Home
last modified time | relevance | path

Searched refs:authPolicy (Results 1 – 23 of 23) sorted by relevance

/external/tpm2/
DEntity.c249 TPM2B_DIGEST *authPolicy // OUT: authPolicy of the entity in EntityGetAuthPolicy() argument
261 *authPolicy = gp.ownerPolicy; in EntityGetAuthPolicy()
266 *authPolicy = gp.endorsementPolicy; in EntityGetAuthPolicy()
271 *authPolicy = gc.platformPolicy; in EntityGetAuthPolicy()
276 *authPolicy = gp.lockoutPolicy; in EntityGetAuthPolicy()
290 *authPolicy = object->publicArea.authPolicy; in EntityGetAuthPolicy()
299 *authPolicy = nvIndex.publicArea.authPolicy; in EntityGetAuthPolicy()
305 hashAlg = PCRGetAuthPolicy(handle, authPolicy); in EntityGetAuthPolicy()
DSetPrimaryPolicy.c27 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) in TPM2_SetPrimaryPolicy()
45 gp.ownerPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy()
51 gp.endorsementPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy()
57 gc.platformPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy()
63 gp.lockoutPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy()
DPCR_SetAuthPolicy.c35 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) in TPM2_PCR_SetAuthPolicy()
46 gp.pcrPolicies.policy[groupIndex] = in->authPolicy; in TPM2_PCR_SetAuthPolicy()
DLoadExternal.c48 if(in->inPublic.t.publicArea.authPolicy.t.size != 0 in TPM2_LoadExternal()
49 && in->inPublic.t.publicArea.authPolicy.t.size != in TPM2_LoadExternal()
DNV_DefineSpace.c57 if( in->publicInfo.t.nvPublic.authPolicy.t.size != 0 in TPM2_NV_DefineSpace()
58 && in->publicInfo.t.nvPublic.authPolicy.t.size != nameSize) in TPM2_NV_DefineSpace()
DEntity_fp.h12 TPM2B_DIGEST *authPolicy // OUT: authPolicy of the entity
DSetPrimaryPolicy_fp.h14 TPM2B_DIGEST authPolicy; member
DPCR_SetAuthPolicy_fp.h14 TPM2B_DIGEST authPolicy; member
DMarshal_SetPrimaryPolicy.c18 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in SetPrimaryPolicy_In_Unmarshal()
DMarshal_PCR_SetAuthPolicy.c19 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in PCR_SetAuthPolicy_In_Unmarshal()
DSessionProcess.c421 if(nvIndex.publicArea.authPolicy.t.size != 0) in IsAuthPolicyAvailable()
736 TPM2B_DIGEST authPolicy; in CheckPolicyAuthSession() local
752 &authPolicy); in CheckPolicyAuthSession()
754 if(!Memory2BEqual(&session->u2.policyDigest.b, &authPolicy.b)) in CheckPolicyAuthSession()
DObject_spt.c537 if( publicArea->authPolicy.t.size != 0 in PublicAttributesValidation()
538 && ( publicArea->authPolicy.t.size in PublicAttributesValidation()
Dtpm_types.h1460 TPM2B_DIGEST authPolicy; member
1589 TPM2B_DIGEST authPolicy; member
DObject.c420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy); in AllocateSequenceSlot()
Dpart3.txt958 …4) policySession→policyDigest shall match the authPolicy associated with the…
2336 used to compute the authPolicy for an object.
3043 TPM_RC_SIZE inPrivate missing, or authPolicy size for inPublic or is not valid
3166 be the same as its Name. The TPM will validate that the authPolicy is either the size of the digest
3281 …TPM_RC_SIZE authPolicy is not zero and is not the size of a digest produced …
3302 21 // the size of authPolicy is either 0 or the digest size of nameAlg
3303 22 if(in->inPublic.t.publicArea.authPolicy.t.size != 0
3304 23 && in->inPublic.t.publicArea.authPolicy.t.size !=
4641 …TPM_RC_SIZE authPolicy size does not match digest size of the name algorithm…
9839 …Empty Buffer for the authPolicy value. This will allow an EmptyAuth to be used as the authorization
[all …]
Dpart4.txt4120 This function indicates if an authPolicy is available and allowed.
