Searched refs:keyhandle (Results 1 – 5 of 5) sorted by relevance
/Linux-v4.19/security/keys/ |
D | trusted.c | 459 uint32_t keyhandle, const unsigned char *keyauth, in tpm_seal() argument 483 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal() 533 store32(tb, keyhandle); in tpm_seal() 574 uint32_t keyhandle, const unsigned char *keyauth, in tpm_unseal() argument 626 store32(tb, keyhandle); in tpm_unseal() 674 ret = tpm_seal(tb, o->keytype, o->keyhandle, o->keyauth, in key_seal() 697 ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal() 778 opt->keyhandle = handle; in getoptions() 929 options->keyhandle = SRKHANDLE; in trusted_options_alloc() 999 if (!options->keyhandle) { in trusted_instantiate() [all …]
|
D | trusted.h | 45 pr_info("trusted_key: sealing key handle %0X\n", o->keyhandle); in dump_options()
|
/Linux-v4.19/include/keys/ |
D | trusted-type.h | 34 uint32_t keyhandle; member
|
/Linux-v4.19/drivers/char/tpm/ |
D | tpm2-cmd.c | 442 tpm_buf_append_u32(&buf, options->keyhandle); in tpm2_seal_trusted() 558 tpm_buf_append_u32(&buf, options->keyhandle); in tpm2_load_cmd()
|
/Linux-v4.19/Documentation/security/keys/ |
D | trusted-encrypted.rst | 33 keyhandle= ascii hex value of sealing key default 0x40000000 (SRK)
|