/external/tpm2/ |
D | Ticket.c | 59 TPM2B_AUTH *proof; in TicketComputeVerified() local 65 proof = HierarchyGetProof(hierarchy); in TicketComputeVerified() 68 &proof->b, &hmacState); in TicketComputeVerified() 96 TPM2B_AUTH *proof; in TicketComputeAuth() local 99 proof = HierarchyGetProof(hierarchy); in TicketComputeAuth() 105 &proof->b, &hmacState); in TicketComputeAuth() 135 TPM2B_AUTH *proof; in TicketComputeHashCheck() local 138 proof = HierarchyGetProof(hierarchy); in TicketComputeHashCheck() 143 &proof->b, &hmacState); in TicketComputeHashCheck() 169 TPM2B_AUTH *proof; in TicketComputeCreation() local [all …]
|
D | Context_spt.c | 28 TPM2B_AUTH *proof = NULL; // the proof value to use. Is null for in ComputeContextProtectionKey() local 34 proof = HierarchyGetProof(contextBlob->hierarchy); in ComputeContextProtectionKey() 52 KDFa(CONTEXT_INTEGRITY_HASH_ALG, &proof->b, "CONTEXT", &sequence2B.b, in ComputeContextProtectionKey() 76 TPM2B_AUTH *proof; in ComputeContextIntegrity() local 79 proof = HierarchyGetProof(contextBlob->hierarchy); in ComputeContextIntegrity() 82 &proof->b, &hmacState); in ComputeContextIntegrity()
|
D | CryptUtil.c | 2818 TPM2B_AUTH *proof = NULL; 2831 proof = &gp.ehProof; 2848 (TPM2B *)proof); 2946 TPM2B_AUTH *proof = NULL; in CryptCreateObject() local 2956 proof = &gp.ehProof; in CryptCreateObject() 2968 (TPM2B *)proof); in CryptCreateObject()
|
D | part4.txt | 2549 556 TPM2B_AUTH nullProof; // The proof value associated with 6274 12 TPM2B_AUTH *proof = NULL; // the proof value to use. Is null for 6282 20 // Get proof value 6283 21 proof = HierarchyGetProof(contextBlob->hierarchy); 6310 42 KDFa(CONTEXT_INTEGRITY_HASH_ALG, &proof->b, "CONTEXT", &sequence2B.b, 6337 62 TPM2B_AUTH *proof; 6340 65 // Get proof value 6341 66 proof = HierarchyGetProof(contextBlob->hierarchy); 6345 70 &proof->b, &hmacState); 8904 …This function finds the proof value associated with a hierarchy.It returns a pointer to the proof … [all …]
|
D | part3.txt | 968 …NOTE 6 A policy session may require proof of knowledge of the authValue of the object b… 7484 …HMAC(proof, (TPM_ST_CREATION || objectHandle→Name || creationHash)) (… 8742 NOTE 1 A valid ticket may be used in subsequent commands to provide proof to the TPM that … 8937 proof that digest was created by the TPM 10636 … HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12) 10638 … proof secret associated with the storage primary seed (SPS) of the 13214 … HMAC(proof, (TPM_ST_VERIFIED || aHash || keySign→Name)) (34) 14662 …NOTE The proof values may be set from the RNG or derived from the associated new Prima… 15603 Hierarchy authValue, authPolicy, and proof values;
|
/external/curl/tests/data/ |
D | test22 | 16 This is the proof it works
|
D | test17 | 16 This is the proof it works
|
D | test56 | 17 This is the proof it works
|
/external/libvncserver/ |
D | AUTHORS | 18 original proof-of-concept. It really deserves to replace the old version,
|
/external/chromium-trace/catapult/tracing/third_party/css-element-queries/ |
D | README.md | 8 It's a proof-of-concept event-based CSS element dimension query with valid CSS selector syntax.
|
/external/llvm/docs/ |
D | BranchWeightMetadata.rst | 115 Branch Weight Metatada is not proof against CFG changes. If terminator operands'
|
/external/skia/experimental/c-api-example/ |
D | c.md | 109 The following proof-of-concept workflow currently works on MacOS and
|
/external/chromium-trace/catapult/third_party/webapp2/docs/ |
D | features.rst | 258 Future proof
|
/external/mesa3d/docs/ |
D | RELNOTES-5.1 | 122 basically just a proof of concept.
