Lines Matching refs:CLEAR

1402 An object is subject to DA protection if its noDA attribute is CLEAR. An NV Index is subject to
1403 DA protection if its TPMA_NV_NO_DA attribute is CLEAR.
1427 If adminWithPolicy is CLEAR, then any type of authorization session is allowed .
1451 1) If the entity being authorized is an object and its userWithAuth attribute is CLEAR, then the
2092 In the reference implementation, this signal causes an internal flag ( s_initialized) to be CLEAR.
2093 While this flag is CLEAR, the TPM will only accept the next expected command described above.
2190 1) TPM Reset – This is a Startup(CLEAR) preceded by either Shutdown(CLEAR) or no
2199 2) TPM Restart – This is a Startup(CLEAR) preceded by Shutdown(STATE). This preserves much of the
2330 Shutdown(CLEAR).
2527 // with StateSave command for CLEAR, this cycle can not startup up with
2745 next TPM2_Startup(), then the next TPM2_Startup() shall be TPM2_Startup(CLEAR).
2884 if PCR bank has been re-configured, a CLEAR StateSave() is
2907 // If PCR bank has been reconfigured, a CLEAR state save is required
4202 CLEAR if inSensitive.data is not an Empty Buffer or the TPM shall return TPM_RC_ATTRIBUTES.
4455 sensitiveDataOrigin is CLEAR when 'sensitive. data' is an Empty
5119 “TPMA_OBJECT” in Part 2. In particular, fixedTPM, fixedParent, and restricted shall be CLEAR if
5300 'fixedParent" and fixedTPM must be CLEAR on on an external key if
5415 // An external object with a sensitive area must have fixedTPM == CLEAR
5416 // fixedParent == CLEAR, and must have restrict CLEAR so that it does not
5465 in->inPublic.t.publicArea.objectAttributes.fixedTPM != CLEAR
5466 || in->inPublic.t.publicArea.objectAttributes.fixedParent != CLEAR
5467 || in->inPublic.t.publicArea.objectAttributes.restricted != CLEAR
5955 || object->publicArea.objectAttributes.decrypt == CLEAR
5956 || object->publicArea.objectAttributes.restricted == CLEAR)
6235 || object->publicArea.objectAttributes.decrypt == CLEAR
6236 || object->publicArea.objectAttributes.restricted == CLEAR
7040 // duplicate key must have fixParent bit CLEAR.
7670 the parent has fixedTPM CLEAR, then the binding needs to be checked each time the object is
7856 CLEAR; or inSymSeed is nonempty and parentHandle does not
8050 // FixedTPM and fixedParent must be CLEAR
8314 If it is desired to use a key that had restricted SET, the caller may CLEAR restricted and load the
8656 The key referenced by keyHandle shall be an RSA key (TPM_RC_KEY) with restricted CLEAR and
8897 || rsaKey->publicArea.objectAttributes.decrypt == CLEAR)
9226 keyHandle shall refer to a loaded, ECC key (TPM_RC_KEY) with the restricted attribute CLEAR and the
11283 CLEAR (unrestricted)
11287 CLEAR
11291 CLEAR
12011 if(hashObject->attributes.firstBlock == CLEAR)
12293 object->attributes.hashSeq == CLEAR
12294 && object->attributes.hmacSeq == CLEAR)
12310 if(hashObject->attributes.firstBlock == CLEAR)
12378 else if(object->attributes.ticketSafe == CLEAR)
13844 CLEAR. This will flush the session at the end of the command.
14063 if(session->attributes.isAudit == CLEAR)
17793 The authorization setting is set to EmptyAuth on each STARTUP(CLEAR) or by TPM2_Clear(). The
19374 if(session->attributes.isTrialPolicy == CLEAR)
19533 && session->attributes.isTrialPolicy == CLEAR
19902 if(session->attributes.isTrialPolicy == CLEAR)
19981 && session->attributes.isTrialPolicy == CLEAR
20640 The TPM will modify the pcrs parameter so that bits that correspond to unimplemented PCR are CLEAR.
20887 if(session->attributes.isTrialPolicy == CLEAR)
20965 if(session->attributes.isTrialPolicy == CLEAR)
21622 if(session->attributes.isTrialPolicy == CLEAR)
21882 // All bits SET in B are CLEAR in A. ((A&B)=0)
22204 if(session->attributes.isTrialPolicy == CLEAR)
22363 // All bits SET in B are CLEAR in A. ((A&B)=0)
23433 session->attributes.iscpHashDefined = CLEAR;
23463 created with includeObject CLEAR.
23774 session->attributes.iscpHashDefined = CLEAR;
24057 if(session->attributes.isTrialPolicy == CLEAR)
24155 Additionally, policySession→isPasswordNeeded will be CLEAR.
24327 session->attributes.isPasswordNeeded = CLEAR;
24372 When this command is successful, policySession→isAuthValueNeeded will be CLEAR.
24532 session->attributes.isAuthValueNeeded = CLEAR;
24713 If policySession→checkNVWritten is CLEAR, it is SET and policySession→nvWrittenState is set to
24729 require TPMA_NV_WRITTEN CLEAR and a more complex policy for later use that would require
24986 attributes are implied to be CLEAR.
