/external/epid-sdk/epid/member/tpm2/ibm_tss/ |
D | context.c | 89 tpm_ctx->key_handle = 0; in Tpm2CreateContext() 127 if (ctx->key_handle) return kEpidOutOfSequenceError; in Tpm2SetHashAlg() 139 if (ctx->key_handle) { in Tpm2FlushKey() 142 in.flushHandle = ctx->key_handle; in Tpm2FlushKey() 148 ctx->key_handle = 0; in Tpm2FlushKey()
|
D | load_external.c | 63 if (ctx->key_handle) { in Tpm2LoadExternal() 65 in_fc.flushHandle = ctx->key_handle; in Tpm2LoadExternal() 71 ctx->key_handle = 0; in Tpm2LoadExternal() 130 ctx->key_handle = out.objectHandle; in Tpm2LoadExternal()
|
D | sign.c | 55 if (ctx->key_handle == 0) { in Tpm2Sign() 67 in.keyHandle = ctx->key_handle; in Tpm2Sign() 132 in.keyHandle = ctx->key_handle; in Tpm2ReleaseCounter()
|
D | commit.c | 46 if (!ctx || !ctx->epid2_params || !ctx->key_handle) { in Tpm2Commit() 78 in.signHandle = ctx->key_handle; in Tpm2Commit()
|
D | state.h | 35 TPM_HANDLE key_handle; ///< Handle to f value of private key member
|
D | createprimary.c | 97 ctx->key_handle = out.objectHandle; in Tpm2CreatePrimary()
|
/external/u-boot/cmd/ |
D | tpm-v1.c | 323 u32 key_len, key_handle, err; in do_tpm_load_key_by_sha1() local 347 &key_handle); in do_tpm_load_key_by_sha1() 349 printf("Key handle is 0x%x\n", key_handle); in do_tpm_load_key_by_sha1() 350 env_set_hex("key_handle", key_handle); in do_tpm_load_key_by_sha1() 360 u32 parent_handle, key_len, key_handle, err; in do_tpm_load_key2_oiap() local 375 &key_handle); in do_tpm_load_key2_oiap() 377 printf("Key handle is 0x%x\n", key_handle); in do_tpm_load_key2_oiap() 385 u32 key_handle, err; in do_tpm_get_pub_key_oiap() local 393 key_handle = simple_strtoul(argv[1], NULL, 0); in do_tpm_get_pub_key_oiap() 398 err = tpm_get_pub_key_oiap(key_handle, usage_auth, pub_key_buffer, in do_tpm_get_pub_key_oiap()
|
/external/autotest/server/site_tests/firmware_Cr50U2fPowerwash/ |
D | firmware_Cr50U2fPowerwash.py | 48 key_handle = self.parse_g2ftool_output(g2f_reg.stdout)['key_handle'] 56 key_handle) 75 key_handle)
|
/external/autotest/client/common_lib/cros/ |
D | g2f_utils.py | 40 def G2fAuth(client, dev, challenge, application, key_handle, p1=0): argument 48 ' --key_handle=' + key_handle +
|
/external/autotest/server/site_tests/firmware_Cr50U2fCommands/ |
D | firmware_Cr50U2fCommands.py | 166 def __u2f_sign(self, app_id, user_secret, key_handle, hash, flags, argument 170 assert_byte_length(key_handle, 64) 174 VENDOR_CC_U2F_SIGN, '{}{}{}{}{}'.format(app_id, user_secret, key_handle, 402 key_handle, argument 409 key_handle,
|
/external/u-boot/lib/ |
D | tpm-v1.c | 420 u32 tpm_flush_specific(u32 key_handle, u32 resource_type) in tpm_flush_specific() argument 437 key_handle_offset, key_handle, in tpm_flush_specific() 641 const void *parent_key_usage_auth, u32 *key_handle) in tpm_load_key2_oiap() argument 696 if (key_handle) { in tpm_load_key2_oiap() 698 res_handle_offset, key_handle)) in tpm_load_key2_oiap() 705 u32 tpm_get_pub_key_oiap(u32 key_handle, const void *usage_auth, void *pubkey, in tpm_get_pub_key_oiap() argument 733 req_key_handle_offset, key_handle in tpm_get_pub_key_oiap()
|
/external/u-boot/include/ |
D | tpm-v1.h | 413 const void *parent_key_usage_auth, u32 *key_handle); 428 u32 tpm_get_pub_key_oiap(u32 key_handle, const void *usage_auth, void *pubkey, 454 u32 tpm_flush_specific(u32 key_handle, u32 resource_type);
|
/external/u-boot/board/gdsys/a38x/ |
D | hre.c | 344 uint32_t key_handle; in hre_op_loadkey() local 351 src_reg->digest, &key_handle); in hre_op_loadkey()
|
/external/u-boot/board/gdsys/p1022/ |
D | controlcenterd-id.c | 573 uint32_t key_handle; in hre_op_loadkey() local 580 src_reg->digest, &key_handle); in hre_op_loadkey()
|
/external/ukey2/src/main/proto/ |
D | securegcm.proto | 60 optional bytes key_handle = 9; field
|