Lines Matching refs:integrity
4715 After inPrivate.buffer is decrypted using the symmetric key of the parent, the integrity value shal…
4719 Checking the integrity before the data is used prevents attacks o n the sensitive area by fuzzing t…
4983 // when the object was imported. If they pass the integrity
5728 If the integrity checks succeed, credentialBlob is decrypted and returned as certInfo.
5861 credentialBlob fails integrity test
7197 and used to integrity check and decrypt inDuplicate. A new protection seed value is generated accor…
7198 to the methods appropriate for newParent and the blob is re-encrypted and a new integrity value is
7344 the integrity check of inDuplicate failed
7541 // Copy unwrapped data to temporary variable, remove the integrity field
7572 // Copy temporary variable to output, reserve the space for integrity
7667 If present, the integrity value of the blob is checked. The presence of the integrity value is indi…
7668 by a non-zero value for duplicate.data.integrity.size. The integrity of the private area is validat…
7669 the Name of objectPublic in the integrity HMAC computation. If either the outer layer or inner laye…
7670 encryption is performed, then the integrity value shall be present.
7672 If the inner or outer wrapper is present, then a valid integrity value shall be present or the TPM …
7688 parent is fixedTPM, then the new private blob is integrity protected by the TPM that “owns” the
7692 Before duplicate.buffer is decrypted using the symmetric key of the parent, the integrity value sha…
7694 After integrity checks and decryption, the TPM will create a new symmetrically encrypted private ar…
7698 Checking the integrity before the data is used prevents attacks on the sensitive area by fuzzing the
7715 The symmetric re-encryption is the normal integrity generation and symmetric encryption applied to
7775 This is provided so that the integrity value for duplicate
7783 Even if the integrity value of the object is not
7785 create the integrity value for the imported object.
7893 duplicate integrity is broken
12798 hash used for context integrity is used.
26986 integrity.
26989 If SHA384 is used in the computation of the integrity values for saved contexts, then the largest
27137 newAuth size is greater than that of integrity hash digest
27159 // the size of the digest produced by the integrity hash. The integrity
28682 The TPM shall encrypt and integrity protect the context as described in the "Context Protection" cl…
28864 integrity;
28894 // Compute the integrity size at the beginning of context blob
28895 integritySize = sizeof(integrity.t.size)
28989 // defined. In this implementation, the size is size of integrity
29031 // fingerprint plus the size of integrity
29134 // Reserve the integrity space
29146 // Compute integrity hash for the object
29149 ComputeContextIntegrity(&out->context, &integrity);
29150 // add integrity at the beginning of context blob
29152 TPM2B_DIGEST_Marshal(&integrity, &buffer, NULL);
29187 If the integrity HMAC of the saved context is not valid, the TPM shall return TPM_RC_INTEGRITY.
29299 context integrity check fail
29379 integrity;
29396 // Check integrity
29399 integritySize = sizeof(integrity.t.size)
29401 // Get integrity from context blob
29404 result = TPM2B_DIGEST_Unmarshal(&integrity, &buffer, &size);
29407 // Compute context integrity
29487 // Compare integrity
29488 if(!Memory2BEqual(&integrity.b, &ingerityToCompare.b))
29498 // Read the fingerprint value, skip the leading integrity size