/system/tpm/trunks/ |
tpm_utility_test.cc | 487 TPM_HANDLE key_handle; local 498 EXPECT_CALL(mock_tpm_, ReadPublicSync(key_handle, _, _, _, _, _)) 501 EXPECT_CALL(mock_tpm_, RSA_EncryptSync(key_handle, _, _, _, _, _, 506 key_handle, 516 TPM_HANDLE key_handle; local 524 EXPECT_CALL(mock_tpm_, ReadPublicSync(key_handle, _, _, _, _, _)) 527 EXPECT_CALL(mock_tpm_, RSA_EncryptSync(key_handle, _, _, _, _, _, nullptr)) 529 EXPECT_EQ(TPM_RC_FAILURE, utility_.AsymmetricEncrypt(key_handle, 538 TPM_HANDLE key_handle = TPM_RH_FIRST; local 544 EXPECT_CALL(mock_tpm_, ReadPublicSync(key_handle, _, _, _, _, nullptr) 556 TPM_HANDLE key_handle; local 586 TPM_HANDLE key_handle; local 615 TPM_HANDLE key_handle; local 645 TPM_HANDLE key_handle; local 670 TPM_HANDLE key_handle = TPM_RH_FIRST; local 689 TPM_HANDLE key_handle = TPM_RH_FIRST; local 700 TPM_HANDLE key_handle; local 732 TPM_HANDLE key_handle; local 763 TPM_HANDLE key_handle; local 793 TPM_HANDLE key_handle; local 816 TPM_HANDLE key_handle; local 835 TPM_HANDLE key_handle = TPM_RH_FIRST; local 848 TPM_HANDLE key_handle; local 867 TPM_HANDLE key_handle; local 886 TPM_HANDLE key_handle; local 905 TPM_HANDLE key_handle = 0; local 919 TPM_HANDLE key_handle; local 949 TPM_HANDLE key_handle; local 979 TPM_HANDLE key_handle; local 999 TPM_HANDLE key_handle; local 1019 TPM_HANDLE key_handle; local 1037 TPM_HANDLE key_handle; local 1055 TPM_HANDLE key_handle; local 1073 TPM_HANDLE key_handle; local 1091 TPM_HANDLE key_handle; local 1109 TPM_HANDLE key_handle; local 1133 TPM_HANDLE key_handle; local 1157 TPM_HANDLE key_handle = 42; local 1167 TPM_HANDLE key_handle = 42; local 1176 TPM_HANDLE key_handle = 42; local 1186 TPM_HANDLE key_handle = 1; local 1201 TPM_HANDLE key_handle = 1; local 1211 TPM_HANDLE key_handle = 1; local 1220 TPM_HANDLE key_handle = 1; local 1488 TPM_HANDLE key_handle = TPM_RH_FIRST; local 1501 TPM_HANDLE key_handle; local 1510 TPM_HANDLE key_handle; local 1517 TPM_HANDLE key_handle; local [all...] |
tpm_utility_impl.h | 60 TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, 66 TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, 72 TPM_RC Sign(TPM_HANDLE key_handle, 78 TPM_RC Verify(TPM_HANDLE key_handle, 84 TPM_RC CertifyCreation(TPM_HANDLE key_handle, 86 TPM_RC ChangeKeyAuthorizationData(TPM_HANDLE key_handle, 109 TPM_HANDLE* key_handle) override; 197 // Looks for a given persistent |key_handle| and outputs whether or not it 199 TPM_RC DoesPersistentKeyExist(TPMI_DH_PERSISTENT key_handle, bool* exists);
|
trunks_client_test.cc | 187 TPM_HANDLE key_handle; local 188 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); 193 ScopedKeyHandle scoped_key(*factory_.get(), key_handle); 215 TPM_HANDLE key_handle; local 216 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); 220 ScopedKeyHandle scoped_key(*factory_.get(), key_handle); 222 result = utility->ChangeKeyAuthorizationData(key_handle, key_authorization, 230 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); 235 scoped_key.reset(key_handle); 268 TPM_HANDLE key_handle; local 441 TPM_HANDLE key_handle; local 569 TPM_HANDLE key_handle; local 749 TPM_HANDLE key_handle; local 906 const ScopedKeyHandle& key_handle = *key_handles[i]; local 914 const ScopedKeyHandle& key_handle = *key_handles[i]; local [all...] |
trunks_factory_for_test.cc | 174 TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, 180 return target_->AsymmetricEncrypt(key_handle, 188 TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, 194 return target_->AsymmetricDecrypt(key_handle, 202 TPM_RC Sign(TPM_HANDLE key_handle, 208 return target_->Sign(key_handle, 216 TPM_RC Verify(TPM_HANDLE key_handle, 222 return target_->Verify(key_handle, scheme, hash_alg, 226 TPM_RC CertifyCreation(TPM_HANDLE key_handle, 228 return target_->CertifyCreation(key_handle, creation_blob) [all...] |
