/system/tpm/trunks/ |
D | tpm_utility_test.cc | 487 TPM_HANDLE key_handle; in TEST_F() local 498 EXPECT_CALL(mock_tpm_, ReadPublicSync(key_handle, _, _, _, _, _)) in TEST_F() 501 EXPECT_CALL(mock_tpm_, RSA_EncryptSync(key_handle, _, _, _, _, _, in TEST_F() 506 key_handle, in TEST_F() 516 TPM_HANDLE key_handle; in TEST_F() local 524 EXPECT_CALL(mock_tpm_, ReadPublicSync(key_handle, _, _, _, _, _)) in TEST_F() 527 EXPECT_CALL(mock_tpm_, RSA_EncryptSync(key_handle, _, _, _, _, _, nullptr)) in TEST_F() 529 EXPECT_EQ(TPM_RC_FAILURE, utility_.AsymmetricEncrypt(key_handle, in TEST_F() 538 TPM_HANDLE key_handle = TPM_RH_FIRST; in TEST_F() local 544 EXPECT_CALL(mock_tpm_, ReadPublicSync(key_handle, _, _, _, _, nullptr)) in TEST_F() [all …]
|
D | trunks_client_test.cc | 187 TPM_HANDLE key_handle; in ImportTest() local 188 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); in ImportTest() 193 ScopedKeyHandle scoped_key(*factory_.get(), key_handle); in ImportTest() 215 TPM_HANDLE key_handle; in AuthChangeTest() local 216 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); in AuthChangeTest() 220 ScopedKeyHandle scoped_key(*factory_.get(), key_handle); in AuthChangeTest() 222 result = utility->ChangeKeyAuthorizationData(key_handle, key_authorization, in AuthChangeTest() 230 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); in AuthChangeTest() 235 scoped_key.reset(key_handle); in AuthChangeTest() 268 TPM_HANDLE key_handle; in VerifyKeyCreationTest() local [all …]
|
D | tpm_utility_impl.h | 60 TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, 66 TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, 72 TPM_RC Sign(TPM_HANDLE key_handle, 78 TPM_RC Verify(TPM_HANDLE key_handle, 84 TPM_RC CertifyCreation(TPM_HANDLE key_handle, 86 TPM_RC ChangeKeyAuthorizationData(TPM_HANDLE key_handle, 109 TPM_HANDLE* key_handle) override; 199 TPM_RC DoesPersistentKeyExist(TPMI_DH_PERSISTENT key_handle, bool* exists);
|
D | tpm_utility.h | 110 virtual TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, 122 virtual TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, 136 virtual TPM_RC Sign(TPM_HANDLE key_handle, 150 virtual TPM_RC Verify(TPM_HANDLE key_handle, 161 virtual TPM_RC CertifyCreation(TPM_HANDLE key_handle, 170 virtual TPM_RC ChangeKeyAuthorizationData(TPM_HANDLE key_handle, 218 TPM_HANDLE* key_handle) = 0;
|
D | trunks_client_test.h | 110 bool PerformRSAEncrpytAndDecrpyt(TPM_HANDLE key_handle, 131 bool LoadSigningKey(ScopedKeyHandle* key_handle, std::string* public_key); 135 bool SignAndVerify(const ScopedKeyHandle& key_handle,
|
D | trunks_factory_for_test.cc | 174 TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, in AsymmetricEncrypt() argument 180 return target_->AsymmetricEncrypt(key_handle, in AsymmetricEncrypt() 188 TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, in AsymmetricDecrypt() argument 194 return target_->AsymmetricDecrypt(key_handle, in AsymmetricDecrypt() 202 TPM_RC Sign(TPM_HANDLE key_handle, in Sign() argument 208 return target_->Sign(key_handle, in Sign() 216 TPM_RC Verify(TPM_HANDLE key_handle, in Verify() argument 222 return target_->Verify(key_handle, scheme, hash_alg, in Verify() 226 TPM_RC CertifyCreation(TPM_HANDLE key_handle, in CertifyCreation() argument 228 return target_->CertifyCreation(key_handle, creation_blob); in CertifyCreation() [all …]
|
