Lines Matching refs:secret
1520 associated with the handle and/or the session secret (TPM_RC_AUTH_FAIL or
1525 authValue will not be required but proof of knowledge of the session secret is necessary.
3497 This command allows injection of a secret into the TPM using either asymmetric or symmetric encrypt…
3498 The type of tpmKey determines how the value in encryptedSalt is encrypted. The decrypted secret val…
3505 recovery of the secret value.
3506 The TPM generates the sessionKey from the recovered secret value.
3578 produce the final secret value. The size of the secret value is an input parameter to the KDF
3847 secret size does not match decrypt key type; or the recovered secret
3888 // secret size cannot be 0
3978 // secret size must be 0
5721 The key associated with keyHandle is used to recover a seed from secret, which is the encrypted see…
5791 secret
5853 secret is invalid (when keyHandle is an ECC key)
5857 secret is invalid (when keyHandle is an ECC key)
5865 secret is invalid (when keyHandle is an ECC key)
5869 secret size is invalid or the credentialBlob does not unmarshal
5918 secret is invalid (when keyHandle is an RSA key)
5965 "IDENTITY", &in->secret, &data);
6001 // Retrieve secret data. A TPM_RC_INTEGRITY error or unmarshal
6121 secret
6248 // Make encrypt key and its associated secret structure.
6250 out->secret.t.size = sizeof(out->secret.t.secret);
6251 result = CryptSecretEncrypt(in->handle, "IDENTITY", &data, &out->secret);
6254 // Prepare output credential data from secret
6461 This command is used to change the authorization secret for a TPM-resident object.
7151 // Make encrypt key and its associated secret structure. A TPM_RC_KEY
7153 out->outSymSeed.t.size = sizeof(out->outSymSeed.t.secret);
7449 // Decrypt input secret data via asymmetric decryption. A
7564 // Make new encrypt key and its associated secret structure. A
7567 out->outSymSeed.t.size = sizeof(out->outSymSeed.t.secret);
7888 secret; or unmarshaling sensitive value from duplicate failed the
8088 // Decrypt input secret data via asymmetric decryption. TPM_RC_ATTRIBUTES,
8994 ephemeral key and a loaded public key (QS) to compute the shared secret value (P ≔ [hde]QS).
18949 secret associated with the storage primary seed (SPS) of the
19634 This command includes a secret-based authorization to a policy. The caller proves knowledge of the
19635 secret value using an authorization session using the authValue associated with authHandle. A
19640 The secret is the authValue of authObject, which may be any TPM entity with a handle and an associa…
26978 This command allows the authorization secret for a hierarchy or lockout to be changed using the cur…
35052 This command allows the authorization secret for an NV Index to be changed.
35053 If successful, the authorization secret (authValue) of the NV Index associated with nvIndex is chan…