tpm_utility.h | 106 // referrenced by its handle |key_handle|. The |plaintext| is then encrypted 110 virtual TPM_RC AsymmetricEncrypt(TPM_HANDLE key_handle, 118 // referenced by its handle |key_handle|. The |ciphertext| is then decrypted 122 virtual TPM_RC AsymmetricDecrypt(TPM_HANDLE key_handle, 129 // This method takes an unrestricted signing key referenced by |key_handle| 136 virtual TPM_RC Sign(TPM_HANDLE key_handle, 144 // performed by |key_handle|. |scheme| and |hash| refer to the signature 150 virtual TPM_RC Verify(TPM_HANDLE key_handle, 157 // This method is used to check if a key was created in the TPM. |key_handle| 161 virtual TPM_RC CertifyCreation(TPM_HANDLE key_handle, [all...] |
tpm_utility_impl.cc | 409 TPM_RC TpmUtilityImpl::AsymmetricEncrypt(TPM_HANDLE key_handle, 430 TPM_RC result = GetKeyPublicArea(key_handle, &public_area); 432 LOG(ERROR) << "Error finding public area for: " << key_handle; 448 LOG(ERROR) << "Error computing key name for: " << key_handle; 456 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, 472 TPM_RC TpmUtilityImpl::AsymmetricDecrypt(TPM_HANDLE key_handle, 499 result = GetKeyPublicArea(key_handle, &public_area); 501 LOG(ERROR) << "Error finding public area for: " << key_handle; 517 LOG(ERROR) << "Error computing key name for: " << key_handle; 525 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, 1674 TPM_HANDLE key_handle; local [all...] |
trunks_client_test.h | 110 bool PerformRSAEncrpytAndDecrpyt(TPM_HANDLE key_handle, 129 // Loads an arbitrary RSA signing key and provides the |key_handle| and the 131 bool LoadSigningKey(ScopedKeyHandle* key_handle, std::string* public_key); 133 // Signs arbitrary data with |key_handle| authorized by |delegate| and 135 bool SignAndVerify(const ScopedKeyHandle& key_handle,
|
mock_tpm.h | 202 const TPMI_DH_OBJECT& key_handle, 211 const TPMI_DH_OBJECT& key_handle, 320 void(const TPMI_DH_OBJECT& key_handle, 328 TPM_RC(const TPMI_DH_OBJECT& key_handle, 336 void(const TPMI_DH_OBJECT& key_handle, 344 TPM_RC(const TPMI_DH_OBJECT& key_handle, 352 void(const TPMI_DH_OBJECT& key_handle, 357 TPM_RC(const TPMI_DH_OBJECT& key_handle, 363 void(const TPMI_DH_OBJECT& key_handle, 369 TPM_RC(const TPMI_DH_OBJECT& key_handle, [all...] |
tpm_generated_test.cc | 224 TPM_HANDLE key_handle; local 238 &key_handle, 246 EXPECT_EQ(key_handle, 0x80000001);
|
tpm_generated.h | [all...] |
tpm_generated.cc | [all...] |
/external/dbus/dbus/ |
dbus-sysdeps-wince-glue.c | 66 HKEY key_handle; local 75 if (RegOpenKeyExW (root_key, dir, 0, KEY_READ, &key_handle)) 79 if (RegQueryValueExW (key_handle, name, 0, NULL, NULL, &nbytes)) 81 RegCloseKey (key_handle); 89 RegCloseKey (key_handle); 92 if (RegQueryValueExW (key_handle, name, 0, &type, (LPBYTE) result_w, &nbytes)) 94 RegCloseKey (key_handle); 98 RegCloseKey (key_handle); 140 HKEY root_key, key_handle; local 157 if (RegOpenKeyExA (root_key, dir, 0, KEY_READ, &key_handle)) [all...] |
/system/tpm/attestation/common/ |
tpm_utility_v1.h | 91 // |key_handle| on success. 95 trousers::ScopedTssKey* key_handle);
|
tpm_utility_v1.cc | 431 ScopedTssKey key_handle(context_handle_); 432 if (!LoadKeyFromBlob(key_blob, context_handle_, srk_handle_, &key_handle)) { 457 if (TPM_ERROR(result = Tspi_Data_Unbind(data_handle, key_handle, 474 ScopedTssKey key_handle(context_handle_); 475 if (!LoadKeyFromBlob(key_blob, context_handle_, srk_handle_, &key_handle)) { 501 result = Tspi_Hash_Sign(hash_handle, key_handle, &length, buffer.ptr()); 645 ScopedTssKey* key_handle) { 653 key_handle->ptr());
|
/system/tpm/attestation/server/ |
pkcs11_key_store.cc | 111 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); local 112 if (key_handle == CK_INVALID_HANDLE) { 119 key_handle, 127 key_handle, 181 CK_OBJECT_HANDLE key_handle = CK_INVALID_HANDLE; local 185 &key_handle) != CKR_OK) { 204 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); local 205 if (key_handle != CK_INVALID_HANDLE) { 206 if (C_DestroyObject(session.handle(), key_handle) != CKR_OK) { 477 CK_OBJECT_HANDLE key_handle = CK_INVALID_HANDLE local [all...] |
/external/v8/src/ |
elements.cc | 1328 Handle<Object> key_handle = isolate->factory()->NewNumberFromUint(key); local [all...] |