/external/tpm2/ |
D | Entity.c | 249 TPM2B_DIGEST *authPolicy // OUT: authPolicy of the entity in EntityGetAuthPolicy() argument 261 *authPolicy = gp.ownerPolicy; in EntityGetAuthPolicy() 266 *authPolicy = gp.endorsementPolicy; in EntityGetAuthPolicy() 271 *authPolicy = gc.platformPolicy; in EntityGetAuthPolicy() 276 *authPolicy = gp.lockoutPolicy; in EntityGetAuthPolicy() 290 *authPolicy = object->publicArea.authPolicy; in EntityGetAuthPolicy() 299 *authPolicy = nvIndex.publicArea.authPolicy; in EntityGetAuthPolicy() 305 hashAlg = PCRGetAuthPolicy(handle, authPolicy); in EntityGetAuthPolicy()
|
D | SetPrimaryPolicy.c | 27 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) in TPM2_SetPrimaryPolicy() 45 gp.ownerPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy() 51 gp.endorsementPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy() 57 gc.platformPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy() 63 gp.lockoutPolicy = in->authPolicy; in TPM2_SetPrimaryPolicy()
|
D | PCR_SetAuthPolicy.c | 35 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) in TPM2_PCR_SetAuthPolicy() 46 gp.pcrPolicies.policy[groupIndex] = in->authPolicy; in TPM2_PCR_SetAuthPolicy()
|
D | LoadExternal.c | 48 if(in->inPublic.t.publicArea.authPolicy.t.size != 0 in TPM2_LoadExternal() 49 && in->inPublic.t.publicArea.authPolicy.t.size != in TPM2_LoadExternal()
|
D | NV_DefineSpace.c | 57 if( in->publicInfo.t.nvPublic.authPolicy.t.size != 0 in TPM2_NV_DefineSpace() 58 && in->publicInfo.t.nvPublic.authPolicy.t.size != nameSize) in TPM2_NV_DefineSpace()
|
D | Entity_fp.h | 12 TPM2B_DIGEST *authPolicy // OUT: authPolicy of the entity
|
D | SetPrimaryPolicy_fp.h | 14 TPM2B_DIGEST authPolicy; member
|
D | PCR_SetAuthPolicy_fp.h | 14 TPM2B_DIGEST authPolicy; member
|
D | Marshal_SetPrimaryPolicy.c | 18 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in SetPrimaryPolicy_In_Unmarshal()
|
D | Marshal_PCR_SetAuthPolicy.c | 19 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in PCR_SetAuthPolicy_In_Unmarshal()
|
D | SessionProcess.c | 421 if(nvIndex.publicArea.authPolicy.t.size != 0) in IsAuthPolicyAvailable() 736 TPM2B_DIGEST authPolicy; in CheckPolicyAuthSession() local 752 &authPolicy); in CheckPolicyAuthSession() 754 if(!Memory2BEqual(&session->u2.policyDigest.b, &authPolicy.b)) in CheckPolicyAuthSession()
|
D | Object_spt.c | 537 if( publicArea->authPolicy.t.size != 0 in PublicAttributesValidation() 538 && ( publicArea->authPolicy.t.size in PublicAttributesValidation()
|
D | tpm_types.h | 1460 TPM2B_DIGEST authPolicy; member 1589 TPM2B_DIGEST authPolicy; member
|
D | Object.c | 420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy); in AllocateSequenceSlot()
|
D | part3.txt | 958 …4) policySession→policyDigest shall match the authPolicy associated with the… 2336 used to compute the authPolicy for an object. 3043 TPM_RC_SIZE inPrivate missing, or authPolicy size for inPublic or is not valid 3166 be the same as its Name. The TPM will validate that the authPolicy is either the size of the digest 3281 …TPM_RC_SIZE authPolicy is not zero and is not the size of a digest produced … 3302 21 // the size of authPolicy is either 0 or the digest size of nameAlg 3303 22 if(in->inPublic.t.publicArea.authPolicy.t.size != 0 3304 23 && in->inPublic.t.publicArea.authPolicy.t.size != 4641 …TPM_RC_SIZE authPolicy size does not match digest size of the name algorithm… 9839 …Empty Buffer for the authPolicy value. This will allow an EmptyAuth to be used as the authorization [all …]
|
D | part4.txt | 4120 This function indicates if an authPolicy is available and allowed. 4126 TRUE authPolicy is available 4127 FALSE authPolicy is not available 4193 342 if(nvIndex.publicArea.authPolicy.t.size != 0) 4524 … a) compare policyDigest in session with authPolicy associated with the entity to be authorized; 4560 614 TPM2B_DIGEST authPolicy; 4578 632 // Get authPolicy. 4580 634 &authPolicy); 4581 635 // Compare authPolicy. 4582 636 if(!Memory2BEqual(&session->u2.policyDigest.b, &authPolicy.b)) [all …]
