Lines Matching refs:auth

4494 size of public auth policy or sensitive auth value does not match
6679 // Can not change auth on sequence object
6682 // Make sure that the auth value is consistent with the nameAlg
11260 auth.
11414 auth
11614 &in->auth,
11641 sequence to the value in auth. A sequence structure for an Event (hashAlg = TPM_ALG_NULL) contains
11681 auth
11779 return ObjectCreateEventSequence(&in->auth, &out->sequenceHandle);
11782 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle);
16326 @auth
17842 auth
17943 // If PCR does not belong to an auth group, return TPM_RC_VALUE
17958 gc.pcrAuthValues.auth[groupIndex] = in->auth;
18268 // The null value for the 'auth' parameter will cause the sequence structure to
19014 If policySession is not a trial session, the TPM will validate auth and only perform the update if …
19028 the hash associated with the auth parameter of this command
19066 combined to create the auth parameter.
19180 auth
19273 the signing scheme of auth is not supported by the TPM
19471 the hash associated with the signed auth
19501 authHash.t.size = CryptStartHash(CryptGetSignHashAlg(&in->auth),
19515 result = CryptVerifySignature(in->authObject, &authHash, &in->auth);
19522 // Update policy with input policyRef and name of auth key
19597 // auth ticket is null
19917 // Update policy context with input policyRef and name of auth key
20001 // auth ticket is null
25188 size of public auth policy or sensitive auth value does not match
25570 // Platform hierarchy has to be disabled by platform auth
26825 @auth
26937 if(in->auth == TPM_RH_LOCKOUT && in->disable == NO)
27147 // Make sure the the auth value is a reasonable size (not larger than
27608 This command requires that auth is TPM_RH_PLATFORM and that Physical Presence be asserted.
27665 @auth
29885 determined by auth.
29886 1) If auth is TPM_RH_PLATFORM, the proper hierarchy is the Platform hierarchy.
29887 2) If auth is TPM_RH_OWNER, the proper hierarchy is either the Storage or the Endorsement
29890 by auth.
29891 1) If auth is TPM_RH_OWNER, then persistentHandle shall be in the inclusive range of
29893 2) If auth is TPM_RH_PLATFORM, then persistentHandle shall be in the inclusive range of
29927 auth. If auth is TPM_RC_OWNER, objectHandle shall be in the inclusive range of 81 00 00 0016 to
29928 81 7F FF FF16. If auth is TPM_RC_PLATFORM, objectHandle may be any valid persistent object
29975 @auth
30047 auth cannot authorize the operation in the hierarchy of evictObject
30149 // Additional auth validation
30150 if(in->auth == TPM_RH_PLATFORM)
30155 // Platform auth can not set evict object in storage or endorsement
30225 // Platform auth can delete any persistent object
30227 else if(in->auth == TPM_RH_OWNER)
30229 // Owner auth can not set or clear evict object in platform hierarchy
30241 // Other auth is not allowed in this command and should be filtered out
30477 @auth
30690 @auth
31867 The value of auth is saved in the created structure. The size of auth is limited to be no larger th…
31915 auth
32030 'auth->size' or 'publicInfo->authPolicy. size' is larger than the digest
32078 MemoryRemoveTrailingZeros(&in->auth);
32079 if(in->auth.t.size > nameSize)
32304 result = NvDefineIndex(&in->publicInfo.t.nvPublic, &in->auth);
32503 // platform may delete an index that was created with either auth.
35224 // Change auth