HomeSort by relevance Sort by last modified time
    Searched refs:authPolicy (Results 1 - 17 of 17) sorted by null

  /external/tpm2/
SetPrimaryPolicy.c 14 // TPM_RC_SIZE size of input authPolicy is not consistent with input hash algorithm
25 // Check the authPolicy consistent with hash algorithm. If the policy size is
27 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg))
45 gp.ownerPolicy = in->authPolicy;
51 gp.endorsementPolicy = in->authPolicy;
57 gc.platformPolicy = in->authPolicy;
63 gp.lockoutPolicy = in->authPolicy;
PCR_SetAuthPolicy.c 14 // TPM_RC_SIZE size of authPolicy is not the size of a digest produced by policyDigest
34 // Check the authPolicy consistent with hash algorithm
35 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg))
46 gp.pcrPolicies.policy[groupIndex] = in->authPolicy;
Entity_fp.h 12 TPM2B_DIGEST *authPolicy // OUT: authPolicy of the entity
PCR_SetAuthPolicy_fp.h 14 TPM2B_DIGEST authPolicy;
SetPrimaryPolicy_fp.h 14 TPM2B_DIGEST authPolicy;
Entity.c 239 // This function is used to access the authPolicy associated with a handle. This function assumes that the
241 // EntityGetLoadStatus() should have been called. Also, the accessibility of the authPolicy should have
243 // This function copies the authorization policy of the entity to authPolicy.
249 TPM2B_DIGEST *authPolicy // OUT: authPolicy of the entity
261 *authPolicy = gp.ownerPolicy;
266 *authPolicy = gp.endorsementPolicy;
271 *authPolicy = gc.platformPolicy;
276 *authPolicy = gp.lockoutPolicy;
287 // authPolicy for an objec
    [all...]
LoadExternal.c 26 // TPM_RC_SIZE authPolicy is not zero and is not the size of a digest produced by the
47 // the size of authPolicy is either 0 or the digest size of nameAlg
48 if(in->inPublic.t.publicArea.authPolicy.t.size != 0
49 && in->inPublic.t.publicArea.authPolicy.t.size !=
Marshal_PCR_SetAuthPolicy.c 19 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size);
Marshal_SetPrimaryPolicy.c 18 result = TPM2B_DIGEST_Unmarshal(&target->authPolicy, buffer, size);
NV_DefineSpace.c 19 // TPM_RC_SIZE 'auth->size' or 'publicInfo->authPolicy.size' is larger than the digest
56 // check that the authPolicy consistent with hash algorithm
57 if( in->publicInfo.t.nvPublic.authPolicy.t.size != 0
58 && in->publicInfo.t.nvPublic.authPolicy.t.size != nameSize)
SessionProcess.c 355 // This function indicates if an authPolicy is available and allowed.
361 // TRUE authPolicy is available
362 // FALSE authPolicy is not available
421 if(nvIndex.publicArea.authPolicy.t.size != 0)
705 // a) compare policyDigest in session with authPolicy associated with the entity to be authorized;
736 TPM2B_DIGEST authPolicy;
750 // Get authPolicy.
752 &authPolicy);
753 // Compare authPolicy.
754 if(!Memory2BEqual(&session->u2.policyDigest.b, &authPolicy.b)
    [all...]
Object.c 420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy);
Object_spt.c 518 // TPM_RC_SIZE authPolicy size does not match digest size of the name algorithm in
538 // Check authPolicy digest consistency
539 if( publicArea->authPolicy.t.size != 0
540 && ( publicArea->authPolicy.t.size
    [all...]
tpm_types.h     [all...]
tpm_generated.c     [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2NVStorage.c 252 NvPublic->nvPublic.authPolicy.size = SwapBytes16 (NvPublic->nvPublic.authPolicy.size);
253 Buffer = (UINT8 *)&NvPublic->nvPublic.authPolicy;
254 Buffer += sizeof(UINT16) + NvPublic->nvPublic.authPolicy.size;
334 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NvPublic->nvPublic.authPolicy.size));
336 CopyMem (Buffer, NvPublic->nvPublic.authPolicy.buffer, NvPublic->nvPublic.authPolicy.size);
337 Buffer += NvPublic->nvPublic.authPolicy.size;
    [all...]
  /device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/
Tpm20.h     [all...]

Completed in 366 milliseconds