Lines Matching refs:cases
1413 In some cases, the allowed values are numeric values with no associated mnemonic. In such a case, t…
1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only
2141 cases, the subsequent structure is self-defining. If the size precedes a parameter that is not an o…
2266 In some cases, additional qualifying characters will follow the underscore. These are generally use…
2408 In many cases, the table contains no specific response code value and the return code will be deter…
5818 algorithm ID. In cases where an algorithm ID is not a meaningful way to designate the structure, the
6029 a) TPM Reset – Two cases:
7879 Each algorithm has a fundamental attribute: asymmetric, symmetric, or hash. In some cases (e.g.,
9816 In most cases, either platformAuth or ownerAuth may be used to authorize the commands used for
12647 those cases when different symmetric algorithms may be selected.
14932 A TPM2B_PRIVATE area may be encrypted by different symmetric algorithms or, in some cases, not
15131 and two integrity values. In some cases, the sensitive data is not encrypted and the integrity valu…