Lines Matching refs:TPM_RC
43 TPM_RC Startup() override;
44 TPM_RC Clear() override;
46 TPM_RC InitializeTpm() override;
47 TPM_RC AllocatePCR(const std::string& platform_password) override;
48 TPM_RC TakeOwnership(const std::string& owner_password,
51 TPM_RC StirRandom(const std::string& entropy_data,
53 TPM_RC GenerateRandom(size_t num_bytes,
56 TPM_RC ExtendPCR(int pcr_index,
59 TPM_RC ReadPCR(int pcr_index, std::string* pcr_value) override;
60 TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle,
66 TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle,
72 TPM_RC Sign(TPM_HANDLE key_handle,
78 TPM_RC Verify(TPM_HANDLE key_handle,
84 TPM_RC CertifyCreation(TPM_HANDLE key_handle,
86 TPM_RC ChangeKeyAuthorizationData(TPM_HANDLE key_handle,
90 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type,
97 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
107 TPM_RC LoadKey(const std::string& key_blob,
110 TPM_RC GetKeyName(TPM_HANDLE handle, std::string* name) override;
111 TPM_RC GetKeyPublicArea(TPM_HANDLE handle,
113 TPM_RC SealData(const std::string& data_to_seal,
117 TPM_RC UnsealData(const std::string& sealed_data,
120 TPM_RC StartSession(HmacSession* session) override;
121 TPM_RC GetPolicyDigestForPcrValue(int pcr_index,
124 TPM_RC DefineNVSpace(uint32_t index,
127 TPM_RC DestroyNVSpace(uint32_t index,
129 TPM_RC LockNVSpace(uint32_t index, AuthorizationDelegate* delegate) override;
130 TPM_RC WriteNVSpace(uint32_t index,
134 TPM_RC ReadNVSpace(uint32_t index,
139 TPM_RC GetNVSpaceName(uint32_t index, std::string* name) override;
140 TPM_RC GetNVSpacePublicArea(uint32_t index,
150 TPM_RC SetKnownOwnerPassword(const std::string& known_owner_password);
156 TPM_RC CreateStorageRootKeys(const std::string& owner_password);
161 TPM_RC CreateSaltingKey(const std::string& owner_password);
170 TPM_RC SetHierarchyAuthorization(TPMI_RH_HIERARCHY_AUTH hierarchy,
176 TPM_RC DisablePlatformHierarchy(AuthorizationDelegate* authorization);
181 TPM_RC ComputeKeyName(const TPMT_PUBLIC& public_area,
187 TPM_RC ComputeNVSpaceName(const TPMS_NV_PUBLIC& nv_public_area,
192 TPM_RC EncryptPrivateData(const TPMT_SENSITIVE& sensitive_area,
199 TPM_RC DoesPersistentKeyExist(TPMI_DH_PERSISTENT key_handle, bool* exists);