Home
last modified time | relevance | path

Searched refs:policyDigest (Results 1 – 25 of 26) sorted by relevance

12

/external/tpm2/
DPolicyOR.c35 || (Memory2BEqual(&session->u2.policyDigest.b, in TPM2_PolicyOR()
44 session->u2.policyDigest.t.size = CryptStartHash(session->authHashAlg, in TPM2_PolicyOR()
47 MemorySet(session->u2.policyDigest.t.buffer, 0, in TPM2_PolicyOR()
48 session->u2.policyDigest.t.size); in TPM2_PolicyOR()
49 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyOR()
61 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyOR()
DPolicy_spt.c61 if(cpHashA->t.size != session->u2.policyDigest.t.size) in PolicyParameterChecks()
93 pAssert(session->u2.policyDigest.t.size == policyDigestSize); in PolicyContextUpdate()
95 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in PolicyContextUpdate()
102 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in PolicyContextUpdate()
106 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in PolicyContextUpdate()
111 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in PolicyContextUpdate()
DPolicyDuplicationSelect.c56 session->u2.policyDigest.t.size in TPM2_PolicyDuplicationSelect()
60 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyDuplicationSelect()
76 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyDuplicationSelect()
DPolicyAuthorize.c54 if(!Memory2BEqual(&session->u2.policyDigest.b, in TPM2_PolicyAuthorize()
85 MemorySet(session->u2.policyDigest.t.buffer, 0, in TPM2_PolicyAuthorize()
86 session->u2.policyDigest.t.size); in TPM2_PolicyAuthorize()
DPolicyGetDigest.c23 out->policyDigest = session->u2.policyDigest; in TPM2_PolicyGetDigest()
DPolicyPhysicalPresence.c30 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyPhysicalPresence()
36 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyPhysicalPresence()
DPolicyPassword.c31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyPassword()
37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyPassword()
DPolicyAuthValue.c31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyAuthValue()
37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyAuthValue()
DPolicyCommandCode.c42 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyCommandCode()
51 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyCommandCode()
DPolicyNvWritten.c53 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyNvWritten()
62 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyNvWritten()
DPolicyNameHash.c49 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyNameHash()
58 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyNameHash()
DPolicyCpHash.c52 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyCpHash()
61 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyCpHash()
DPolicyLocality.c93 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyLocality()
102 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyLocality()
DPolicyPCR.c68 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyPCR()
83 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyPCR()
DPolicyCounterTimer.c162 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyCounterTimer()
171 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyCounterTimer()
DPolicyNV.c173 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyNV()
186 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); in TPM2_PolicyNV()
DPolicyGetDigest_fp.h14 typedef struct { TPM2B_DIGEST policyDigest; } PolicyGetDigest_Out; member
DSession.c649 session->u2.policyDigest.t.size = CryptGetHashDigestSize(session->authHashAlg); in SessionInitPolicyData()
673 MemorySet(&session->u2.policyDigest.t.buffer, 0, in SessionResetPolicyData()
674 session->u2.policyDigest.t.size); in SessionResetPolicyData()
DMarshal_PolicyGetDigest.c27 total_size += TPM2B_DIGEST_Marshal(&source->policyDigest, buffer, size); in PolicyGetDigest_Out_Marshal()
Dpart3.txt958 …4) policySession→policyDigest shall match the authPolicy associated with the…
2325 … set policySession→policyDigest to a Zero Digest (the digest size for policySession→policyDige…
9256 the PCR must match the policySession→policyDigest in a policy session. If the algorithm ID is
9903 …_SIZE size of authPolicy is not the size of a digest produced by policyDigest
10464 update the policySession→policyDigest in a policy session context in order to establish that the
10474 … policySession parameter indicates a trial policy session, then the policySession→policyDigest will
10482 NOTE 4 Policy context other than the policySession→policyDigest may be updated for a trial…
10532 policySession→policyDigest.
10534 …NOTE 4 policySession→policyDigest is the size of the digest produced by the hash algorith…
10535 to compute policyDigest.
[all …]
DGlobal.h349 TPM2B_DIGEST policyDigest; // policyHash member
DSessionProcess.c754 if(!Memory2BEqual(&session->u2.policyDigest.b, &authPolicy.b)) in CheckPolicyAuthSession()
/external/tpm2/generator/
Draw_commands.txt1496 4) policySession→policyDigest
3588 set policySession→policyDigest to a Zero Digest (the digest size for policySession→policyDigest is
16569 the PCR must match the policySession→policyDigest in a policy session. If the algorithm ID is
17633 policyDigest
17686 size of authPolicy is not the size of a digest produced by policyDigest
17755 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->policyDigest))
17762 gp.pcrPolicies.hashAlg[groupIndex] = in->policyDigest;
18665 update the policySession→policyDigest in a policy session context in order to establish that the
18676 … policySession parameter indicates a trial policy session, then the policySession→policyDigest will
18689 Policy context other than the policySession→policyDigest may be updated for a trial policy but it is
[all …]
Draw_commands_fixed.txt1496 4) policySession→policyDigest
3588 set policySession→policyDigest to a Zero Digest (the digest size for policySession→policyDigest is
16580 the PCR must match the policySession→policyDigest in a policy session. If the algorithm ID is
17697 size of authPolicy is not the size of a digest produced by policyDigest
17766 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->policyDigest))
17773 gp.pcrPolicies.hashAlg[groupIndex] = in->policyDigest;
18676 update the policySession→policyDigest in a policy session context in order to establish that the
18687 … policySession parameter indicates a trial policy session, then the policySession→policyDigest will
18700 Policy context other than the policySession→policyDigest may be updated for a trial policy but it is
18762 policySession→policyDigest.
[all …]
Dcommands.txt1864 _COMMENT if YES, the objectName will be included in the value in policySession→policyDigest
1966 _NAME policyDigest
1967 _COMMENT the current value of the policySession→policyDigest 25.19.3 1 2 3 4 5 6 7 8 9 10 11 12 13 …

12