Lines Matching refs:policyRef
18933 HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12)
18983 policyRef
18985 the commands that use this function have a policyRef parameter
19017 and policyRef. The digest is computed as:
19019 aHash ≔ HauthAlg(nonceTPM || expiration || cpHashA || policyRef)
19054 policyRef
19089 PolicyUpdate(TPM_CC_PolicySigned, authObject→Name, policyRef)
19163 policyRef
19467 aHash := hash ( nonceTPM | expiration | cpHashA | policyRef)
19495 policyRef
19509 // add policyRef
19510 CryptUpdateDigest2B(&hashState, &in->policyRef.b);
19522 // Update policy with input policyRef and name of auth key
19524 PolicyContextUpdate(TPM_CC_PolicySigned, &entityName, &in->policyRef,
19589 authTimeout, &in->cpHashA, &in->policyRef, &entityName,
19642 PolicyUpdate(TPM_CC_PolicySecret, authObject→Name, policyRef)
19728 policyRef
19917 // Update policy context with input policyRef and name of auth key
19919 PolicyContextUpdate(TPM_CC_PolicySecret, &entityName, &in->policyRef,
19994 authTimeout, &in->cpHashA, &in->policyRef,
20031 If the checks succeed, the TPM uses the timeout, cpHashA, policyRef, and keyName to construct a tic…
20035 PolicyUpdate(commandCode, authName, policyRef)
20108 policyRef
20285 &in->policyRef, &in->authName, &ticketToCompare);
20339 PolicyContextUpdate(commandCode, &in->authName, &in->policyRef,
23802 aHash ≔ HaHashAlg(approvedPolicy || policyRef)
23829 PolicyUpdate(TPM_CC_PolicyAuthorize, keyName, policyRef)
23894 policyRef
23908 ticket validating that approvedPolicy and policyRef were
24066 // aHash := hash(approvedPolicy || policyRef).
24113 // add policyRef
24114 CryptUpdateDigest2B(&hashState, &in->policyRef.b);
24129 PolicyContextUpdate(TPM_CC_PolicyAuthorize, &in->keySign, &in->policyRef,