25164 sensitiveDataOrigin is CLEAR when 'sensitive. data' is an Empty
25369 This command may be used to CLEAR phEnable and phEnableNV if platformAuth/platformPolicy is
25371 This command may be used to CLEAR shEnable if either platformAuth/platformPolicy
25376 This command may be used to CLEAR ehEnable if either platformAuth/platformPolicy or
25379 When this command is used to CLEAR phEnable, shEnable, or ehEnable, the TPM will disable use of
25382 When this command is used to CLEAR shEnable, the TPM will disable access to any NV index that has
25383 TPMA_NV_PLATFORMCREATE CLEAR (indicating that the NV Index was defined using ownerAuth). As
25384 long as shEnable is CLEAR, the TPM will return an error in response to any command that attempts to
25385 operate upon an NV index that has TPMA_NV_PLATFORMCREATE CLEAR.
25386 When this command is used to CLEAR phEnableNV, the TPM will disable access to any NV index that
25388 As long as phEnableNV is CLEAR, the TPM will return an error in response to any command that
25448 should be CLEAR
25680 // CLEAR, then platformAuth cannot be used for authorization. This
25682 // state of phEnable from CLEAR to SET.
25684 // is CLEAR, then this code could SET phEnable when proper platform
25720 if(select == CLEAR && in->enable != TPM_RH_PLATFORM_NV)
26442 delete any NV Index with TPMA_NV_PLATFORMCREATE == CLEAR;
26779 CLEAR the attribute if disable is NO. When the attribute is SET, TPM2_Clear() may not be executed.
26783 to CLEAR the disableClear attribute and then execute TPM2_Clear().
26785 LockoutAuth may be used to SET disableClear but not to CLEAR it.
26786 PlatformAuth may be used to SET or CLEAR disableClear.
26836 the flag is to be CLEAR.
27402 Startup(CLEAR).
30153 if(evictObject->attributes.evict == CLEAR)
30219 if(evictObject->attributes.ppsHierarchy == CLEAR)
30234 evictObject->attributes.evict == CLEAR
30247 if(evictObject->attributes.evict == CLEAR)
31667 For creating an Index, ownerAuth may not be used if shEnable is CLEAR and platformAuth may not be
31668 used if phEnableNV is CLEAR.
31670 CLEAR. If an Index was defined using ownerAuth, then that Index is not accessible when shEnable is
31671 CLEAR.
31680 If TPMA_NV_CLEAR_STCLEAR is SET, then the TPMA_NV_WRITTEN will be CLEAR on each
31796 the size of an ordinary NV Index that has TPMA_NV_ORDERLY CLEAR.
31805 If TPMA_NV_CLEAR_STCLEAR is SET, then TPMA_NV_COUNTER shall be CLEAR or the TPM shall
31809 shall be CLEAR in publicInfo. If TPMA_NV_PLATFORMCREATE is not set correctly for the authorization,
31849 CLEAR. Any access of the NV data will return TPM_RC_NV_UINITIALIZED.
32061 // can't be given when shEnable is CLEAR. However, if phEnable
32062 // is SET but phEnableNV is CLEAR, we have to check here
32063 if(in->authHandle == TPM_RH_PLATFORM && gc.phEnableNV == CLEAR)
32168 attributes.TPMA_NV_OWNERREAD == CLEAR
32169 && attributes.TPMA_NV_PPREAD == CLEAR
32170 && attributes.TPMA_NV_AUTHREAD == CLEAR
32171 && attributes.TPMA_NV_POLICYREAD == CLEAR)
32175 attributes.TPMA_NV_OWNERWRITE == CLEAR
32176 && attributes.TPMA_NV_PPWRITE == CLEAR
32177 && attributes.TPMA_NV_AUTHWRITE == CLEAR
32178 && attributes.TPMA_NV_POLICYWRITE == CLEAR)
32279 in->publicInfo.t.nvPublic.attributes.TPMA_NV_PLATFORMCREATE == CLEAR
32334 An Index with TPMA_NV_PLATFORMCREATE CLEAR may be deleted with platformAuth as long as
32335 shEnable is SET. If shEnable is CLEAR, indexes created using ownerAuth are not accessible even
32549 TPMA_NV_POLICY_DELETE attribute CLEAR, the TPM shall return TPM_RC_NV_ATTRIBUTES.
32558 CLEAR
32563 TPM2_UndefineSpace()as long as shEnable is SET. If shEnable is CLEAR, indexes created using
32720 if(CLEAR == nvIndex.publicArea.attributes.TPMA_NV_POLICY_DELETE)
33226 If TPMA_NV_WRITTEN is CLEAR, it will be SET.
33428 if(nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
33536 If TPMA_NV_WRITTEN is CLEAR, then nvIndex→data is a Zero Digest.
33737 nvIndex.publicArea.attributes.TPMA_NV_ORDERLY == CLEAR
33738 || nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
34037 nvIndex.publicArea.attributes.TPMA_NV_ORDERLY == CLEAR
34038 || nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
34048 if(nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
34310 nvIndex.publicArea.attributes.TPMA_NV_WRITEDEFINE == CLEAR
34311 && nvIndex.publicArea.attributes.TPMA_NV_WRITE_STCLEAR == CLEAR)
34569 If the NV Index has been defined but the TPMA_NV_WRITTEN attribute is CLEAR, then this command
34813 Index is CLEAR, then the TPM shall return TPM_RC_NV_ATTRIBUTE. TPMA_NV_READLOCKED will
34814 be CLEAR by the next TPM2_Startup(TPM_SU_CLEAR).
35015 if(nvIndex.publicArea.attributes.TPMA_NV_READ_STCLEAR == CLEAR)