/system/tpm/attestation/server/ |
D | pkcs11_key_store.h | 78 CK_OBJECT_HANDLE FindObject(CK_SESSION_HANDLE session_handle, 88 bool EnumObjects(CK_SESSION_HANDLE session_handle, 93 bool GetKeyName(CK_SESSION_HANDLE session_handle, 100 bool DeleteIfMatchesPrefix(CK_SESSION_HANDLE session_handle, 113 bool DoesCertificateExist(CK_SESSION_HANDLE session_handle,
|
D | pkcs11_key_store.cc | 453 CK_OBJECT_HANDLE Pkcs11KeyStore::FindObject(CK_SESSION_HANDLE session_handle, in FindObject() argument 479 if ((C_FindObjectsInit(session_handle, in FindObject() 482 (C_FindObjects(session_handle, &key_handle, 1, &count) != CKR_OK) || in FindObject() 483 (C_FindObjectsFinal(session_handle) != CKR_OK)) { in FindObject() 533 CK_SESSION_HANDLE session_handle, in EnumObjects() argument 554 if ((C_FindObjectsInit(session_handle, in EnumObjects() 557 (C_FindObjects(session_handle, handles, kMaxHandles, &count) != CKR_OK)) { in EnumObjects() 564 if (!GetKeyName(session_handle, handles[i], &key_name)) { in EnumObjects() 571 if (C_FindObjects(session_handle, handles, kMaxHandles, &count) != CKR_OK) { in EnumObjects() 576 if (C_FindObjectsFinal(session_handle) != CKR_OK) { in EnumObjects() [all …]
|
/system/tpm/trunks/ |
D | hmac_authorization_delegate.h | 83 bool InitSession(TPM_HANDLE session_handle, 109 TPM_HANDLE session_handle() const { in session_handle() function
|
D | mock_tpm.cc | 63 TPMI_SH_AUTH_SESSION* session_handle, in StartAuthSessionSync() argument 68 auth_hash, session_handle, nonce_tpm, in StartAuthSessionSync() 111 const TPMI_SH_HMAC& session_handle, in GetSessionAuditDigestSync() argument 119 session_handle, qualifying_data, in GetSessionAuditDigestSync()
|
D | hmac_authorization_delegate.cc | 65 auth.session_handle = session_handle_; in GetCommandAuthorization() 211 TPM_HANDLE session_handle, in InitSession() argument 217 session_handle_ = session_handle; in InitSession()
|
D | password_authorization_delegate.cc | 40 auth.session_handle = TPM_RS_PW; in GetCommandAuthorization()
|
D | resource_manager.h | 111 TPM_HANDLE session_handle);
|
D | resource_manager.cc | 275 TPM_HANDLE session_handle) { in EnsureSessionIsLoaded() argument 277 if (session_handle == TPM_RS_PW) { in EnsureSessionIsLoaded() 280 auto handle_iter = session_handles_.find(session_handle); in EnsureSessionIsLoaded() 290 VLOG(1) << "RELOAD_SESSION: " << std::hex << session_handle; in EnsureSessionIsLoaded()
|
D | mock_tpm.h | 103 TPMI_SH_AUTH_SESSION* session_handle, 114 TPMI_SH_AUTH_SESSION* session_handle, 118 void(const TPMI_SH_POLICY& session_handle, 123 TPM_RC(const TPMI_SH_POLICY& session_handle, 603 const TPMI_SH_HMAC& session_handle, 615 const TPMI_SH_HMAC& session_handle, 625 const TPMI_SH_HMAC& session_handle,
|
D | hmac_authorization_delegate_test.cc | 180 EXPECT_EQ(auth_command.session_handle, session_handle_); in TEST_F()
|
D | tpm_generated.h | 1213 TPMI_SH_AUTH_SESSION session_handle; member 3824 const TPMI_SH_AUTH_SESSION& session_handle, 3840 TPMI_SH_AUTH_SESSION* session_handle, 3865 TPMI_SH_AUTH_SESSION* session_handle, 3871 const TPMI_SH_POLICY& session_handle, 3879 const TPMI_SH_POLICY& session_handle, 3884 const TPMI_SH_POLICY& session_handle, 4808 const TPMI_SH_HMAC& session_handle, 4824 const TPMI_SH_HMAC& session_handle, 4835 const TPMI_SH_HMAC& session_handle,
|
D | tpm_generated.cc | 5103 result = Serialize_TPMI_SH_AUTH_SESSION(value.session_handle, buffer); in Serialize_TPMS_AUTH_COMMAND() 5134 &value->session_handle, in Parse_TPMS_AUTH_COMMAND() 10808 TPMI_SH_AUTH_SESSION* session_handle, in ParseResponse_StartAuthSession() argument 10851 session_handle, in ParseResponse_StartAuthSession() 10939 TPMI_SH_AUTH_SESSION session_handle; in StartAuthSessionResponseParser() local 10943 &session_handle, in StartAuthSessionResponseParser() 10952 session_handle, in StartAuthSessionResponseParser() 11005 TPMI_SH_AUTH_SESSION* session_handle, in StartAuthSessionSync() argument 11028 session_handle, in StartAuthSessionSync() 11035 const TPMI_SH_POLICY& session_handle, in SerializeCommand_PolicyRestart() argument [all …]
|