/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | admin_cmds.c | 45 int cmd_status(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]); 46 int cmd_init(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]); 47 int cmd_clear(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]); 48 int cmd_auth(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]); 49 int cmd_keyinfo(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]); 50 int cmd_deletekey(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]); 71 print_tpm_version(TSS_HCONTEXT hContext, TSS_HOBJECT hTPM) argument 78 if (get_tpm_capability(hContext, hTPM, TSS_TPMCAP_VERSION_VAL, 99 tpm_is_owned(TSS_HCONTEXT hContext, TSS_HOBJECT hTPM) argument 103 if (get_tpm_capability(hContext, hTP 111 print_tpm_resources(TSS_HCONTEXT hContext, TSS_HOBJECT hTPM) argument 154 print_tpm_pcrs(TSS_HCONTEXT hContext, TSS_HOBJECT hTPM) argument 191 cmd_status(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]) argument 274 print_key_info(TSS_HCONTEXT hContext, TSS_HOBJECT hKey) argument 419 cmd_keyinfo(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]) argument 485 cmd_deletekey(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]) argument 554 cmd_clear(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]) argument 605 createek(TSS_HCONTEXT hContext, TSS_HTPM hTPM) argument 644 cmd_init(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]) argument 684 cmd_auth(TSS_HCONTEXT hContext, TSS_HTPM hTPM, int argc, char *argv[]) argument [all...] |
H A D | tpmadm.h | 33 typedef int (*cmdfunc_t)(TSS_HCONTEXT hContext, TSS_HTPM hTPM, 45 int get_tpm_capability(TSS_HCONTEXT hContext, TSS_HOBJECT hTPM, 51 int tpm_preamble(TSS_HCONTEXT *hContext, TSS_HOBJECT *hTPM); 52 int tpm_postamble(TSS_HCONTEXT hContext);
|
H A D | main.c | 62 TSS_HCONTEXT hContext; local 92 if (tpm_preamble(&hContext, &hTPM)) 94 ret = fptr(hContext, hTPM, argc, argv); 95 (void) tpm_postamble(hContext); 149 get_tpm_capability(TSS_HCONTEXT hContext, TSS_HOBJECT hTPM, UINT32 cap, argument 171 ret = Tspi_Context_FreeMemory(hContext, data); 224 tpm_preamble(TSS_HCONTEXT *hContext, TSS_HOBJECT *hTPM) argument 228 ret = Tspi_Context_Create(hContext); 234 ret = Tspi_Context_Connect(*hContext, NULL); 237 (void) Tspi_Context_Close(*hContext); 251 tpm_postamble(TSS_HCONTEXT hContext) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 488 set_public_modulus(TSS_HCONTEXT hContext, TSS_HKEY hKey, argument 514 Tspi_Context_FreeMemory(hContext, blob); 542 token_get_tpm_info(TSS_HCONTEXT hContext, TOKEN_DATA *td) argument 550 if ((result = Tspi_Context_GetTpmObject(hContext, &hTPM))) { 563 Tspi_Context_FreeMemory(hContext, data); 588 Tspi_Context_FreeMemory(hContext, data); 600 token_rng(TSS_HCONTEXT hContext, CK_BYTE *output, CK_ULONG bytes) argument 606 if ((rc = Tspi_Context_GetTpmObject(hContext, &hTPM))) { 619 Tspi_Context_FreeMemory(hContext, random_bytes); 648 TSS_HCONTEXT *hContext) 647 token_specific_init(char *Correlator, CK_SLOT_ID SlotNumber, TSS_HCONTEXT *hContext) argument 678 token_wrap_sw_key( TSS_HCONTEXT hContext, int size_n, unsigned char *n, int size_p, unsigned char *p, TSS_HKEY hParentKey, TSS_FLAG initFlags, TSS_HKEY *phKey) argument 763 token_wrap_key_object(TSS_HCONTEXT hContext, CK_OBJECT_HANDLE ckObject, TSS_HKEY hParentKey, TSS_HKEY *phKey) argument 926 tss_assign_secret_key_policy(TSS_HCONTEXT hContext, TSS_FLAG policyType, TSS_HKEY hKey, CK_CHAR *passHash) argument 966 token_load_key( TSS_HCONTEXT hContext, CK_OBJECT_HANDLE ckKey, TSS_HKEY hParentKey, CK_CHAR_PTR