Lines Matching refs:cpHash
1843 134 unsigned iscpHashDefined : 1;//4) SET if the cpHash has been defi…
1937 209 TPM2B_DIGEST cpHash; // the required cpHash value for the
1940 212 } u1; // 'boundEntity' and 'cpHash' may
2588 595 // TPM will extend the cpHash and rpHash for the command to this value. If this
2589 596 // digest was the Zero Digest before the cpHash was extended, the audit counter
2713 The cpHash for an audit session
2717 The cpHash for command audit
4232 This function computes the cpHash as defined in Part 2 and described in Part 1.
4242 383 TPM2B_DIGEST *cpHash, // OUT: cpHash
4256 391 // cpHash = hash(commandCode [ || authName1
4260 395 // A cpHash can contain just a commandCode only if the lone session is
4263 398 // Start cpHash.
4264 399 cpHash->t.size = CryptStartHash(hashAlg, &hashState);
4280 415 CryptCompleteHash2B(&hashState, &cpHash->b);
4351 462 TPM2B_DIGEST *cpHash, // IN: cpHash
4449 554 // Add cpHash
4450 555 CryptUpdateDigest2B(&hmacState, &cpHash->b);
4500 585 TPM2B_DIGEST *cpHash // IN: cpHash of the command
4506 591 ComputeCommandHMAC(sessionIndex, cpHash, &hmac);
4533 d) compare cpHash if applicable; and
4553 607 TPM2B_DIGEST *cpHash, // IN: cpHash using the algorithm of this
4662 711 // Compare cpHash/nameHash if defined, or if the command requires an ADMIN or
4669 713 if(session->u1.cpHash.b.size != 0)
4673 717 // Compare cpHash.
4674 718 if(!Memory2BEqual(&session->u1.cpHash.b, &cpHash->b))
4680 724 // When cpHash is not defined, nameHash is placed in its space.
4681 725 if(!Memory2BEqual(&session->u1.cpHash.b, &nameHash->b))
5004 979 TPM2B_DIGEST *cpHash, // IN: cpHash
5075 1044 cpHash, nameHash);
5104 1068 return CheckSessionHMAC(sessionIndex, cpHash);
5188 1123 TPM2B_DIGEST cpHash;
5191 1126 // cpHash
5199 1134 cpHash.t.size = 0;
5261 1191 // If the current cpHash is the right one, don't re-compute.
5267 1197 &cpHash, &nameHash);
5269 1199 // If this session is for auditing, save the cpHash.
5271 1201 s_cpHashForAudit = cpHash;
5278 1208 &cpHash, &nameHash);
5298 1223 result = CheckSessionHMAC(sessionIndex, &cpHash);
5501 1373 // auditDigestnew := hash (auditDigestold || cpHash || rpHash)
5509 1381 // Add cpHash and rpHash.
5574 1434 // auditDigestnew := hash (auditDigestold || cpHash || rpHash)
5582 1442 // Add cpHash
6469 45 // If the cpHash is present, then check it
6472 48 // The cpHash input has to have the correct size
6476 52 // If the cpHash has already been set, then this input value
6478 54 if( session->u1.cpHash.b.size != 0
6479 55 && !Memory2BEqual(&cpHashA->b, &session->u1.cpHash.b))
6489 it. This will also update the cpHash if it is present.
6496 65 TPM2B_DIGEST *cpHash, // IN: the cpHash (optional)
6541 105 // Deal with the cpHash. If the cpHash value is present
6545 109 if(cpHash != NULL && cpHash->t.size != 0)
6547 111 session->u1.cpHash = *cpHash;
14941 576 // The cpHash size to zero
14942 577 session->u1.cpHash.b.size = 0;
23837 90 // Adding cpHash