Lines Matching refs:CLEAR

1402 An object is subject to DA protection if its noDA attribute is CLEAR. An NV Index is subject to
1403 DA protection if its TPMA_NV_NO_DA attribute is CLEAR.
1427 If adminWithPolicy is CLEAR, then any type of authorization session is allowed .
1451 1) If the entity being authorized is an object and its userWithAuth attribute is CLEAR, then the
2092 In the reference implementation, this signal causes an internal flag ( s_initialized) to be CLEAR.
2093 While this flag is CLEAR, the TPM will only accept the next expected command described above.
2190 1) TPM Reset – This is a Startup(CLEAR) preceded by either Shutdown(CLEAR) or no
2199 2) TPM Restart – This is a Startup(CLEAR) preceded by Shutdown(STATE). This preserves much of the
2330 Shutdown(CLEAR).
2527 // with StateSave command for CLEAR, this cycle can not startup up with
2745 next TPM2_Startup(), then the next TPM2_Startup() shall be TPM2_Startup(CLEAR).
2884 if PCR bank has been re-configured, a CLEAR StateSave() is
2907 // If PCR bank has been reconfigured, a CLEAR state save is required
4204 CLEAR if inSensitive.data is not an Empty Buffer or the TPM shall return TPM_RC_ATTRIBUTES.
4457 sensitiveDataOrigin is CLEAR when 'sensitive. data' is an Empty
5121 “TPMA_OBJECT” in Part 2. In particular, fixedTPM, fixedParent, and restricted shall be CLEAR if
5302 'fixedParent" and fixedTPM must be CLEAR on on an external key if
5417 // An external object with a sensitive area must have fixedTPM == CLEAR
5418 // fixedParent == CLEAR, and must have restrict CLEAR so that it does not
5467 in->inPublic.t.publicArea.objectAttributes.fixedTPM != CLEAR
5468 || in->inPublic.t.publicArea.objectAttributes.fixedParent != CLEAR
5469 || in->inPublic.t.publicArea.objectAttributes.restricted != CLEAR
5957 || object->publicArea.objectAttributes.decrypt == CLEAR
5958 || object->publicArea.objectAttributes.restricted == CLEAR)
6239 || object->publicArea.objectAttributes.decrypt == CLEAR
6240 || object->publicArea.objectAttributes.restricted == CLEAR
7046 // duplicate key must have fixParent bit CLEAR.
7680 the parent has fixedTPM CLEAR, then the binding needs to be checked each time the object is
7867 CLEAR; or inSymSeed is nonempty and parentHandle does not
8061 // FixedTPM and fixedParent must be CLEAR
8325 If it is desired to use a key that had restricted SET, the caller may CLEAR restricted and load the
8667 The key referenced by keyHandle shall be an RSA key (TPM_RC_KEY) with restricted CLEAR and
8908 || rsaKey->publicArea.objectAttributes.decrypt == CLEAR)
9237 keyHandle shall refer to a loaded, ECC key (TPM_RC_KEY) with the restricted attribute CLEAR and the
11294 CLEAR (unrestricted)
11298 CLEAR
11302 CLEAR
12022 if(hashObject->attributes.firstBlock == CLEAR)
12304 object->attributes.hashSeq == CLEAR
12305 && object->attributes.hmacSeq == CLEAR)
12321 if(hashObject->attributes.firstBlock == CLEAR)
12389 else if(object->attributes.ticketSafe == CLEAR)
13855 CLEAR. This will flush the session at the end of the command.
14074 if(session->attributes.isAudit == CLEAR)
17804 The authorization setting is set to EmptyAuth on each STARTUP(CLEAR) or by TPM2_Clear(). The
19385 if(session->attributes.isTrialPolicy == CLEAR)
19544 && session->attributes.isTrialPolicy == CLEAR
19913 if(session->attributes.isTrialPolicy == CLEAR)
19992 && session->attributes.isTrialPolicy == CLEAR
20651 The TPM will modify the pcrs parameter so that bits that correspond to unimplemented PCR are CLEAR.
20898 if(session->attributes.isTrialPolicy == CLEAR)
20976 if(session->attributes.isTrialPolicy == CLEAR)
21633 if(session->attributes.isTrialPolicy == CLEAR)
21893 // All bits SET in B are CLEAR in A. ((A&B)=0)
22215 if(session->attributes.isTrialPolicy == CLEAR)
22374 // All bits SET in B are CLEAR in A. ((A&B)=0)
23444 session->attributes.iscpHashDefined = CLEAR;
23474 created with includeObject CLEAR.
23785 session->attributes.iscpHashDefined = CLEAR;
24068 if(session->attributes.isTrialPolicy == CLEAR)
24166 Additionally, policySession→isPasswordNeeded will be CLEAR.
24338 session->attributes.isPasswordNeeded = CLEAR;
24383 When this command is successful, policySession→isAuthValueNeeded will be CLEAR.
24543 session->attributes.isAuthValueNeeded = CLEAR;
24724 If policySession→checkNVWritten is CLEAR, it is SET and policySession→nvWrittenState is set to
24740 require TPMA_NV_WRITTEN CLEAR and a more complex policy for later use that would require
24997 attributes are implied to be CLEAR.
