• Home
  • Raw
  • Download

Lines Matching refs:policyRef

18944 HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12)
18994 policyRef
18996 the commands that use this function have a policyRef parameter
19028 and policyRef. The digest is computed as:
19030 aHash ≔ HauthAlg(nonceTPM || expiration || cpHashA || policyRef)
19065 policyRef
19100 PolicyUpdate(TPM_CC_PolicySigned, authObject→Name, policyRef)
19176 policyRef
19478 aHash := hash ( nonceTPM | expiration | cpHashA | policyRef)
19506 policyRef
19520 // add policyRef
19521 CryptUpdateDigest2B(&hashState, &in->policyRef.b);
19533 // Update policy with input policyRef and name of auth key
19535 PolicyContextUpdate(TPM_CC_PolicySigned, &entityName, &in->policyRef,
19600 authTimeout, &in->cpHashA, &in->policyRef, &entityName,
19653 PolicyUpdate(TPM_CC_PolicySecret, authObject→Name, policyRef)
19741 policyRef
19928 // Update policy context with input policyRef and name of auth key
19930 PolicyContextUpdate(TPM_CC_PolicySecret, &entityName, &in->policyRef,
20005 authTimeout, &in->cpHashA, &in->policyRef,
20042 If the checks succeed, the TPM uses the timeout, cpHashA, policyRef, and keyName to construct a tic…
20046 PolicyUpdate(commandCode, authName, policyRef)
20119 policyRef
20296 &in->policyRef, &in->authName, &ticketToCompare);
20350 PolicyContextUpdate(commandCode, &in->authName, &in->policyRef,
23813 aHash ≔ HaHashAlg(approvedPolicy || policyRef)
23840 PolicyUpdate(TPM_CC_PolicyAuthorize, keyName, policyRef)
23905 policyRef
23919 ticket validating that approvedPolicy and policyRef were
24077 // aHash := hash(approvedPolicy || policyRef).
24124 // add policyRef
24125 CryptUpdateDigest2B(&hashState, &in->policyRef.b);
24140 PolicyContextUpdate(TPM_CC_PolicyAuthorize, &in->keySign, &in->policyRef,