passHash, TSS_HKEY *phKey) argument 1005 token_load_srk(TSS_HCONTEXT hContext, TSS_HKEY *hSRK) argument 1044 tss_find_and_load_key(TSS_HCONTEXT hContext, char *keyid, TSS_UUID *uuid, TSS_HKEY hParent, BYTE *hash, TSS_HKEY *hKey) argument 1079 token_load_public_root_key(TSS_HCONTEXT hContext) argument 1127 tss_generate_key(TSS_HCONTEXT hContext, TSS_FLAG initFlags, BYTE *passHash, TSS_HKEY hParentKey, TSS_HKEY *phKey) argument 1202 tss_change_auth( TSS_HCONTEXT hContext, TSS_HKEY hObjectToChange, TSS_HKEY hParentObject, TSS_UUID objUUID, TSS_UUID parentUUID, CK_CHAR *passHash) argument 1251 token_generate_leaf_key(TSS_HCONTEXT hContext, int key_type, CK_CHAR_PTR passHash, TSS_HKEY *phKey) argument 1318 token_verify_pin(TSS_HCONTEXT hContext, TSS_HKEY hKey) argument 1374 token_create_private_tree(TSS_HCONTEXT hContext, CK_BYTE *pinHash) argument 1465 token_create_public_tree(TSS_HCONTEXT hContext, CK_BYTE *pinHash) argument 1552 token_specific_login( TSS_HCONTEXT hContext, CK_USER_TYPE userType, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) argument 1664 token_specific_logout(TSS_HCONTEXT hContext) argument 1689 token_specific_init_pin(TSS_HCONTEXT hContext, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) argument 1735 verify_user_pin(TSS_HCONTEXT hContext, CK_BYTE *hash_sha) argument 1916 token_specific_verify_so_pin(TSS_HCONTEXT hContext, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) argument 1989 token_specific_final(TSS_HCONTEXT hContext) argument 2015 token_wrap_auth_data(TSS_HCONTEXT hContext, CK_BYTE *authData, TEMPLATE *publ_tmpl, TEMPLATE *priv_tmpl) argument 2075 token_unwrap_auth_data(TSS_HCONTEXT hContext, CK_BYTE *encAuthData, CK_ULONG encAuthDataLen, TSS_HKEY hKey, BYTE **authData) argument 2116 token_specific_rsa_generate_keypair( TSS_HCONTEXT hContext, TEMPLATE *publ_tmpl, TEMPLATE *priv_tmpl) argument 2251 token_rsa_load_key( TSS_HCONTEXT hContext, OBJECT *key_obj, TSS_HKEY *phKey) argument 2401 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2478 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2500 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument 2551 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2606 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2717 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2748 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
H A D | obj_mgr.c | 434 rc = save_token_object(sess->hContext, o); 562 rc = object_mgr_find_in_map1(sess->hContext, old_handle, &old_obj); 616 rc = save_token_object(sess->hContext, new_obj); 807 rc = save_token_object(sess->hContext, obj); 884 rc = object_mgr_find_in_map1(sess->hContext, handle, &obj); 953 object_mgr_destroy_token_objects(TSS_HCONTEXT hContext) argument 967 rc = object_mgr_find_in_map2(hContext, obj, &handle); 983 rc = object_mgr_find_in_map2(hContext, obj, &handle); 1061 TSS_HCONTEXT hContext, 1096 (void) object_mgr_check_shm(hContext, ob 1060 object_mgr_find_in_map1( TSS_HCONTEXT hContext, CK_OBJECT_HANDLE handle, OBJECT ** ptr) argument 1103 object_mgr_find_in_map2( TSS_HCONTEXT hContext, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 1380 object_mgr_get_object_size( TSS_HCONTEXT hContext, CK_OBJECT_HANDLE handle, CK_ULONG * size) argument 1541 object_mgr_purge_token_objects(TSS_HCONTEXT hContext) argument 1596 object_mgr_purge_private_token_objects(TSS_HCONTEXT hContext) argument 1898 object_mgr_check_shm(TSS_HCONTEXT hContext, OBJECT *obj) argument 1970 object_mgr_update_publ_tok_obj_from_shm(TSS_HCONTEXT hContext) argument 2081 object_mgr_update_priv_tok_obj_from_shm(TSS_HCONTEXT hContext) argument 2189 object_mgr_update_from_shm(TSS_HCONTEXT hContext) argument [all...] |