4126 TRUE authPolicy is available
4127 FALSE authPolicy is not available
4193 342 if(nvIndex.publicArea.authPolicy.t.size != 0)
4524 … a) compare policyDigest in session with authPolicy associated with the entity to be authorized;
4560 614 TPM2B_DIGEST authPolicy;
4578 632 // Get authPolicy.
4580 634 &authPolicy);
4581 635 // Compare authPolicy.
4582 636 if(!Memory2BEqual(&session->u2.policyDigest.b, &authPolicy.b))
[all …]
Dtpm_generated.c1492 total_size += TPM2B_DIGEST_Marshal(&source->authPolicy, buffer, size); in TPMS_NV_PUBLIC_Marshal()
1513 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in TPMS_NV_PUBLIC_Unmarshal()
3290 total_size += TPM2B_DIGEST_Marshal(&source->authPolicy, buffer, size); in TPMT_PUBLIC_Marshal()
3312 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in TPMT_PUBLIC_Unmarshal()
/external/tpm2/generator/
Draw_commands.txt1505 authPolicy
3624 used to compute the authPolicy for an object.
4906 inPrivate missing, or authPolicy size for inPublic or is not valid
5130 be the same as its Name. The TPM will validate that the authPolicy is either the size of the digest
5335 authPolicy is not zero and is not the size of a digest produced by the
5404 // the size of authPolicy is either 0 or the digest size of nameAlg
5405 if(in->inPublic.t.publicArea.authPolicy.t.size != 0
5406 && in->inPublic.t.publicArea.authPolicy.t.size !=
7912 authPolicy size does not match digest size of the name algorithm in
17567 Empty Buffer for the authPolicy value. This will allow an EmptyAuth to be used as the authorization
[all …]
Draw_commands_fixed.txt1505 authPolicy
3624 used to compute the authPolicy for an object.
4908 inPrivate missing, or authPolicy size for inPublic or is not valid
5132 be the same as its Name. The TPM will validate that the authPolicy is either the size of the digest
5337 authPolicy is not zero and is not the size of a digest produced by the
5406 // the size of authPolicy is either 0 or the digest size of nameAlg
5407 if(in->inPublic.t.publicArea.authPolicy.t.size != 0
5408 && in->inPublic.t.publicArea.authPolicy.t.size !=
7923 authPolicy size does not match digest size of the name algorithm in
17578 Empty Buffer for the authPolicy value. This will allow an EmptyAuth to be used as the authorization
[all …]
Dstructures.txt1448 _NAME authPolicy
1510 _NAME authPolicy
Dcommands.txt1449 _NAME authPolicy
1450 _COMMENT the desired authPolicy
2077 _NAME authPolicy
2081 _COMMENT the hash algorithm to use for the policy If the authPolicy is an Empty Buffer, then this f…
Draw_structures.txt4769 authPolicy value
4807 authValue or authPolicy is not available for
7510 authValue, and an Empty Policy authPolicy.
8328 authorizations may be provided with a policy session that satisfies the object's authPolicy.
8371 provided by a policy session that satisfies the object's authPolicy.
14869 authPolicy
15367 Indexes using platformAuth or ownerAuth rather than the authValue or authPolicy of the Index.
15368 If access to an NV Index is to be restricted based on PCR, then an appropriate authPolicy shall be
15375 TPMA_NV_POLICYREAD is SET, then the Index may be read if the Index authPolicy is satisfied.
15386 TPMA_NV_POLICYWRITE is SET, then the Index may be written if the Index authPolicy is satisfied.
[all …]
Draw_structures_fixed.txt4760 authPolicy value
4798 authValue or authPolicy is not available for
7534 authValue, and an Empty Policy authPolicy.
8345 authorizations may be provided with a policy session that satisfies the object's authPolicy.
8388 provided by a policy session that satisfies the object's authPolicy.
14845 authPolicy
15342 Indexes using platformAuth or ownerAuth rather than the authValue or authPolicy of the Index.
15343 If access to an NV Index is to be restricted based on PCR, then an appropriate authPolicy shall be
15350 TPMA_NV_POLICYREAD is SET, then the Index may be read if the Index authPolicy is satisfied.
15361 TPMA_NV_POLICYWRITE is SET, then the Index may be written if the Index authPolicy is satisfied.
[all …]