Lines Matching full:tpm
28 (1) TPM (Trusted Platform Module: hardware device)
30 Rooted to Storage Root Key (SRK) which never leaves the TPM that
55 (1) TPM
76 (1) TPM
79 values, and only unsealed by the TPM, if PCRs and blob integrity
103 (1) TPM
139 * TPM: hardware device based RNG
141 Keys are generated within the TPM. Strength of random numbers may vary
182 Trusted Keys usage: TPM
185 TPM 1.2: By default, trusted keys are sealed under the SRK, which has the
189 TPM 2.0: The user must first create a storage key and make it persistent, so the
214 TPM 1.2: default 0x40000000 (SRK)
215 TPM 2.0: no default; must be passed every time
224 hash= hash algorithm name as a string. For TPM 1.x the only
225 allowed value is sha1. For TPM 2.x the allowed values
304 Note: When using a TPM 2.0 with a persistent key with handle 0x81000001,
346 Reseal (TPM specific) a trusted key under new PCR values::
417 TPM 2.0 ASN.1 Key Format
420 The TPM 2.0 ASN.1 key format is designed to be easily recognisable,
421 even in binary form (fixing a problem we had with the TPM 1.2 ASN.1
438 2.23.133.10.1.3 TPM Loadable key. This is an asymmetric key (Usually
442 2.23.133.10.1.4 TPM Importable Key. This is an asymmetric key (Usually
446 2.23.133.10.1.5 TPM Sealed Data. This is a set of data (up to 128
447 bytes) which is sealed by the TPM. It usually
451 The trusted key code only uses the TPM Sealed Data OID.