H A D | mech_rsa.c | 31 TSS_HCONTEXT hContext, 39 ckm_rsa_key_pair_gen(TSS_HCONTEXT hContext, argument 46 hContext, publ_tmpl, priv_tmpl); 53 TSS_HCONTEXT hContext, 74 rc = token_specific.t_rsa_encrypt(hContext, 83 TSS_HCONTEXT hContext, 106 rc = token_specific.t_rsa_decrypt(hContext, 115 TSS_HCONTEXT hContext, 137 hContext, in_data, in_data_len, out_data, 145 TSS_HCONTEXT hContext, 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument [all...] |
H A D | new_host.c | 120 TSS_HCONTEXT hContext = 0; local 164 &hContext); 178 rc = load_token_data(hContext, nv_token_data); 195 if (hContext) 196 Tspi_Context_Close(hContext); 205 TSS_HCONTEXT hContext; local 222 if (open_tss_context(&hContext)) { 230 token_specific.t_final(hContext); 234 (void) object_mgr_purge_token_objects(hContext); 236 (void) Tspi_Context_Close(hContext); 380 TSS_HCONTEXT hContext = 0; local 554 TSS_HCONTEXT hContext; local [all...] |
H A D | decr_mgr.c | 54 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 70 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
|
H A D | encr_mgr.c | 53 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 69 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
|
H A D | loadsave.c | 427 load_token_data(TSS_HCONTEXT hContext, TOKEN_DATA *td) argument 454 rc = init_token_data(hContext, td); 619 save_token_object(TSS_HCONTEXT hContext, OBJECT *obj) argument 631 rc = save_private_token_object(hContext, obj); 739 save_private_token_object(TSS_HCONTEXT hContext, OBJECT *obj) argument 810 rc = tpm_encrypt_data(hContext, hPrivateLeafKey, cleartxt, cleartxt_len, 943 load_private_token_objects(TSS_HCONTEXT hContext) argument 1006 rc = restore_private_token_object(hContext, buf, size, NULL); 1033 TSS_HCONTEXT hContext, 1064 rc = tpm_decrypt_data(hContext, hPrivateLeafKe 1032 restore_private_token_object( TSS_HCONTEXT hContext, CK_BYTE *data, CK_ULONG len, OBJECT *pObj) argument 1104 reload_token_object(TSS_HCONTEXT hContext, OBJECT *obj) argument [all...] |
H A D | key_mgr.c | 148 sess->hContext, 254 rc = object_mgr_find_in_map1(sess->hContext, h_wrapping_key, &key1_obj); 258 rc = object_mgr_find_in_map1(sess->hContext, h_key, &key2_obj); 372 rc = object_mgr_find_in_map1(sess->hContext, h_unwrapping_key,
|
H A D | sess_mgr.c | 607 if (sess->hContext) 608 (void) Tspi_Context_Close(sess->hContext); 615 TSS_HCONTEXT hContext; local 616 if (open_tss_context(&hContext) == 0) { 617 (void) object_mgr_purge_private_token_objects(hContext); 618 (void) Tspi_Context_Close(hContext); 684 if (sess->hContext) 685 (void) Tspi_Context_Close(sess->hContext);
|
H A D | utility.c | 411 init_token_data(TSS_HCONTEXT hContext, TOKEN_DATA *td) { argument 432 rc = token_get_tpm_info(hContext, td);
|
H A D | dig_mgr.c | 455 rc = object_mgr_find_in_map1(sess->hContext, key_handle, &key_obj);
|
H A D | mech_md5.c | 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
|
H A D | mech_sha.c | 96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
|
H A D | sign_mgr.c | 52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
|
H A D | verify_mgr.c | 54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
|
H A D | api_interface.c | 1336 TSS_HCONTEXT hContext; local 1348 if (open_tss_context(&hContext) == 0) { 1354 (void) token_get_tpm_info(hContext, &td); 1356 (void) Tspi_Context_Close(hContext);
|
H A D | tpmtok_int.h | 321 TSS_HCONTEXT hContext; member in struct:_SESSION
|