Lines Matching full:tpm
28 (1) TPM (Trusted Platform Module: hardware device)
30 Rooted to Storage Root Key (SRK) which never leaves the TPM that
47 (1) TPM
62 (1) TPM
65 values, and only unsealed by the TPM, if PCRs and blob integrity
84 (1) TPM
115 * TPM: hardware device based RNG
117 Keys are generated within the TPM. Strength of random numbers may vary
151 Trusted Keys usage: TPM
154 TPM 1.2: By default, trusted keys are sealed under the SRK, which has the
158 TPM 2.0: The user must first create a storage key and make it persistent, so the
183 TPM 1.2: default 0x40000000 (SRK)
184 TPM 2.0: no default; must be passed every time
193 hash= hash algorithm name as a string. For TPM 1.x the only
194 allowed value is sha1. For TPM 2.x the allowed values
260 Note: When using a TPM 2.0 with a persistent key with handle 0x81000001,
302 Reseal (TPM specific) a trusted key under new PCR values::
373 TPM 2.0 ASN.1 Key Format
376 The TPM 2.0 ASN.1 key format is designed to be easily recognisable,
377 even in binary form (fixing a problem we had with the TPM 1.2 ASN.1
394 2.23.133.10.1.3 TPM Loadable key. This is an asymmetric key (Usually
398 2.23.133.10.1.4 TPM Importable Key. This is an asymmetric key (Usually
402 2.23.133.10.1.5 TPM Sealed Data. This is a set of data (up to 128
403 bytes) which is sealed by the TPM. It usually
407 The trusted key code only uses the TPM Sealed Data OID.