D | tpm_utility_impl.cc | 409 TPM_RC TpmUtilityImpl::AsymmetricEncrypt(TPM_HANDLE key_handle, in AsymmetricEncrypt() argument 430 TPM_RC result = GetKeyPublicArea(key_handle, &public_area); in AsymmetricEncrypt() 432 LOG(ERROR) << "Error finding public area for: " << key_handle; in AsymmetricEncrypt() 448 LOG(ERROR) << "Error computing key name for: " << key_handle; in AsymmetricEncrypt() 456 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, in AsymmetricEncrypt() 472 TPM_RC TpmUtilityImpl::AsymmetricDecrypt(TPM_HANDLE key_handle, in AsymmetricDecrypt() argument 499 result = GetKeyPublicArea(key_handle, &public_area); in AsymmetricDecrypt() 501 LOG(ERROR) << "Error finding public area for: " << key_handle; in AsymmetricDecrypt() 517 LOG(ERROR) << "Error computing key name for: " << key_handle; in AsymmetricDecrypt() 525 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, in AsymmetricDecrypt() [all …]
|
D | mock_tpm.h | 202 const TPMI_DH_OBJECT& key_handle, 211 const TPMI_DH_OBJECT& key_handle, 320 void(const TPMI_DH_OBJECT& key_handle, 328 TPM_RC(const TPMI_DH_OBJECT& key_handle, 336 void(const TPMI_DH_OBJECT& key_handle, 344 TPM_RC(const TPMI_DH_OBJECT& key_handle, 352 void(const TPMI_DH_OBJECT& key_handle, 357 TPM_RC(const TPMI_DH_OBJECT& key_handle, 363 void(const TPMI_DH_OBJECT& key_handle, 369 TPM_RC(const TPMI_DH_OBJECT& key_handle, [all …]
|
D | tpm_generated_test.cc | 224 TPM_HANDLE key_handle; in TEST() local 238 &key_handle, in TEST() 246 EXPECT_EQ(key_handle, 0x80000001); in TEST()
|
D | tpm_generated.h | 4026 const TPMI_DH_OBJECT& key_handle, 4039 const TPMI_DH_OBJECT& key_handle, 4048 const TPMI_DH_OBJECT& key_handle, 4259 const TPMI_DH_OBJECT& key_handle, 4271 const TPMI_DH_OBJECT& key_handle, 4279 const TPMI_DH_OBJECT& key_handle, 4290 const TPMI_DH_OBJECT& key_handle, 4302 const TPMI_DH_OBJECT& key_handle, 4310 const TPMI_DH_OBJECT& key_handle, 4322 const TPMI_DH_OBJECT& key_handle, [all …]
|
D | tpm_generated.cc | 12633 const TPMI_DH_OBJECT& key_handle, in SerializeCommand_ActivateCredential() argument 12664 key_handle, in SerializeCommand_ActivateCredential() 12902 const TPMI_DH_OBJECT& key_handle, in ActivateCredential() argument 12919 key_handle, in ActivateCredential() 12935 const TPMI_DH_OBJECT& key_handle, in ActivateCredentialSync() argument 12946 key_handle, in ActivateCredentialSync() 14967 const TPMI_DH_OBJECT& key_handle, in SerializeCommand_RSA_Encrypt() argument 14992 key_handle, in SerializeCommand_RSA_Encrypt() 15235 const TPMI_DH_OBJECT& key_handle, in RSA_Encrypt() argument 15251 key_handle, in RSA_Encrypt() [all …]
|
/system/tpm/attestation/server/ |
D | pkcs11_key_store.cc | 111 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); in Read() local 112 if (key_handle == CK_INVALID_HANDLE) { in Read() 119 key_handle, in Read() 127 key_handle, in Read() 181 CK_OBJECT_HANDLE key_handle = CK_INVALID_HANDLE; in Write() local 185 &key_handle) != CKR_OK) { in Write() 204 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); in Delete() local 205 if (key_handle != CK_INVALID_HANDLE) { in Delete() 206 if (C_DestroyObject(session.handle(), key_handle) != CKR_OK) { in Delete() 477 CK_OBJECT_HANDLE key_handle = CK_INVALID_HANDLE; in FindObject() local [all …]
|
/system/tpm/attestation/common/ |
D | tpm_utility_v1.cc | 431 ScopedTssKey key_handle(context_handle_); in Unbind() local 432 if (!LoadKeyFromBlob(key_blob, context_handle_, srk_handle_, &key_handle)) { in Unbind() 457 if (TPM_ERROR(result = Tspi_Data_Unbind(data_handle, key_handle, in Unbind() 474 ScopedTssKey key_handle(context_handle_); in Sign() local 475 if (!LoadKeyFromBlob(key_blob, context_handle_, srk_handle_, &key_handle)) { in Sign() 501 result = Tspi_Hash_Sign(hash_handle, key_handle, &length, buffer.ptr()); in Sign() 645 ScopedTssKey* key_handle) { in LoadKeyFromBlob() argument 653 key_handle->ptr()); in LoadKeyFromBlob()
|
D | tpm_utility_v1.h | 95 trousers::ScopedTssKey* key_handle);
|