Lines Matching refs:HMAC
236 Hash/HMAC/Event Sequences .........................................................................…
1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or,
1324 If the HMAC and policy session contexts use the same memory, the type of the context must
1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or
1407 An HMAC or password is required in a policy
1464 if the authorization is an HMAC session or a password;
1519 7) if the authorization uses an HMAC, then the HMAC is properly constructed using the authValue
1699 appropriate, generate an HMAC.
2005 If use of a handle requires authorization, the Password, HMAC, or Policy session associated with the
3705 indicates the type of the session; simple HMAC or policy
3965 // HMAC session input handle check.
4883 HMAC on inPrivate was not valid
5137 an object with no Name is computed, no Name value is included in the HMAC. To ensure that these
5724 the HMAC key.
5725 The HMAC is used to validate that the credentialBlob is associated with activateHandle and that the…
5727 achieved by including the Name in the HMAC calculation.
6465 Therefore, the old authValue (of the TPM-resident object) is used when generating the response HMAC
7196 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
7641 creation of the HMAC key and encryption keys used to protect the duplication blob. When recovering
7669 the Name of objectPublic in the integrity HMAC computation. If either the outer layer or inner laye…
7677 area other than that the Name of the public area is included in the HMAC. However, if the binding is
9965 decryption as well as hash and HMAC. All of the commands in this group are stateless. That is, they…
9967 For hashing, HMAC, and Events that require large blocks of data with retained state, the sequence
10668 This command performs an HMAC on the supplied data using the indicated hash algorithm.
10674 hash algorithm for the HMAC and the TPM shall return TPM_RC_VALUE if hashAlg is not
10679 If the key referenced by handle is not restricted, then the TPM will use hashAlg for the HMAC. Howe…
10727 HMAC key
10735 HMAC data
10741 algorithm to use for HMAC
10771 the returned HMAC in a sized buffer
10796 key referenced by handle is not an HMAC key
10879 // Get HMAC key object and public area pointers
10882 // Make sure that the key is an HMAC signing key
10933 // Start HMAC stack
10937 // Adding HMAC data
10939 // Complete HMAC
11256 Hash/HMAC/Event Sequences
11263 maintained. For a description of sequences, see “Hash, HMAC, and Event Sequences” in Part 1.
11269 This command starts an HMAC sequence. The TPM will create and initialize an HMAC sequence
11281 hash algorithm for the HMAC and the TPM shall return TPM_RC_VALUE if hashAlg is not
11283 If the key referenced by handle is not restricted, then the TPM will use hashAlg for the HMAC; unle…
11369 A hash algorithm is required for the HMAC.
11419 handle of an HMAC key
11433 the hash algorithm to use for the HMAC
11492 key referenced by handle is not an HMAC key
11570 // Get HMAC key object and public area pointers
11573 // Make sure that the key is an HMAC signing key
11621 // Create a HMAC sequence object. A TPM_RC_OBJECT_MEMORY error may be
11814 This command is used to add data to a hash or HMAC sequence. The amount of data in buffer may be
11977 sequenceHandle does not reference a hash or HMAC sequence
12018 // Update hash/HMAC sequence object
12032 // Update sequence object hash/HMAC stack
12065 // Update sequence object hash/HMAC stack
12090 This command adds the last part of data, if any, to a hash/HMAC sequence and returns the result.
12159 data to be added to the hash/HMAC
12192 the returned HMAC or digest in a sized buffer
12201 This is a NULL Ticket when the session is HMAC.
12279 sequenceHandle does not reference a hash or HMAC sequence
12302 // input handle must be a hash or HMAC sequence object.
12411 // Complete hash/HMAC
12416 // No ticket is generated for HMAC sequence
12449 If sequenceHandle references a hash or HMAC sequence, the TPM shall return TPM_RC_MODE.
13171 HMAC(proof, (TPM_ST_CREATION || objectHandle→Name || creationHash))
15653 signature (the HMAC).
15927 Symmetric “signing” is done with an HMAC.
18923 (HMAC or clear text). Both commands could be in the same policy. The final instance of these
18944 HMAC(proof, HpolicyAlg(ticketType || timeout || cpHashA || policyRef || authObject→Name)) (12)
19636 password session, an HMAC session, or a policy session containing TPM2_PolicyAuthValue() or
19663 If an HMAC is used to convey the authorization, a separate session is needed for the authorization.
19664 Because the HMAC in that authorization will include a nonce that prevents replay of the
23821 HMAC(proof, (TPM_ST_VERIFIED || aHash || keySign→Name))
24165 the authValue will be included in hmacKey when the authorization HMAC is computed for this session.
24170 use sessionKey. If sessionKey is not present, then the hmacKey is an Empty Buffer and no HMAC
24369 HMAC.
24379 done using either an HMAC or a password with no change to the authPolicy of the object. The
24381 will contain an HMAC or a password value.
26466 computation shall use the SPS as an HMAC key and the derived value may then be a parameter
26467 in a second HMAC in which the EPS is the HMAC key. The reference design uses values from
26500 If this command is authorized using lockoutAuth, the HMAC in the response shall use the new
26501 lockoutAuth value (that is, the Empty Buffer) when computing response HMAC.
27215 HMAC authorization fails. When the counter reaches a predefined value, the TPM will not accept, for
27632 asserted for either an HMAC or a Policy authorization.
29187 If the integrity HMAC of the saved context is not valid, the TPM shall return TPM_RC_INTEGRITY.
31037 the TPM return a list of loaded HMAC sessions without including the policy sessions.
35065 Since the NV Index authorization is changed before the response HMAC is calculated, the newAuth val…
35066 is used when generating the response HMAC key if required. See Part 4 ComputeResponseHMAC().