Lines Matching refs:HMAC
236 Hash/HMAC/Event Sequences .........................................................................…
1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or,
1324 If the HMAC and policy session contexts use the same memory, the type of the context must
1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or
1407 An HMAC or password is required in a policy
1464 if the authorization is an HMAC session or a password;
1519 7) if the authorization uses an HMAC, then the HMAC is properly constructed using the authValue
1699 appropriate, generate an HMAC.
2005 If use of a handle requires authorization, the Password, HMAC, or Policy session associated with the
3703 indicates the type of the session; simple HMAC or policy
3963 // HMAC session input handle check.
4881 HMAC on inPrivate was not valid
5135 an object with no Name is computed, no Name value is included in the HMAC. To ensure that these
5722 the HMAC key.
5723 The HMAC is used to validate that the credentialBlob is associated with activateHandle and that the…
5725 achieved by including the Name in the HMAC calculation.
6461 Therefore, the old authValue (of the TPM-resident object) is used when generating the response HMAC
7190 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
7631 creation of the HMAC key and encryption keys used to protect the duplication blob. When recovering
7659 the Name of objectPublic in the integrity HMAC computation. If either the outer layer or inner laye…
7667 area other than that the Name of the public area is included in the HMAC. However, if the binding is
9954 decryption as well as hash and HMAC. All of the commands in this group are stateless. That is, they…
9956 For hashing, HMAC, and Events that require large blocks of data with retained state, the sequence
10657 This command performs an HMAC on the supplied data using the indicated hash algorithm.
10663 hash algorithm for the HMAC and the TPM shall return TPM_RC_VALUE if hashAlg is not
10668 If the key referenced by handle is not restricted, then the TPM will use hashAlg for the HMAC. Howe…
10716 HMAC key
10724 HMAC data
10730 algorithm to use for HMAC
10760 the returned HMAC in a sized buffer
10785 key referenced by handle is not an HMAC key
10868 // Get HMAC key object and public area pointers
10871 // Make sure that the key is an HMAC signing key
10922 // Start HMAC stack
10926 // Adding HMAC data
10928 // Complete HMAC
11245 Hash/HMAC/Event Sequences
11252 maintained. For a description of sequences, see “Hash, HMAC, and Event Sequences” in Part 1.
11258 This command starts an HMAC sequence. The TPM will create and initialize an HMAC sequence
11270 hash algorithm for the HMAC and the TPM shall return TPM_RC_VALUE if hashAlg is not
11272 If the key referenced by handle is not restricted, then the TPM will use hashAlg for the HMAC; unle…
11358 A hash algorithm is required for the HMAC.
11408 handle of an HMAC key
11422 the hash algorithm to use for the HMAC
11481 key referenced by handle is not an HMAC key
11559 // Get HMAC key object and public area pointers
11562 // Make sure that the key is an HMAC signing key
11610 // Create a HMAC sequence object. A TPM_RC_OBJECT_MEMORY error may be
11803 This command is used to add data to a hash or HMAC sequence. The amount of data in buffer may be
11966 sequenceHandle does not reference a hash or HMAC sequence
12007 // Update hash/HMAC sequence object
12021 // Update sequence object hash/HMAC stack
12054 // Update sequence object hash/HMAC stack
12079 This command adds the last part of data, if any, to a hash/HMAC sequence and returns the result.
12148 data to be added to the hash/HMAC
12181 the returned HMAC or digest in a sized buffer
12188 This is a NULL Ticket when the session is HMAC.
12268 sequenceHandle does not reference a hash or HMAC sequence
12291 // input handle must be a hash or HMAC sequence object.
12400 // Complete hash/HMAC
12405 // No ticket is generated for HMAC sequence
12438 If sequenceHandle references a hash or HMAC sequence, the TPM shall return TPM_RC_MODE.
13160 HMAC(proof, (TPM_ST_CREATION || objectHandle→Name || creationHash))
15642 signature (the HMAC).
15916 Symmetric “signing” is done with an HMAC.
18912 (HMAC or clear text). Both commands could be in the same policy. The final instance of these
18933 HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12)
19625 password session, an HMAC session, or a policy session containing TPM2_PolicyAuthValue() or
19652 If an HMAC is used to convey the authorization, a separate session is needed for the authorization.
19653 Because the HMAC in that authorization will include a nonce that prevents replay of the
23810 HMAC(proof, (TPM_ST_VERIFIED || aHash || keySign→Name))
24154 the authValue will be included in hmacKey when the authorization HMAC is computed for this session.
24159 use sessionKey. If sessionKey is not present, then the hmacKey is an Empty Buffer and no HMAC
24358 HMAC.
24368 done using either an HMAC or a password with no change to the authPolicy of the object. The
24370 will contain an HMAC or a password value.
26455 computation shall use the SPS as an HMAC key and the derived value may then be a parameter
26456 in a second HMAC in which the EPS is the HMAC key. The reference design uses values from
26489 If this command is authorized using lockoutAuth, the HMAC in the response shall use the new
26490 lockoutAuth value (that is, the Empty Buffer) when computing response HMAC.
27204 HMAC authorization fails. When the counter reaches a predefined value, the TPM will not accept, for
27621 asserted for either an HMAC or a Policy authorization.
29176 If the integrity HMAC of the saved context is not valid, the TPM shall return TPM_RC_INTEGRITY.
31026 the TPM return a list of loaded HMAC sessions without including the policy sessions.
35056 Since the NV Index authorization is changed before the response HMAC is calculated, the newAuth val…
35057 is used when generating the response HMAC key if required. See Part 4 ComputeResponseHMAC().