Searched refs:unseal (Results 1 – 9 of 9) sorted by relevance
/openbmc/linux/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 27 result = self.client.unseal(self.root_key, blob, auth, None) 63 result = self.client.unseal(self.root_key, blob, auth, handle) 77 result = self.client.unseal(self.root_key, blob, 116 result = self.client.unseal(self.root_key, blob, auth, handle) 135 result = self.client.unseal(self.root_key, blob, auth, handle)
|
H A D | tpm2.py | 629 def unseal(self, parent_key, blob, auth_value, policy_handle): member in Client
|
/openbmc/linux/include/keys/ |
H A D | trusted-type.h | 65 int (*unseal)(struct trusted_key_payload *p, char *datablob); member
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_caam.c | 78 .unseal = trusted_caam_unseal,
|
H A D | trusted_core.c | 49 *trusted_key_sources[0].ops->unseal); 364 static_call_update(trusted_key_unseal, trusted_key_sources[i].ops->unseal); in init_trusted()
|
H A D | trusted_tee.c | 287 .unseal = trusted_tee_unseal,
|
H A D | trusted_tpm1.c | 1071 .unseal = trusted_tpm_unseal,
|
/openbmc/qemu/docs/specs/ |
H A D | ppc-spapr-uv-hcalls.rst | 35 unwrap/unseal the symmetric key using the system's TPM device or a TPM Resource
|
/openbmc/qemu/docs/system/i386/ |
H A D | sgx.rst | 72 and when enclave fails to unseal sensitive information from outside, it can
|