• Home
  • Raw
  • Download

Lines Matching refs:authorization

3330 Any command with an authorization value may cause an NV write
3331 on an authorization failure but the command does not complete
4321 authorization-session nonce associated with the command.
4345 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4346 command and will not close the authorization sessions used by the command. Audit digests will not be
4349 failure due to an authorization failure may update the dictionary-attack protection values.
4755 authorization handle is not correct for command
4761 command requires an authorization session for
4879 use of an authorization session with a context
4904 NV access authorization fails in command actions
5085 the authorization HMAC check failed and DA
5098 authorization requires assertion of PP
5385 the 1 authorization session handle references a
5392 the 2 authorization session handle references a
5399 the 3 authorization session handle references a
5406 the 4th authorization session handle references a
5470 the 7 authorization session handle references a
5938 when the response has authorization sessions.
6125 not for command authorization.
6403 PT_FIXED + 16 the minimum number of authorization sessions that can
6431 PT_FIXED + 17 the number of authorization sessions that may be active at
6654 the number of authorization sessions currently loaded into
6661 the number of additional authorization sessions, of any
6664 least one authorization session of any type may be
6677 than one authorization session would fit into RAM.
6679 the number of active authorization sessions currently
6700 the number of additional authorization sessions, of any
6703 least one authorization session of any type may be
6713 than one authorization session could be created.
6798 the number of authorization failures before DA lockout is
7034 controlled by an authorization value
7035 This property is only present if the TPM supports authorization
7270 Handles may refer to objects (keys or data blobs), authorization sessions (HMAC and policy), NV
7321 authorization sessions.
7336 This type references saved authorization session contexts for which
7427 authorization handles, and special handles.
7527 authorization value
7528 authorization session
7536 references the authorization associated with the dictionary
7602 A – an authorization value
7937 This attribute structure indicates an object’s use, its authorization types, and it relationship to…
8320 If SET, authorization for operations that require USER role authorization may be given if the caller
8321 provides proof of knowledge of the authValue of the object with an HMAC authorization session or a
8364 If CLEAR, authorization for operations that require ADMIN role may be given if the caller provides …
8365 knowledge of the authValue of the object with an HMAC authorization session or a password.
8370 Regardless of the setting of this attribute, operations that require ADMIN role authorization may be
8407 If SET, then authorization failures for the object do not affect the dictionary attack protection l…
8408 authorization of the object is not blocked if the TPM is in lockout.
8689 This attribute has no meaning for a password authorization and the TPM will allow
8736 For a password authorization, this attribute will be CLEAR in both the command and
8741 for authorization.
8775 For a password authorization, this attribute will be CLEAR in both the command and
8780 for authorization.
8788 used for authorization, encryption, or decryption. The encrypted and encrypt fields
8938 SET (1): The TPM is in lockout and commands that require authorization with other
8983 platformPolicy may be used for authorization.
8994 may be used for authorization.
9092 authorization
9113 SET (1): indicates that the RAM memory used for authorization session
9115 CLEAR (0): indicates that the memory used for authorization sessions is not
9531 handle refers to an authorization session.
9539 range of HMAC authorization session handles
9543 range of policy authorization session handles
9547 a password authorization
9557 This interface type is used for an authorization handle when the authorization session uses an HMAC.
9565 range of HMAC authorization session handles
9583 range of policy authorization session handles
9843 This interface type is used to identify the source of the authorization for access to an NV locatio…
9844 handle value of a TPMI_RH_NV_AUTH shall indicate that the authorization value is either platformAut…
10441 This structure is used for an authorization value and limits an authValue to being no larger than t…
10589 This TPM-dependent structure is used to provide the timeout value for an authorization.
10635 The Name of an entity is used in place of the handle in authorization computations. The substitution
11094 This ticket is produced by TPM2_PolicySigned() and TPM2_PolicySecret() when the authorization has an
11119 implementation-specific value indicating when the authorization expires
11131 Name of the key that signed the authorization
11569 digest of PCR for the authorization. The structure is used in TPM2_PCR_Read() command to indicate t…
14877 Shall be the Empty Buffer if no authorization policy is present.
15063 user authorization data
15275 use the digest of the public area of the Index as the Name of the entity in authorization computati…
15372 platformAuth or ownerAuth can be provided in any type of authorization session or as a password.
15468 TPM2_NV_ChangeAuth() always requires that authorization be
15509 authorization.
15616 and authorization of the Index is not blocked when the TPM is in
15619 authorization failure counter and authorizations of this Index are not
15659 CLEAR (0): Reads of the Index are allowed if proper authorization is
16358 the maximum number of authorization sessions that may be in a
16361 two authorization handles.
17564 have individual authorization