Home | History | Annotate | Download | only in generator

Lines Matching full:policydigest

1517 4) policySession?policyDigest
3640 set policySession?policyDigest to a Zero Digest (the digest size for policySession?policyDigest is
16793 the PCR must match the policySession?policyDigest in a policy session. If the algorithm ID is
17871 policyDigest
17925 size of authPolicy is not the size of a digest produced by policyDigest
17994 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->policyDigest))
18001 gp.pcrPolicies.hashAlg[groupIndex] = in->policyDigest;
18918 update the policySession?policyDigest in a policy session context in order to establish that the
18929 If the policySession parameter indicates a trial policy session, then the policySession?policyDigest will
18942 Policy context other than the policySession?policyDigest may be updated for a trial policy but it is
19005 policySession?policyDigest.
19027 PolicySession?policyDigest is the size of the digest produced by the hash algorithm used to
19028 compute policyDigest.
19041 25.2.3 PolicyDigest Update Function (PolicyUpdate())
19042 This is the update process for policySession?policyDigest used by TPM2_PolicySigned(),
19060 These parameters are used to update policySession?policyDigest by
19109 policySession?policyDigest, the following rules apply.
19166 Both TPM2_PolicyAuthValue() and TPM2_PolicyPassword() change policySession?policyDigest in
19268 by including the Name of the signing key in the policyDigest
19270 policySession?policyDigest as described in 25.2.3 as if a properly signed authorization was received; but
19329 return TPM_RC_POLICY_FAIL and make no change to policySession?policyDigest.
19345 When all validations have succeeded, policySession?policyDigest is updated by PolicyUpdate() (see
19903 When all validations have succeeded, policySession?policyDigest is updated by PolicyUpdate() (see
19912 If the session is a trial session, policySession?policyDigest is updated as if the authorization is valid but
20638 PolicySession?policyDigest is compared against the list of provided values. If the current
20639 policySession?policyDigest does not match any value in the list, the TPM shall return TPM_RC_VALUE.
20640 Otherwise, it will replace policySession?policyDigest with the digest of the concatenation of all of the
20642 If policySession is a trial session, the TPM will assume that policySession?policyDigest matches one of
20643 the list entries and compute the new value of policyDigest.
20644 The algorithm for computing the new value for policyDigest of policySession is:
20655 b) Reset policyDigest to a Zero Digest.
20819 no digest in pHashList matched the current value of policyDigest for
20844 || (Memory2BEqual(&session->u2.policyDigest.b,
20854 session->u2.policyDigest.t.size = CryptStartHash(session->authHashAlg,
20856 // Set policyDigest to 0 string and add it to hash
20857 MemorySet(session->u2.policyDigest.t.buffer, 0,
20858 session->u2.policyDigest.t.size);
20859 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
20865 // Extend policyDigest
20869 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
20873 // None of the values in the list matched the current policyDigest
20914 in a different state. If this command is used for a trial policySession, policySession?policyDigest will be
20921 and make no change to policySession?policyDigest. If the values match, or if the length of pcrDigest is
20922 zero, then policySession?policyDigest is extended by:
21194 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
21242 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
21280 If no error occurred in the validation of locality, policySession?policyDigest is extended with
21575 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
21581 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
21610 If policySession is a trial policy session, the TPM will update policySession?policyDigest as shown in
21623 the check fails, the TPM shall return TPM_RC_POLICY and not change policySession?policyDigest. If
21649 The value of args and the Name of the NV Index are extended to policySession?policyDigest by
22194 // Update policyDigest
22198 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
22207 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
22232 If policySession is a trial policy session, the TPM will update policySession?policyDigest as shown in
22237 policySession?policyDigest. If the check succeeds, the TPM will hash the arguments:
22263 The value of args is extended to policySession?policyDigest by
22755 // update policyDigest
22759 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
22765 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
22793 If the TPM does not return an error, it will update policySession?policyDigest by
23004 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
23010 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
23038 required when the policy is used for authorization. Additionally, policySession?policyDigest is extended
23192 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
23196 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
23224 included in policySession?policyDigest. TPM2_PolicyCommandCode() allows the policy to be bound to a
23229 TPM_RC_VALUE. If cpHashA does not have the size of the policySession?policyDigest, the TPM shall
23232 policySession?policyDigest is updated with
23441 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
23447 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
23503 is not the size of policySession?policyDigest, the TPM shall return TPM_RC_SIZE. Otherwise,
23528 The policySession?policyDigest will be updated with
23731 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
23737 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
23799 The policySession?policyDigest will be updated according to the setting of includeObject. If equal to
23800 YES, policySession?policyDigest is updated by:
23807 If includeObject is NO, policySession?policyDigest is updated by:
23817 policySession?policyDigest. This means that, when TPM2_PolicyDuplicationSelect() is executed, it
23824 approve a policyDigest that allowed duplication to a specific new parent. The authorizing entity may
23826 the new parent. In that case, the authorizing entity would approve the policyDigest of equation (31).
23891 policySession?policyDigest
24033 // Old policyDigest size should be the same as the new policyDigest size since
24035 session->u2.policyDigest.t.size
24038 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
24082 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
24133 The TPM validates that the approvedPolicy matches the current value of policySession?policyDigest and
24136 generate the ticket. If so, the TPM will reset policySession?policyDigest to a Zero Digest. Then it will
24137 create a TPM2B_NAME (keyName) using keySign and update policySession?policyDigest with
24145 If policySession is a trial session, policySession?policyDigest is extended as if the ticket is valid without
24329 the current policyDigest of policySession does not match
24373 // policyDigest in policy session
24374 if(!Memory2BEqual(&session->u2.policyDigest.b,
24439 // Set policyDigest to zero digest
24440 MemorySet(session->u2.policyDigest.t.buffer, 0,
24441 session->u2.policyDigest.t.size);
24442 // Update policyDigest
24477 If successful, policySession?policyDigest will be updated with
24637 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
24641 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
24678 If successful, policySession?policyDigest will be updated with
24845 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
24849 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
24875 This command returns the current policyDigest of the session. This command allows the TPM to be used
24947 policyDigest
24952 the current value of the policySession?policyDigest
25011 out->policyDigest = session->u2.policyDigest;
25041 If the TPM does not return and error, it will update policySession?policyDigest by
25251 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
25257 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);