|
D | tpm_generated.c | 1492 total_size += TPM2B_DIGEST_Marshal(&source->authPolicy, buffer, size); in TPMS_NV_PUBLIC_Marshal() 1513 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in TPMS_NV_PUBLIC_Unmarshal() 3290 total_size += TPM2B_DIGEST_Marshal(&source->authPolicy, buffer, size); in TPMT_PUBLIC_Marshal() 3312 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size); in TPMT_PUBLIC_Unmarshal()
|
/external/tpm2/generator/ |
D | raw_commands.txt | 1505 authPolicy 3624 used to compute the authPolicy for an object. 4906 inPrivate missing, or authPolicy size for inPublic or is not valid 5130 be the same as its Name. The TPM will validate that the authPolicy is either the size of the digest 5335 authPolicy is not zero and is not the size of a digest produced by the 5404 // the size of authPolicy is either 0 or the digest size of nameAlg 5405 if(in->inPublic.t.publicArea.authPolicy.t.size != 0 5406 && in->inPublic.t.publicArea.authPolicy.t.size != 7912 authPolicy size does not match digest size of the name algorithm in 17567 Empty Buffer for the authPolicy value. This will allow an EmptyAuth to be used as the authorization [all …]
|
D | raw_commands_fixed.txt | 1505 authPolicy 3624 used to compute the authPolicy for an object. 4908 inPrivate missing, or authPolicy size for inPublic or is not valid 5132 be the same as its Name. The TPM will validate that the authPolicy is either the size of the digest 5337 authPolicy is not zero and is not the size of a digest produced by the 5406 // the size of authPolicy is either 0 or the digest size of nameAlg 5407 if(in->inPublic.t.publicArea.authPolicy.t.size != 0 5408 && in->inPublic.t.publicArea.authPolicy.t.size != 7923 authPolicy size does not match digest size of the name algorithm in 17578 Empty Buffer for the authPolicy value. This will allow an EmptyAuth to be used as the authorization [all …]
|
D | structures.txt | 1448 _NAME authPolicy 1510 _NAME authPolicy
|
D | commands.txt | 1449 _NAME authPolicy 1450 _COMMENT the desired authPolicy 2077 _NAME authPolicy 2081 _COMMENT the hash algorithm to use for the policy If the authPolicy is an Empty Buffer, then this f…
|
D | raw_structures.txt | 4769 authPolicy value 4807 authValue or authPolicy is not available for 7510 authValue, and an Empty Policy authPolicy. 8328 authorizations may be provided with a policy session that satisfies the object's authPolicy. 8371 provided by a policy session that satisfies the object's authPolicy. 14869 authPolicy 15367 Indexes using platformAuth or ownerAuth rather than the authValue or authPolicy of the Index. 15368 If access to an NV Index is to be restricted based on PCR, then an appropriate authPolicy shall be 15375 TPMA_NV_POLICYREAD is SET, then the Index may be read if the Index authPolicy is satisfied. 15386 TPMA_NV_POLICYWRITE is SET, then the Index may be written if the Index authPolicy is satisfied. [all …]
|
D | raw_structures_fixed.txt | 4760 authPolicy value 4798 authValue or authPolicy is not available for 7534 authValue, and an Empty Policy authPolicy. 8345 authorizations may be provided with a policy session that satisfies the object's authPolicy. 8388 provided by a policy session that satisfies the object's authPolicy. 14845 authPolicy 15342 Indexes using platformAuth or ownerAuth rather than the authValue or authPolicy of the Index. 15343 If access to an NV Index is to be restricted based on PCR, then an appropriate authPolicy shall be 15350 TPMA_NV_POLICYREAD is SET, then the Index may be read if the Index authPolicy is satisfied. 15361 TPMA_NV_POLICYWRITE is SET, then the Index may be written if the Index authPolicy is satisfied. [all …]
|