Home
last modified time | relevance | path

Searched refs:keyhandle (Results 1 – 5 of 5) sorted by relevance

/Linux-v4.19/security/keys/
Dtrusted.c459 uint32_t keyhandle, const unsigned char *keyauth, in tpm_seal() argument
483 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal()
533 store32(tb, keyhandle); in tpm_seal()
574 uint32_t keyhandle, const unsigned char *keyauth, in tpm_unseal() argument
626 store32(tb, keyhandle); in tpm_unseal()
674 ret = tpm_seal(tb, o->keytype, o->keyhandle, o->keyauth, in key_seal()
697 ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
778 opt->keyhandle = handle; in getoptions()
929 options->keyhandle = SRKHANDLE; in trusted_options_alloc()
999 if (!options->keyhandle) { in trusted_instantiate()
[all …]
Dtrusted.h45 pr_info("trusted_key: sealing key handle %0X\n", o->keyhandle); in dump_options()
/Linux-v4.19/include/keys/
Dtrusted-type.h34 uint32_t keyhandle; member
/Linux-v4.19/drivers/char/tpm/
Dtpm2-cmd.c442 tpm_buf_append_u32(&buf, options->keyhandle); in tpm2_seal_trusted()
558 tpm_buf_append_u32(&buf, options->keyhandle); in tpm2_load_cmd()
/Linux-v4.19/Documentation/security/keys/
Dtrusted-encrypted.rst33 keyhandle= ascii hex value of sealing key default 0x40000000 (SRK)