Lines Matching full:tpm
28 (1) TPM (Trusted Platform Module: hardware device)
30 Rooted to Storage Root Key (SRK) which never leaves the TPM that
40 (1) TPM
51 (1) TPM
54 values, and only unsealed by the TPM, if PCRs and blob integrity
68 (1) TPM
80 The strength and appropriateness of a particular TPM or TEE for a given
95 * TPM (hardware device) based RNG
121 Trusted Keys usage: TPM
124 TPM 1.2: By default, trusted keys are sealed under the SRK, which has the
128 TPM 2.0: The user must first create a storage key and make it persistent, so the
153 TPM 1.2: default 0x40000000 (SRK)
154 TPM 2.0: no default; must be passed every time
163 hash= hash algorithm name as a string. For TPM 1.x the only
164 allowed value is sha1. For TPM 2.x the allowed values
215 Note: When using a TPM 2.0 with a persistent key with handle 0x81000001,
257 Reseal (TPM specific) a trusted key under new PCR values::
317 TPM 2.0 ASN.1 Key Format
320 The TPM 2.0 ASN.1 key format is designed to be easily recognisable,
321 even in binary form (fixing a problem we had with the TPM 1.2 ASN.1
338 2.23.133.10.1.3 TPM Loadable key. This is an asymmetric key (Usually
342 2.23.133.10.1.4 TPM Importable Key. This is an asymmetric key (Usually
346 2.23.133.10.1.5 TPM Sealed Data. This is a set of data (up to 128
347 bytes) which is sealed by the TPM. It usually
351 The trusted key code only uses the TPM Sealed Data OID.