/external/u-boot/cmd/ |
D | tpm-v1.c | 401 u32 key_len, key_handle, err; in do_tpm_load_key_by_sha1() local 430 &key_handle); in do_tpm_load_key_by_sha1() 432 printf("Key handle is 0x%x\n", key_handle); in do_tpm_load_key_by_sha1() 433 env_set_hex("key_handle", key_handle); in do_tpm_load_key_by_sha1() 443 u32 parent_handle, key_len, key_handle, err; in do_tpm_load_key2_oiap() local 464 &key_handle); in do_tpm_load_key2_oiap() 466 printf("Key handle is 0x%x\n", key_handle); in do_tpm_load_key2_oiap() 474 u32 key_handle, err; in do_tpm_get_pub_key_oiap() local 488 key_handle = simple_strtoul(argv[1], NULL, 0); in do_tpm_get_pub_key_oiap() 493 err = tpm_get_pub_key_oiap(dev, key_handle, usage_auth, pub_key_buffer, in do_tpm_get_pub_key_oiap()
|
/external/autotest/server/site_tests/firmware_Cr50U2fPowerwash/ |
D | firmware_Cr50U2fPowerwash.py | 62 key_handle = self.parse_g2ftool_output(g2f_reg.stdout)['key_handle'] 73 key_handle, 97 key_handle,
|
/external/autotest/client/common_lib/cros/ |
D | g2f_utils.py | 55 def G2fAuth(client, dev, challenge, application, key_handle, p1=0): argument 63 ' --key_handle=' + key_handle +
|
/external/autotest/server/site_tests/firmware_Cr50U2fCommands/ |
D | firmware_Cr50U2fCommands.py | 167 def __u2f_sign(self, app_id, user_secret, key_handle, hash, flags, argument 171 assert_byte_length(key_handle, 64) 175 VENDOR_CC_U2F_SIGN, '{}{}{}{}{}'.format(app_id, user_secret, key_handle, 441 key_handle, argument 449 key_handle,
|
/external/u-boot/lib/ |
D | tpm-v1.c | 484 u32 tpm_flush_specific(struct udevice *dev, u32 key_handle, u32 resource_type) in tpm_flush_specific() argument 501 key_handle_offset, key_handle, in tpm_flush_specific() 706 u32 *key_handle) in tpm_load_key2_oiap() argument 761 if (key_handle) { in tpm_load_key2_oiap() 763 res_handle_offset, key_handle)) in tpm_load_key2_oiap() 770 u32 tpm_get_pub_key_oiap(struct udevice *dev, u32 key_handle, in tpm_get_pub_key_oiap() argument 799 req_key_handle_offset, key_handle in tpm_get_pub_key_oiap()
|
/external/u-boot/include/ |
D | tpm-v1.h | 484 u32 *key_handle); 500 u32 tpm_get_pub_key_oiap(struct udevice *dev, u32 key_handle, 531 u32 tpm_flush_specific(struct udevice *dev, u32 key_handle, u32 resource_type);
|
/external/v8/src/execution/ |
D | messages.cc | 1386 Handle<Object> key_handle; in ThrowLoadFromNullOrUndefined() local 1387 if (key.ToHandle(&key_handle)) { in ThrowLoadFromNullOrUndefined() 1388 if (key_handle->IsString()) { in ThrowLoadFromNullOrUndefined() 1389 maybe_property_name = Handle<String>::cast(key_handle); in ThrowLoadFromNullOrUndefined() 1462 Handle<Object> key_handle; in ThrowLoadFromNullOrUndefined() local 1463 if (!key.ToHandle(&key_handle)) { in ThrowLoadFromNullOrUndefined() 1464 key_handle = ReadOnlyRoots(isolate).undefined_value_handle(); in ThrowLoadFromNullOrUndefined() 1466 if (*key_handle == ReadOnlyRoots(isolate).iterator_symbol()) { in ThrowLoadFromNullOrUndefined() 1470 MessageTemplate::kNonObjectPropertyLoad, key_handle, object); in ThrowLoadFromNullOrUndefined()
|
/external/u-boot/board/gdsys/a38x/ |
D | hre.c | 353 uint32_t key_handle; in hre_op_loadkey() local 360 src_reg->digest, &key_handle); in hre_op_loadkey()
|
/external/u-boot/board/gdsys/p1022/ |
D | controlcenterd-id.c | 594 uint32_t key_handle; in hre_op_loadkey() local 601 src_reg->digest, &key_handle); in hre_op_loadkey()
|
/external/ukey2/src/main/proto/ |
D | securegcm.proto | 60 optional bytes key_handle = 9; field
|