25175 sensitiveDataOrigin is CLEAR when 'sensitive. data' is an Empty
25380 This command may be used to CLEAR phEnable and phEnableNV if platformAuth/platformPolicy is
25382 This command may be used to CLEAR shEnable if either platformAuth/platformPolicy
25387 This command may be used to CLEAR ehEnable if either platformAuth/platformPolicy or
25390 When this command is used to CLEAR phEnable, shEnable, or ehEnable, the TPM will disable use of
25393 When this command is used to CLEAR shEnable, the TPM will disable access to any NV index that has
25394 TPMA_NV_PLATFORMCREATE CLEAR (indicating that the NV Index was defined using ownerAuth). As
25395 long as shEnable is CLEAR, the TPM will return an error in response to any command that attempts to
25396 operate upon an NV index that has TPMA_NV_PLATFORMCREATE CLEAR.
25397 When this command is used to CLEAR phEnableNV, the TPM will disable access to any NV index that
25399 As long as phEnableNV is CLEAR, the TPM will return an error in response to any command that
25459 should be CLEAR
25691 // CLEAR, then platformAuth cannot be used for authorization. This
25693 // state of phEnable from CLEAR to SET.
25695 // is CLEAR, then this code could SET phEnable when proper platform
25731 if(select == CLEAR && in->enable != TPM_RH_PLATFORM_NV)
26453 delete any NV Index with TPMA_NV_PLATFORMCREATE == CLEAR;
26790 CLEAR the attribute if disable is NO. When the attribute is SET, TPM2_Clear() may not be executed.
26794 to CLEAR the disableClear attribute and then execute TPM2_Clear().
26796 LockoutAuth may be used to SET disableClear but not to CLEAR it.
26797 PlatformAuth may be used to SET or CLEAR disableClear.
26847 the flag is to be CLEAR.
27413 Startup(CLEAR).
30164 if(evictObject->attributes.evict == CLEAR)
30230 if(evictObject->attributes.ppsHierarchy == CLEAR)
30245 evictObject->attributes.evict == CLEAR
30258 if(evictObject->attributes.evict == CLEAR)
31676 For creating an Index, ownerAuth may not be used if shEnable is CLEAR and platformAuth may not be
31677 used if phEnableNV is CLEAR.
31679 CLEAR. If an Index was defined using ownerAuth, then that Index is not accessible when shEnable is
31680 CLEAR.
31689 If TPMA_NV_CLEAR_STCLEAR is SET, then the TPMA_NV_WRITTEN will be CLEAR on each
31805 the size of an ordinary NV Index that has TPMA_NV_ORDERLY CLEAR.
31814 If TPMA_NV_CLEAR_STCLEAR is SET, then TPMA_NV_COUNTER shall be CLEAR or the TPM shall
31818 shall be CLEAR in publicInfo. If TPMA_NV_PLATFORMCREATE is not set correctly for the authorization,
31858 CLEAR. Any access of the NV data will return TPM_RC_NV_UINITIALIZED.
32070 // can't be given when shEnable is CLEAR. However, if phEnable
32071 // is SET but phEnableNV is CLEAR, we have to check here
32072 if(in->authHandle == TPM_RH_PLATFORM && gc.phEnableNV == CLEAR)
32177 attributes.TPMA_NV_OWNERREAD == CLEAR
32178 && attributes.TPMA_NV_PPREAD == CLEAR
32179 && attributes.TPMA_NV_AUTHREAD == CLEAR
32180 && attributes.TPMA_NV_POLICYREAD == CLEAR)
32184 attributes.TPMA_NV_OWNERWRITE == CLEAR
32185 && attributes.TPMA_NV_PPWRITE == CLEAR
32186 && attributes.TPMA_NV_AUTHWRITE == CLEAR
32187 && attributes.TPMA_NV_POLICYWRITE == CLEAR)
32288 in->publicInfo.t.nvPublic.attributes.TPMA_NV_PLATFORMCREATE == CLEAR
32343 An Index with TPMA_NV_PLATFORMCREATE CLEAR may be deleted with platformAuth as long as
32344 shEnable is SET. If shEnable is CLEAR, indexes created using ownerAuth are not accessible even
32558 TPMA_NV_POLICY_DELETE attribute CLEAR, the TPM shall return TPM_RC_NV_ATTRIBUTES.
32567 CLEAR
32572 TPM2_UndefineSpace()as long as shEnable is SET. If shEnable is CLEAR, indexes created using
32729 if(CLEAR == nvIndex.publicArea.attributes.TPMA_NV_POLICY_DELETE)
33235 If TPMA_NV_WRITTEN is CLEAR, it will be SET.
33437 if(nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
33545 If TPMA_NV_WRITTEN is CLEAR, then nvIndex→data is a Zero Digest.
33746 nvIndex.publicArea.attributes.TPMA_NV_ORDERLY == CLEAR
33747 || nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
34046 nvIndex.publicArea.attributes.TPMA_NV_ORDERLY == CLEAR
34047 || nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
34057 if(nvIndex.publicArea.attributes.TPMA_NV_WRITTEN == CLEAR)
34319 nvIndex.publicArea.attributes.TPMA_NV_WRITEDEFINE == CLEAR
34320 && nvIndex.publicArea.attributes.TPMA_NV_WRITE_STCLEAR == CLEAR)
34578 If the NV Index has been defined but the TPMA_NV_WRITTEN attribute is CLEAR, then this command
34822 Index is CLEAR, then the TPM shall return TPM_RC_NV_ATTRIBUTE. TPMA_NV_READLOCKED will
34823 be CLEAR by the next TPM2_Startup(TPM_SU_CLEAR).
35024 if(nvIndex.publicArea.attributes.TPMA_NV_READ_STCLEAR == CLEAR)