|
/external/eigen/unsupported/Eigen/ |
D | FFT | 168 Default=0, // goof proof
|
/external/tpm2/generator/ |
D | raw_structures.txt | 918 Table 83 — Values for proof Used in Tickets .......................................................… 8321 provides proof of knowledge of the authValue of the object with an HMAC authorization session or a 8364 …, authorization for operations that require ADMIN role may be given if the caller provides proof of 10823 HMACcontexAlg(proof, (ticketType || param { || param {…})) 10833 proof 10858 The proof value used for each hierarchy is shown in Table 83. 10859 Table 83 — Values for proof Used in Tickets 10862 proof 10907 the hierarchy of the proof value 10943 HMACcontextAlg(proof, (TPM_ST_CREATION || name || HnameAlg(TPMS_CREATION_DATA))) [all …]
|
D | raw_structures_fixed.txt | 918 Table 83 — Values for proof Used in Tickets .......................................................… 8338 provides proof of knowledge of the authValue of the object with an HMAC authorization session or a 8381 …, authorization for operations that require ADMIN role may be given if the caller provides proof of 10836 HMACcontexAlg(proof, (ticketType || param { || param {…})) 10846 proof 10871 The proof value used for each hierarchy is shown in Table 83. 10872 Table 83 — Values for proof Used in Tickets 10875 proof 10920 the hierarchy of the proof value 10956 HMACcontextAlg(proof, (TPM_ST_CREATION || name || HnameAlg(TPMS_CREATION_DATA))) [all …]
|
D | raw_commands.txt | 1525 authValue will not be required but proof of knowledge of the session secret is necessary. 1529 A policy session may require proof of knowledge of the authValue of the object being authorized. 13160 HMAC(proof, (TPM_ST_CREATION || objectHandle→Name || creationHash)) 15634 A valid ticket may be used in subsequent commands to provide proof to the TPM that the TPM has 16001 proof that digest was created by the TPM 18933 HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12) 18936 proof 23810 HMAC(proof, (TPM_ST_VERIFIED || aHash || keySign→Name)) 26453 The proof values may be set from the RNG or derived from the associated new Primary Seed. If 28102 Hierarchy authValue, authPolicy, and proof values;
|
D | raw_commands_fixed.txt | 1525 authValue will not be required but proof of knowledge of the session secret is necessary. 1529 A policy session may require proof of knowledge of the authValue of the object being authorized. 13171 HMAC(proof, (TPM_ST_CREATION || objectHandle→Name || creationHash)) 15645 A valid ticket may be used in subsequent commands to provide proof to the TPM that the TPM has 16014 proof that digest was created by the TPM 18944 HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12) 18947 proof 23821 HMAC(proof, (TPM_ST_VERIFIED || aHash || keySign→Name)) 26464 The proof values may be set from the RNG or derived from the associated new Primary Seed. If 28113 Hierarchy authValue, authPolicy, and proof values;
|
D | commands.txt | 1287 _COMMENT proof that digest was created by the TPM If keyHandle is not a restricted signing key, the…
|
/external/bison/data/m4sugar/ |
D | foreach.m4 | 53 # are not future-proof. Thus, this file is conditionally included as
|
/external/libpng/ |
D | CMakeLists.txt | 710 elseif(CMAKE_MAJOR_VERSION GREATER 2) # future proof
|
/external/libmicrohttpd/src/datadir/ |
D | spdy-draft.txt | 1357 certificate as well as proof that the client posesses the 1407 Proof: Cryptographic proof that the client has possession of the 1417 SPDY certificate proof" using the empty string as context. ForRSA
|
/external/icu/icu4j/demos/src/com/ibm/icu/dev/demo/translit/resources/ |
D | Transliterator_Kanji_English.txt | 5079 證>'[proof]';
|
/external/elfutils/src/ |
D | ChangeLog | 1480 * strip.c (relocate): Make offset check overflow-proof.
|