OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:authPolicy
(Results
1 - 17
of
17
) sorted by null
/external/tpm2/
SetPrimaryPolicy.c
14
// TPM_RC_SIZE size of input
authPolicy
is not consistent with input hash algorithm
25
// Check the
authPolicy
consistent with hash algorithm. If the policy size is
27
if(in->
authPolicy
.t.size != CryptGetHashDigestSize(in->hashAlg))
45
gp.ownerPolicy = in->
authPolicy
;
51
gp.endorsementPolicy = in->
authPolicy
;
57
gc.platformPolicy = in->
authPolicy
;
63
gp.lockoutPolicy = in->
authPolicy
;
PCR_SetAuthPolicy.c
14
// TPM_RC_SIZE size of
authPolicy
is not the size of a digest produced by policyDigest
34
// Check the
authPolicy
consistent with hash algorithm
35
if(in->
authPolicy
.t.size != CryptGetHashDigestSize(in->hashAlg))
46
gp.pcrPolicies.policy[groupIndex] = in->
authPolicy
;
Entity_fp.h
12
TPM2B_DIGEST *
authPolicy
// OUT:
authPolicy
of the entity
PCR_SetAuthPolicy_fp.h
14
TPM2B_DIGEST
authPolicy
;
SetPrimaryPolicy_fp.h
14
TPM2B_DIGEST
authPolicy
;
Entity.c
239
// This function is used to access the
authPolicy
associated with a handle. This function assumes that the
241
// EntityGetLoadStatus() should have been called. Also, the accessibility of the
authPolicy
should have
243
// This function copies the authorization policy of the entity to
authPolicy
.
249
TPM2B_DIGEST *
authPolicy
// OUT:
authPolicy
of the entity
261
*
authPolicy
= gp.ownerPolicy;
266
*
authPolicy
= gp.endorsementPolicy;
271
*
authPolicy
= gc.platformPolicy;
276
*
authPolicy
= gp.lockoutPolicy;
287
//
authPolicy
for an objec
[
all
...]
LoadExternal.c
26
// TPM_RC_SIZE
authPolicy
is not zero and is not the size of a digest produced by the
47
// the size of
authPolicy
is either 0 or the digest size of nameAlg
48
if(in->inPublic.t.publicArea.
authPolicy
.t.size != 0
49
&& in->inPublic.t.publicArea.
authPolicy
.t.size !=
Marshal_PCR_SetAuthPolicy.c
19
result = TPM2B_DIGEST_Unmarshal(&target->
authPolicy
, buffer, size);
Marshal_SetPrimaryPolicy.c
18
result = TPM2B_DIGEST_Unmarshal(&target->
authPolicy
, buffer, size);
NV_DefineSpace.c
19
// TPM_RC_SIZE 'auth->size' or 'publicInfo->
authPolicy
.size' is larger than the digest
56
// check that the
authPolicy
consistent with hash algorithm
57
if( in->publicInfo.t.nvPublic.
authPolicy
.t.size != 0
58
&& in->publicInfo.t.nvPublic.
authPolicy
.t.size != nameSize)
SessionProcess.c
355
// This function indicates if an
authPolicy
is available and allowed.
361
// TRUE
authPolicy
is available
362
// FALSE
authPolicy
is not available
421
if(nvIndex.publicArea.
authPolicy
.t.size != 0)
705
// a) compare policyDigest in session with
authPolicy
associated with the entity to be authorized;
736
TPM2B_DIGEST
authPolicy
;
750
// Get
authPolicy
.
752
&
authPolicy
);
753
// Compare
authPolicy
.
754
if(!Memory2BEqual(&session->u2.policyDigest.b, &
authPolicy
.b)
[
all
...]
Object.c
420
pAssert(&((*object)->auth) == &objectHash->publicArea.
authPolicy
);
Object_spt.c
518
// TPM_RC_SIZE
authPolicy
size does not match digest size of the name algorithm in
538
// Check
authPolicy
digest consistency
539
if( publicArea->
authPolicy
.t.size != 0
540
&& ( publicArea->
authPolicy
.t.size
[
all
...]
tpm_types.h
[
all
...]
tpm_generated.c
[
all
...]
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2NVStorage.c
252
NvPublic->nvPublic.
authPolicy
.size = SwapBytes16 (NvPublic->nvPublic.
authPolicy
.size);
253
Buffer = (UINT8 *)&RecvBuffer.NvPublic.nvPublic.
authPolicy
;
254
Buffer += sizeof(UINT16) + NvPublic->nvPublic.
authPolicy
.size;
334
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (NvPublic->nvPublic.
authPolicy
.size));
336
CopyMem (Buffer, NvPublic->nvPublic.
authPolicy
.buffer, NvPublic->nvPublic.
authPolicy
.size);
337
Buffer += NvPublic->nvPublic.
authPolicy
.size;
[
all
...]
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/
Tpm20.h
[
all
...]
Completed in 1750 milliseconds