Searched refs:handle (Results 1 – 3 of 3) sorted by relevance
| /security/keys/trusted-keys/ |
| A D | trusted_tpm1.c | 403 const unsigned char *key, uint16_t type, uint32_t handle) in osap() argument 418 tpm_buf_append_u32(tb, handle); in osap() 425 s->handle = LOAD32(tb->data, TPM_DATA_OFFSET); in osap() 437 int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) in oiap() argument 449 *handle = LOAD32(tb->data, TPM_DATA_OFFSET); in oiap() 552 tpm_buf_append_u32(tb, sess.handle); in tpm_seal() 750 unsigned long handle; in getoptions() local 784 res = kstrtoul(args[0].from, 16, &handle); in getoptions() 788 opt->keyhandle = handle; in getoptions() 867 res = kstrtoul(args[0].from, 16, &handle); in getoptions() [all …]
|
| /security/keys/ |
| A D | Kconfig | 134 This makes use of pipes to handle the notification buffer and
|
| /security/selinux/ |
| A D | hooks.c | 1625 #error Fix SELinux to handle capabilities > 63.
|
Completed in 20 milliseconds