n"), 83 logMsg(_(" Vendor Specific data: ")); 95 logMsg(_(" TPM Version: ")); 103 logMsg(_(" Manufacturer Info: "));
|
H A D | tpm_present.c | 190 logMsg(_("Failed to get password\n")); 215 logMsg 220 logMsg(_("Current State:\n")); 221 logMsg("\t%s: %s\n", _(flags[cmdEnable].name), logBool(mapTssBool(bCmd))); 222 logMsg("\t%s: %s\n", _(flags[hwdEnable].name), logBool(mapTssBool(bHwd))); 223 logMsg 226 logMsg 232 logMsg 237 logMsg 307 logMsg( [all...] |
H A D | tpm_activate.c | 127 logMsg(_("Failed to get password\n")); 143 logMsg(_("Persistent Deactivated Status: %s\n"), 149 logMsg(_("Volatile Deactivated Status: %s\n"), 155 logMsg(_("Action requires a reboot to take effect\n")); 160 logMsg(_("Action requires a reboot to take effect\n"));
|
H A D | tpm_getpubek.c | 91 logMsg(_("Failed to get password\n")); 109 logMsg(_("Public Endorsement Key:\n"));
|
H A D | tpm_clearable.c | 135 logMsg(_("Failed to get password\n")); 152 logMsg("%s Disabled: %s\n", _(flags[i].name), 171 logMsg(_("Failed to get password\n"));
|
H A D | tpm_enable.c | 126 logMsg(_("Failed to get password\n")); 141 logMsg(_("Disabled status: %s\n"), logBool(mapTssBool(bValue))); 151 logMsg(_("Failed to get password\n"));
|
H A D | tpm_clear.c | 105 logMsg(_("Failed to get password\n")); 125 logMsg( _("TPM Successfuly Cleared. You need to reboot to complete this operation. After reboot the TPM will be in the default state: unowned, disabled and inactive.\n") );
|
H A D | tpm_ownable.c | 117 logMsg(_("Failed to get password\n")); 133 logMsg(_("Ownable status: %s\n"), logBool(mapTssBool(bValue)));
|
H A D | tpm_restrictpubek.c | 103 logMsg(_("Failed to get password\n")); 119 logMsg(_("Public Endorsement Key readable by: %s\n"),
|
H A D | tpm_restrictsrk.c | 115 logMsg(_("Failed to get password\n")); 132 logMsg(_("Storage Root Key readable with: %s\n"),
|
H A D | tpm_selftest.c | 70 logMsg(_(" TPM Test Results: "));
|
H A D | tpm_revokeek.c | 86 logMsg(_("WARNING: Using only the first %d bytes of file %s for secret data\n"),
|
H A D | tpm_nvrelease.c | 163 logMsg(_("Successfully released NVRAM area at index 0x%x (%d).\n"),
|
H A D | tpm_nvcommon.c | 100 logMsg("%sThe following strings are available:\n", indent); 102 logMsg("%s%15s : %s\n", indent, svals[i].name, svals[i].desc);
|
H A D | tpm_nvdefine.c | 276 logMsg(_("Successfully created NVRAM area at index 0x%x (%u).\n"),
|
H A D | tpm_createek.c | 113 logMsg(_("WARNING: Using only the first %d bytes of file %s for secret data\n"),
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/lib/ |
H A D | tpm_log.c | 35 logMsg("\n\t"); 38 logMsg(" "); 43 logMsg("%02x", iByte); 46 logMsg("\n"); 51 int logMsg(const char *a_szFormat, ...) function 131 logMsg("\t%s\n\t\t%s\n", aOption, aDescr); 166 logMsg(_("Usage: %s [options]\n"), aCmd); 174 logMsg(_("Usage: %s [options]"), aCmd); 176 logMsg(" %s", aArgs[i]); 177 logMsg("\ [all...] |
H A D | tpm_pkcs11.c | 603 logMsg( "%s%s'", pszPre, a_pszLabel ); 608 logMsg( "(null)" ); 610 logMsg( "'%s", pszPost ); 716 logMsg( _("Certificate Object\n") ); 719 logMsg( _("\tX509 Certificate\n") ); 723 logMsg( _("\tX509 Attribute Certificate\n") ); 727 logMsg( _("\tUnknown Certificate Type (%08x)\n"), tType ); 730 logMsg( _("\tToken Object: %s\n"), bToken ? _("true") : _("false") ); 732 logMsg( _("\tPrivate Object: %s\n"), bPrivate ? _("true") : _("false") ); 734 logMsg( [all...] |
H A D | tpm_utils.c | 89 logMsg( _("%s version: %s\n"), a_pszArgs[0], CMD_VERSION ); 107 logMsg( _("Valid log levels are: %s, %s, %s, %s\n"), 188 logMsg( _("Passwords didn't match\n") ); 236 logMsg( "%s", a_pszPrompt );
|
H A D | tpm_tspi.c | 189 logMsg(_(" Version: ")); 197 logMsg(_(" Usage: 0x%04x (%s)\n"), uiAttr, displayKeyUsageMap(uiAttr)); 204 logMsg(_(" Flags: 0x%08x (%s)\n"), uiAttr, displayKeyFlagsMap(uiAttr)); 211 logMsg(_(" AuthUsage: 0x%02x (%s)\n"), uiAttr, displayAuthUsageMap(uiAttr)); 218 logMsg(_(" Algorithm: 0x%08x (%s)\n"), uiAlg, displayAlgorithmMap(uiAlg)); 225 logMsg(_(" Encryption Scheme: 0x%08x (%s)\n"), uiAttr, displayEncSchemeMap(uiAttr)); 232 logMsg(_(" Signature Scheme: 0x%08x (%s)\n"), uiAttr, displaySigSchemeMap(uiAttr)); 241 logMsg(_(" Key Size: %d bits\n"), uiAttr); 250 logMsg(_(" Public Key:"));
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/src/data_mgmt/ |
H A D | data_object.c | 135 logMsg( TOKEN_NOT_INIT_ERROR ); 168 logMsg( NO_TOKEN_OBJECTS );
|
H A D | data_protect.c | 143 logMsg( TOKEN_INPUT_FILE_ERROR ); 149 logMsg( TOKEN_OUTPUT_FILE_ERROR ); 442 logMsg( TOKEN_NOT_INIT_ERROR );
|
H A D | data_passwd.c | 134 logMsg( TOKEN_NOT_INIT_ERROR );
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/include/ |
H A D | tpm_utils.h | 98 int logMsg( const char *a_pszFormat, ... );
|